Page 23 of 112 results (0.004 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 3

OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application. OpenEMR versión 5.0.0 y anteriores, permite a los usuarios poco privilegiados cargar archivos de tipos peligrosos, lo que puede resultar en la ejecución de código arbitraria en el contexto de la aplicación vulnerable. • https://www.exploit-db.com/exploits/49983 http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-9380-Exploit https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2017-002 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Multiple Cross-Site Scripting (XSS) issues were discovered in OpenEMR 5.0.0 and 5.0.1-dev. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to the "openemr-master/gacl/admin/object_search.php" URL (section_value; src_form). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. Se ha descubierto un problema en OpenEMR 5.0.1-dev. La vulnerabilidad existe debido a filtración insuficiente de datos suministrados por el usuario pasados a la URL "openemr-master/gacl/admin/object_search.php". • http://www.securityfocus.com/bid/96539 http://www.securityfocus.com/bid/96576 https://github.com/openemr/openemr/issues/498 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •