Filtered by vendor Open-emr
Subscriptions
Filtered by product Openemr
Subscriptions
Total
128 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2018-15152 | 1 Open-emr | 1 Openemr | 2022-02-10 | 9.1 Critical |
Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access (1) portal/add_edit_event_user.php, (2) portal/find_appt_popup_user.php, (3) portal/get_allergies.php, (4) portal/get_amendments.php, (5) portal/get_lab_results.php, (6) portal/get_medications.php, (7) portal/get_patient_documents.php, (8) portal/get_problems.php, (9) portal/get_profile.php, (10) portal/portal_payment.php, (11) portal/messaging/messages.php, (12) portal/messaging/secure_chat.php, (13) portal/report/pat_ledger.php, (14) portal/report/portal_custom_report.php, or (15) portal/report/portal_patient_report.php without authenticating as a patient. | ||||
CVE-2018-15139 | 1 Open-emr | 1 Openemr | 2022-02-10 | 8.8 High |
Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory. | ||||
CVE-2017-9380 | 1 Open-emr | 1 Openemr | 2022-02-09 | 8.8 High |
OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application. | ||||
CVE-2021-41843 | 1 Open-emr | 1 Openemr | 2021-12-22 | 6.5 Medium |
An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI. | ||||
CVE-2019-8371 | 1 Open-emr | 1 Openemr | 2021-07-21 | 7.2 High |
OpenEMR v5.0.1-6 allows code execution. | ||||
CVE-2021-25923 | 1 Open-emr | 1 Openemr | 2021-06-30 | 8.1 High |
In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover. | ||||
CVE-2020-36243 | 1 Open-emr | 1 Openemr | 2021-06-01 | 8.8 High |
The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters. | ||||
CVE-2021-32104 | 1 Open-emr | 1 Openemr | 2021-05-11 | 8.8 High |
A SQL injection vulnerability exists (with user privileges) in interface/forms/eye_mag/save.php in OpenEMR 5.0.2.1. | ||||
CVE-2021-32101 | 1 Open-emr | 1 Openemr | 2021-05-11 | 8.2 High |
The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient. | ||||
CVE-2021-32102 | 1 Open-emr | 1 Openemr | 2021-05-11 | 8.8 High |
A SQL injection vulnerability exists (with user privileges) in library/custom_template/ajax_code.php in OpenEMR 5.0.2.1. | ||||
CVE-2021-32103 | 1 Open-emr | 1 Openemr | 2021-05-11 | 4.8 Medium |
A Stored XSS vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.1 allows a admin authenticated user to inject arbitrary web script or HTML via the lname parameter. | ||||
CVE-2021-25917 | 1 Open-emr | 1 Openemr | 2021-03-29 | 4.8 Medium |
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user. | ||||
CVE-2021-25918 | 1 Open-emr | 1 Openemr | 2021-03-29 | 4.8 Medium |
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the TOTP Authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user. | ||||
CVE-2021-25922 | 1 Open-emr | 1 Openemr | 2021-03-24 | 6.1 Medium |
In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code. | ||||
CVE-2021-25919 | 1 Open-emr | 1 Openemr | 2021-03-24 | 4.8 Medium |
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user. | ||||
CVE-2021-25921 | 1 Open-emr | 1 Openemr | 2021-03-24 | 5.4 Medium |
In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit. | ||||
CVE-2020-29140 | 1 Open-emr | 1 Openemr | 2021-02-22 | 7.2 High |
A SQL injection vulnerability in interface/reports/immunization_report.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter. | ||||
CVE-2020-29143 | 1 Open-emr | 1 Openemr | 2021-02-22 | 7.2 High |
A SQL injection vulnerability in interface/reports/non_reported.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter. | ||||
CVE-2020-29139 | 1 Open-emr | 1 Openemr | 2021-02-22 | 7.2 High |
A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter. | ||||
CVE-2020-29142 | 1 Open-emr | 1 Openemr | 2021-02-18 | 7.2 High |
A SQL injection vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the schedule_facility parameter when restrict_user_facility=on is in global settings. |