Openclinic Ga Project

Openclinic Ga

37 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 29.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:03:23

OpenClinic GA 5.09.02 and 5.89.05b does not properly neutralize user-controllable input, which may allow the execution of malicious code within the user’s browser.

  • EPSS 0.21%
  • Veröffentlicht 29.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:03:23

OpenClinic GA 5.09.02 and 5.89.05b includes arbitrary local files specified within its parameter and executes some files, which may allow disclosure of sensitive files or the execution of malicious uploaded files.

  • EPSS 0.12%
  • Veröffentlicht 29.07.2020 13:15:09
  • Zuletzt bearbeitet 21.11.2024 05:03:22

OpenClinic GA 5.09.02 and 5.89.05b stores passwords using inadequate hashing complexity, which may allow an attacker to recover passwords using known password cracking techniques.

  • EPSS 0.24%
  • Veröffentlicht 20.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:22

OpenClinic GA versions 5.09.02 and 5.89.05b may allow an attacker to bypass the system’s account lockout protection, which may allow brute force password attacks.

  • EPSS 0.21%
  • Veröffentlicht 20.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:23

OpenClinic GA versions 5.09.02 and 5.89.05b contain an authentication mechanism within the system that does not provide sufficient complexity to protect against brute force attacks, which may allow unauthorized users to access the system after no mor...

  • EPSS 0.13%
  • Veröffentlicht 20.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:23

OpenClinic GA versions 5.09.02 and 5.89.05b do not properly check permissions before executing SQL queries, which may allow a low-privilege user to access privileged information.

  • EPSS 0.61%
  • Veröffentlicht 20.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:22

OpenClinic GA versions 5.09.02 and 5.89.05b may allow an attacker to bypass client-side access controls or use a crafted request to initiate a session with limited functionality, which may allow execution of admin functions such as SQL queries.