Page 25 of 122 results (0.003 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Multiple Cross-Site Scripting (XSS) issues were discovered in OpenEMR 5.0.0 and 5.0.1-dev. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to the "openemr-master/gacl/admin/object_search.php" URL (section_value; src_form). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. Se ha descubierto un problema en OpenEMR 5.0.1-dev. La vulnerabilidad existe debido a filtración insuficiente de datos suministrados por el usuario pasados a la URL "openemr-master/gacl/admin/object_search.php". • http://www.securityfocus.com/bid/96539 http://www.securityfocus.com/bid/96576 https://github.com/openemr/openemr/issues/498 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 34%CPEs: 10EXPL: 0

interface/globals.php in OpenEMR 2.x, 3.x, and 4.x before 4.2.0 patch 2 allows remote attackers to bypass authentication and obtain sensitive information via an ignoreAuth=1 value to certain scripts, as demonstrated by (1) interface/fax/fax_dispatch_newpid.php and (2) interface/billing/sl_eob_search.php. interface/globals.php en OpenEMR 2.x, 3.x y 4.x en versiones anteriores a 4.2.0 patch 2 permite a atacantes remotos eludir la autenticación y obtener información sensible a través de un valor ignoreAuth=1 a ciertas secuencias, como se demuestra por (1) interface/fax/fax_dispatch_newpid.php y (2) interface/billing/sl_eob_search.php. • http://jvn.jp/en/jp/JVN22677713/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2015-000092 http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html http://seclists.org/fulldisclosure/2015/Jun/48 http://www.open-emr.org/wiki/index.php/OpenEMR_Patches http://www.securityfocus.com/bid/75299 • CWE-287: Improper Authentication •