Page 19 of 92 results (0.008 seconds)

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en OpenEMR 2.8.1 y versiones anteriores, cuando el registro global está habilitado, permiten a atacantes remotos la ejecución de código PHP de su elección mediante una URL en el parámetro srcdir del (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, y (d) print_billing_report.php en la ruta interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php y (i) main.php en la ruta interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, y (o) front_receipts_report.php en la ruta interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, y (r) user_info.php en la ruta interface/usergroup/; o del (s) custom/import_xml.php. • https://www.exploit-db.com/exploits/2727 http://advisories.echo.or.id/adv/adv60-theday-2006.txt http://secunia.com/advisories/22695 http://securityreason.com/securityalert/1834 http://www.securityfocus.com/archive/1/450698/100/0/threaded http://www.vupen.com/english/advisories/2006/4382 https://exchange.xforce.ibmcloud.com/vulnerabilities/30036 •

CVSS: 6.8EPSS: 6%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter. • https://www.exploit-db.com/exploits/1886 http://secunia.com/advisories/20505 http://www.vupen.com/english/advisories/2006/2196 https://exchange.xforce.ibmcloud.com/vulnerabilities/26984 •