Page 5 of 68 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter. Canon Medical Informatics Vitrea Vision 7.7.76.1 no aplica adecuadamente los controles de acceso. Un usuario autenticado puede obtener acceso no autorizado a los registros de imágenes alterando el parámetro vitrea-view/studies/searchpatientId. • https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Canon Medical Vitrea View 7.x before 7.7.6 allow remote attackers to inject arbitrary web script or HTML via (1) the input after the error subdirectory to the /vitrea-view/error/ subdirectory, or the (2) groupID, (3) offset, or (4) limit parameter to an Administrative Panel (Group and Users) page. There is a risk of an attacker retrieving patient information. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en Canon Medical Vitrea View versiones 7.x anteriores a 7.7.6, permiten a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios por medio de (1) la entrada después del subdirectorio de error al subdirectorio /vitrea-view/error/, o el parámetro (2) groupID, (3) offset, o (4) limit a una página del Panel Administrativo (Grupo y Usuarios). Se presenta el riesgo de que un atacante recupere la información del paciente • https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=30693 https://www.vitalimages.com/customer-success-support-program/vital-images-software-security-updates https://www.vitalimages.com/vitrea-vision/vitrea-view • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

The BeanShell components of IRISNext through 9.8.28 allow execution of arbitrary commands on the target server by creating a custom search (or editing an existing/predefined search) of the documents. The search components permit adding BeanShell expressions that result in Remote Code Execution in the context of the IRISNext application user, running on the web server. Los componentes BeanShell de IRISNext versiones hasta 9.8.28, permiten una ejecución de comandos arbitrarios en el servidor de destino mediante la creación de una búsqueda personalizada (o la edición de una búsqueda existente/predefinida) de los documentos. Los componentes de búsqueda permiten añadir expresiones BeanShell que resultan en una Ejecución de Código Remota en el contexto del usuario de la aplicación IRISNext, que es ejecutada en el servidor web • https://github.com/post-cyberlabs/CVE-Advisory/blob/main/CVE-2022-26111.pdf https://varsnext.iriscorporate.com • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 9.8EPSS: 1%CPEs: 152EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the SLP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.usa.canon.com/support/canon-product-advisories/canon-laser-printer-inkjet-printer-and-small-office-multifunctional-printer-measure-against-buffer-overflow https://www.zerodayinitiative.com/advisories/ZDI-22-515 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 8.8EPSS: 0%CPEs: 152EXPL: 0

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF644Cdw 10.02 printers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the privet API. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://www.usa.canon.com/internet/portal/us/home/support/product-advisories/detail/canon-laser-printer-and-small-office-multifunctional-printer-measure-against-buffer-overflow https://www.zerodayinitiative.com/advisories/ZDI-22-516 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •