Page 9 of 128 results (0.015 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A stored cross-site scripting (XSS) issue was discovered in the OpenEMR Hospital Information Management System version 6.0.0. Se ha detectado un problema de tipo cross-site scripting (XSS) almacenado en OpenEMR Hospital Information Management System versión 6.0.0 • https://github.com/openemr https://securityforeveryone.com/blog/openemr-0-day-stored-cross-site-scripting-xss-vulnerability-cve-2022-24643 https://www.open-emr.org • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

OpenEMR v6.0.0 was discovered to contain an incorrect access control issue. Se ha detectado que OpenEMR versión v6.0.0, contiene un problema de control de acceso incorrecto • https://github.com/openemr https://securityforeveryone.com/blog/openemr-0-day-incorrect-access-control-vulnerability-cve-2022-25041 https://www.open-emr.org • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register. Una vulnerabilidad de Referencia Directa a Objetos Insegura (IDOR) en OpenEMR 6.0.0, permite a cualquier atacante autenticado acceder y modificar áreas no autorizadas por medio de una petición POST diseñada a /modules/zend_modules/public/Installer/register • https://github.com/openemr/openemr https://securityforeveryone.com/blog/inactive-post-test/openemr-0-day-idor-vulnerability https://www.open-emr.org • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 4

An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI. Un problema de inyección SQL autenticada en la función calendar search de OpenEMR versiones 6.0.0 anteriores al parche 3, permite a un atacante leer datos de todas las tablas de la base de datos por medio del parámetro provider_id, como es demostrado en el URI /interface/main/calendar/index.php?module=PostCalendar&func=search OpenEMR versions 6.0.0 and 6.1.0-dev suffer from an authenticated remote SQL injection vulnerability in the calendar search functionality. • http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html http://seclists.org/fulldisclosure/2021/Dec/38 https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt https://trovent.io/security-advisory-2109-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 2%CPEs: 1EXPL: 3

OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users. OpenEMR versión 6.0.0, presenta una vulnerabilidad de Referencia Directa a Objetos Inseguros en pnotes_print.php?noteid= por medio de la cual un atacante puede leer los mensajes de todos los usuarios OpenEMR version 6.0.0 suffers from an insecure direct object reference vulnerability. • https://www.exploit-db.com/exploits/50260 https://github.com/allenenosh/CVE-2021-40352 http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html https://www.open-emr.org/wiki/index.php/Securing_OpenEMR • CWE-639: Authorization Bypass Through User-Controlled Key •