
CVE-2019-8368
https://notcve.org/view.php?id=CVE-2019-8368
16 Sep 2019 — OpenEMR v5.0.1-6 allows XSS. OpenEMR versión v5.0.1-6, permite un ataque de tipo XSS. • https://know.bishopfox.com/advisories/openemr-5-0-16-remote-code-execution-cross-site-scripting • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-8371
https://notcve.org/view.php?id=CVE-2019-8371
16 Sep 2019 — OpenEMR v5.0.1-6 allows code execution. OpenEMR versión v5.0.1-6, permite la ejecución de código. • https://know.bishopfox.com/advisories/openemr-5-0-16-remote-code-execution-cross-site-scripting • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2019-3968
https://notcve.org/view.php?id=CVE-2019-3968
20 Aug 2019 — In OpenEMR 5.0.1 and earlier, an authenticated attacker can execute arbitrary commands on the host system via the Scanned Forms interface when creating a new form. En OpenEMR 5.0.1 y versiones anteriores, un atacante autenticado puede ejecutar comandos arbitrarios en el sistema host a través de la interfaz de formularios escaneados al crear un nuevo formulario. • https://www.tenable.com/security/research/tra-2019-40 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-3967
https://notcve.org/view.php?id=CVE-2019-3967
20 Aug 2019 — In OpenEMR 5.0.1 and earlier, the patient file download interface contains a directory traversal flaw that allows authenticated attackers to download arbitrary files from the host system. En OpenEMR 5.0.1 y versiones anteriores, la interfaz de descarga de archivos del paciente contiene un defecto de recorrido de directorio que permite a los atacantes autenticados descargar archivos arbitrarios desde el sistema host. • https://www.tenable.com/security/research/tra-2019-40 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2019-3966
https://notcve.org/view.php?id=CVE-2019-3966
20 Aug 2019 — In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the foreign_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. En OpenEMR 5.0.1 y versiones anteriores, controller.php contiene una vulnerabilidad XSS reflejada en el parámetro foreign_id. Esto podría permitir a un atacante ejecutar código arbitrario en el contexto de la sesión de un usuario. • https://www.tenable.com/security/research/tra-2019-40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-3965
https://notcve.org/view.php?id=CVE-2019-3965
20 Aug 2019 — In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the document_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. En OpenEMR 5.0.1 y versiones anteriores, controller.php contiene una vulnerabilidad XSS reflejada en el parámetro document_id. Esto podría permitir a un atacante ejecutar código arbitrario en el contexto de la sesión de un usuario. • https://www.tenable.com/security/research/tra-2019-40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-3964
https://notcve.org/view.php?id=CVE-2019-3964
20 Aug 2019 — In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the doc_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. En OpenEMR 5.0.1 y versiones anteriores, controller.php contiene una vulnerabilidad XSS reflejada en el parámetro doc_id. Esto podría permitir a un atacante ejecutar código arbitrario en el contexto de la sesión de un usuario. • https://www.tenable.com/security/research/tra-2019-40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-3963
https://notcve.org/view.php?id=CVE-2019-3963
20 Aug 2019 — In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the patient_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. En OpenEMR 5.0.1 y versiones anteriores, controller.php contiene una vulnerabilidad XSS reflejada en el parámetro patient_id. Esto podría permitir a un atacante ejecutar código arbitrario en el contexto de la sesión de un usuario. • https://www.tenable.com/security/research/tra-2019-40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2019-14530 – OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated)
https://notcve.org/view.php?id=CVE-2019-14530
13 Aug 2019 — An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server. Se descubrió un problema en custom / ajax_download.php en OpenEMR antes de 5.0.2 a través del parámetro fileName. Un atacante puede descargar cualqu... • https://packetstorm.news/files/id/163375 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2019-14529
https://notcve.org/view.php?id=CVE-2019-14529
02 Aug 2019 — OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php. OpenEMR anterior a versión 5.0.2, permite la inyección SQL en el archivo interface/forms/eye_mag/save.php. • https://github.com/Wezery/CVE-2019-14529 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •