Open-emr

Openemr

175 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 28.32%
  • Veröffentlicht 09.02.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:26

OpenEMR version 5.0.0 contains a OS Command Injection vulnerability in fax_dispatch.php that can result in OS command injection by an authenticated attacker with any role. This vulnerability appears to have been fixed in 5.0.0 Patch 2 or higher.

Exploit
  • EPSS 3.86%
  • Veröffentlicht 09.02.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:26

OpenEMR version 5.0.0 contains a Cross Site Scripting (XSS) vulnerability in open-flash-chart.swf and _posteddata.php that can result in . This vulnerability appears to have been fixed in 5.0.0 Patch 2 or higher.

  • EPSS 0.1%
  • Veröffentlicht 17.11.2017 03:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The application OpenEMR is affected by multiple reflected & stored Cross-Site Scripting (XSS) vulnerabilities affecting version 5.0.0 and prior versions. These vulnerabilities could allow remote authenticated attackers to inject arbitrary web script ...

  • EPSS 0.6%
  • Veröffentlicht 17.11.2017 03:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The application OpenEMR version 5.0.0, 5.0.1-dev and prior is affected by vertical privilege escalation vulnerability. This vulnerability can allow an authenticated non-administrator users to view and modify information only accessible to administrat...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 04.11.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

OpenEMR before 5.0.0 Patch 5 allows unauthenticated remote database copying because setup.php exposes functionality for cloning an existing OpenEMR site to an arbitrary attacker-controlled MySQL server via vectors involving a crafted state parameter.

  • EPSS 0.59%
  • Veröffentlicht 01.08.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The csv_log_html function in library/edihistory/edih_csv_inc.php in OpenEMR 5.0.0 and prior allows attackers to bypass intended access restrictions via a crafted name.

Exploit
  • EPSS 0.88%
  • Veröffentlicht 02.06.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 02.03.2017 06:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Multiple Cross-Site Scripting (XSS) issues were discovered in OpenEMR 5.0.0 and 5.0.1-dev. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to the "openemr-master/gacl/admin/object_search.php" URL (section_value; ...

  • EPSS 40.87%
  • Veröffentlicht 05.07.2015 01:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

interface/globals.php in OpenEMR 2.x, 3.x, and 4.x before 4.2.0 patch 2 allows remote attackers to bypass authentication and obtain sensitive information via an ignoreAuth=1 value to certain scripts, as demonstrated by (1) interface/fax/fax_dispatch_...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 08.12.2014 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple SQL injection vulnerabilities in OpenEMR 4.1.2 (Patch 7) and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) layout_id parameter to interface/super/edit_layout.php; (2) form_patient_id, (3) form_drug_na...