Cgm

Clininet

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 02.03.2026 11:16:56
  • Zuletzt bearbeitet 09.03.2026 15:11:00

The CGM CLININET application respond without essential security HTTP headers, exposing users to client‑side attacks such as clickjacking, MIME sniffing, unsafe caching, weak cross‑origin isolation, and missing transport security controls.

  • EPSS 0.03%
  • Veröffentlicht 02.03.2026 11:16:45
  • Zuletzt bearbeitet 09.03.2026 15:19:04

The CGM CLININET application does not implement any mechanisms that prevent clickjacking attacks, neither HTTP security headers nor HTML-based frame‑busting protections were detected. As a result, an attacker can embed the application inside a malici...

  • EPSS 0.04%
  • Veröffentlicht 02.03.2026 11:16:31
  • Zuletzt bearbeitet 09.03.2026 15:25:56

The CGM CLININET application uses direct, sequential object identifiers "MessageID" without proper authorization checks. By modifying the parameter in the GET request, an attacker can access messages and attachments belonging to other users.

  • EPSS 0.03%
  • Veröffentlicht 02.03.2026 11:14:46
  • Zuletzt bearbeitet 09.03.2026 16:49:58

The CGM CLININET system provides smart card authentication; however, authentication is conducted locally on the client device, and, in reality, only the certificate number is used for access verification. As a result, possession of the certificate nu...