Total
128 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-8368 | 1 Open-emr | 1 Openemr | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
OpenEMR v5.0.1-6 allows XSS. | |||||
CVE-2019-3964 | 1 Open-emr | 1 Openemr | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the doc_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. | |||||
CVE-2019-3963 | 1 Open-emr | 1 Openemr | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the patient_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. | |||||
CVE-2019-14529 | 1 Open-emr | 1 Openemr | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php. | |||||
CVE-2018-18035 | 1 Open-emr | 1 Openemr | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
A vulnerability in flashcanvas.swf in OpenEMR before 5.0.1 Patch 6 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system. | |||||
CVE-2019-14530 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.0 MEDIUM | 8.8 HIGH |
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server. | |||||
CVE-2019-3965 | 1 Open-emr | 1 Openemr | 2023-12-10 | 4.3 MEDIUM | 6.1 MEDIUM |
In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the document_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. | |||||
CVE-2018-17179 | 1 Open-emr | 1 Openemr | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php. | |||||
CVE-2019-3968 | 1 Open-emr | 1 Openemr | 2023-12-10 | 9.0 HIGH | 8.8 HIGH |
In OpenEMR 5.0.1 and earlier, an authenticated attacker can execute arbitrary commands on the host system via the Scanned Forms interface when creating a new form. | |||||
CVE-2018-15144 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
SQL injection vulnerability in interface/de_identification_forms/find_drug_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the search_term parameter. | |||||
CVE-2018-15155 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php. | |||||
CVE-2018-15146 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
SQL injection vulnerability in interface/de_identification_forms/find_immunization_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'search_term' parameter. | |||||
CVE-2018-15140 | 1 Open-emr | 1 Openemr | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to read arbitrary files via the "docid" parameter when the mode is set to get. | |||||
CVE-2018-15143 | 1 Open-emr | 1 Openemr | 2023-12-10 | 7.5 HIGH | 9.8 CRITICAL |
Multiple SQL injection vulnerabilities in portal/find_appt_popup_user.php in versions of OpenEMR before 5.0.1.4 allow a remote attacker to execute arbitrary SQL commands via the (1) catid or (2) providerid parameter. | |||||
CVE-2018-1000218 | 1 Open-emr | 1 Openemr | 2023-12-10 | 3.5 LOW | 5.4 MEDIUM |
OpenEMR version v5_0_1_4 contains a Cross Site Scripting (XSS) vulnerability in The 'file' parameter in line #43 of interface/fax/fax_view.php that can result in The vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML.. This attack appear to be exploitable via The victim must visit on a specially crafted URL.. | |||||
CVE-2018-15153 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/main/daemon_frame.php after modifying the "hylafax_server" global variable in interface/super/edit_globals.php. | |||||
CVE-2018-15149 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
SQL injection vulnerability in interface/forms/eye_mag/php/Anything_simple.php from library/forms.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'encounter' parameter. | |||||
CVE-2018-15142 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory. | |||||
CVE-2018-15139 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory. | |||||
CVE-2018-15154 | 1 Open-emr | 1 Openemr | 2023-12-10 | 6.5 MEDIUM | 8.8 HIGH |
OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/billing/sl_eob_search.php after modifying the "print_command" global variable in interface/super/edit_globals.php. |