Lucene search

K

26 matches found

CVE
CVE
added 2021/02/07 8:15 p.m.88 views

CVE-2020-36243

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

9CVSS8.9AI score0.85885EPSS
CVE
CVE
added 2021/09/01 1:15 p.m.81 views

CVE-2021-40352

OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.

6.5CVSS6.2AI score0.04554EPSS
CVE
CVE
added 2021/02/01 4:15 p.m.53 views

CVE-2020-13562

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter.

9.6CVSS6AI score0.19363EPSS
CVE
CVE
added 2021/03/22 8:15 p.m.45 views

CVE-2021-25920

In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user.

6.5CVSS6.3AI score0.00224EPSS
CVE
CVE
added 2021/03/22 8:15 p.m.45 views

CVE-2021-25922

In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code.

6.1CVSS6.1AI score0.01666EPSS
CVE
CVE
added 2021/01/28 1:15 p.m.43 views

CVE-2020-13569

A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker ca...

8.8CVSS8.7AI score0.01004EPSS
CVE
CVE
added 2021/01/20 1:15 a.m.43 views

CVE-2020-19364

OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious PHP scripts through /controller.php.

8.8CVSS8.7AI score0.00709EPSS
CVE
CVE
added 2021/03/22 8:15 p.m.43 views

CVE-2021-25917

In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.

4.8CVSS5.2AI score0.02795EPSS
CVE
CVE
added 2021/03/22 8:15 p.m.43 views

CVE-2021-25921

In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the Allergies section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit.

5.4CVSS5.2AI score0.57066EPSS
CVE
CVE
added 2021/02/01 4:15 p.m.42 views

CVE-2020-13563

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.

9.6CVSS6AI score0.19965EPSS
CVE
CVE
added 2021/03/22 8:15 p.m.42 views

CVE-2021-25919

In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.

4.8CVSS5.1AI score0.5897EPSS
CVE
CVE
added 2021/05/07 4:15 a.m.42 views

CVE-2021-32101

The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulat...

8.2CVSS8.1AI score0.00217EPSS
CVE
CVE
added 2021/03/22 8:15 p.m.41 views

CVE-2021-25918

In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the TOTP Authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.

4.8CVSS5.1AI score0.02795EPSS
CVE
CVE
added 2021/05/07 4:15 a.m.41 views

CVE-2021-32104

A SQL injection vulnerability exists (with user privileges) in interface/forms/eye_mag/save.php in OpenEMR 5.0.2.1.

8.8CVSS9AI score0.00024EPSS
CVE
CVE
added 2021/02/10 8:15 p.m.40 views

CVE-2020-13565

An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provid...

6.1CVSS6.1AI score0.01051EPSS
CVE
CVE
added 2021/12/17 4:15 a.m.39 views

CVE-2021-41843

An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.

6.8CVSS6.6AI score0.00132EPSS
CVE
CVE
added 2021/04/13 3:15 p.m.37 views

CVE-2020-13566

SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is “Delete”, the POST parameter delete_group leads to a SQL ...

8.8CVSS9.1AI score0.00046EPSS
CVE
CVE
added 2021/05/07 4:15 a.m.36 views

CVE-2021-32103

A Stored XSS vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.1 allows a admin authenticated user to inject arbitrary web script or HTML via the lname parameter.

4.8CVSS5AI score0.00505EPSS
CVE
CVE
added 2021/02/01 4:15 p.m.34 views

CVE-2020-13564

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter.

9.6CVSS6AI score0.19965EPSS
CVE
CVE
added 2021/04/13 3:15 p.m.33 views

CVE-2020-13568

SQL injection vulnerability exists in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability in admin/edit_group.php, when the POST parameter action is “Submit”, the POST parameter parent_id leads to a SQL inje...

8.8CVSS8.9AI score0.00393EPSS
CVE
CVE
added 2021/05/07 4:15 a.m.32 views

CVE-2021-32102

A SQL injection vulnerability exists (with user privileges) in library/custom_template/ajax_code.php in OpenEMR 5.0.2.1.

8.8CVSS9AI score0.00024EPSS
CVE
CVE
added 2021/02/15 8:15 p.m.31 views

CVE-2020-29142

A SQL injection vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the schedule_facility parameter when restrict_user_facility=on is in global settings.

7.2CVSS7.7AI score0.00057EPSS
CVE
CVE
added 2021/02/15 9:15 p.m.30 views

CVE-2020-29143

A SQL injection vulnerability in interface/reports/non_reported.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter.

7.2CVSS7.7AI score0.00057EPSS
CVE
CVE
added 2021/02/15 9:15 p.m.27 views

CVE-2020-29139

A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter.

7.2CVSS7.7AI score0.00057EPSS
CVE
CVE
added 2021/02/15 9:15 p.m.26 views

CVE-2020-29140

A SQL injection vulnerability in interface/reports/immunization_report.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter.

7.2CVSS7.7AI score0.00057EPSS
CVE
CVE
added 2021/06/24 11:15 a.m.26 views

CVE-2021-25923

In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover.

8.1CVSS8AI score0.00065EPSS