Total
127 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-29139 | 1 Open-emr | 1 Openemr | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter. | |||||
CVE-2020-13565 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability. | |||||
CVE-2020-13563 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter. | |||||
CVE-2021-25922 | 1 Open-emr | 1 Openemr | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code. | |||||
CVE-2020-13562 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter. | |||||
CVE-2021-25919 | 1 Open-emr | 1 Openemr | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user. | |||||
CVE-2021-25920 | 1 Open-emr | 1 Openemr | 2024-02-04 | 5.5 MEDIUM | 6.5 MEDIUM |
In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user. | |||||
CVE-2021-25921 | 1 Open-emr | 1 Openemr | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit. | |||||
CVE-2020-29140 | 1 Open-emr | 1 Openemr | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
A SQL injection vulnerability in interface/reports/immunization_report.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter. | |||||
CVE-2019-17409 | 1 Open-emr | 1 Openemr | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Reflected XSS exists in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 ia the id parameter. | |||||
CVE-2019-16862 | 1 Open-emr | 1 Openemr | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter. | |||||
CVE-2019-17179 | 1 Open-emr | 1 Openemr | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
4.1.0, 4.1.1, 4.1.2, 4.1.2.3, 4.1.2.6, 4.1.2.7, 4.2.0, 4.2.1, 4.2.2, 5.0.0, 5.0.0.5, 5.0.0.6, 5.0.1, 5.0.1.1, 5.0.1.2, 5.0.1.3, 5.0.1.4, 5.0.1.5, 5.0.1.6, 5.0.1.7, 5.0.2, fixed in version 5.0.2.1 | |||||
CVE-2019-16404 | 1 Open-emr | 1 Openemr | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter. | |||||
CVE-2019-17197 | 1 Open-emr | 1 Openemr | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
OpenEMR through 5.0.2 has SQL Injection in the Lifestyle demographic filter criteria in library/clinical_rules.php that affects library/patient.inc. | |||||
CVE-2019-14529 | 1 Open-emr | 1 Openemr | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php. | |||||
CVE-2018-17180 | 1 Open-emr | 1 Openemr | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in OpenEMR before 5.0.1 Patch 7. Directory Traversal exists via docid=../ to /portal/lib/download_template.php. | |||||
CVE-2018-17179 | 1 Open-emr | 1 Openemr | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php. | |||||
CVE-2019-14530 | 1 Open-emr | 1 Openemr | 2024-02-04 | 6.0 MEDIUM | 8.8 HIGH |
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server. | |||||
CVE-2019-3963 | 1 Open-emr | 1 Openemr | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the patient_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session. | |||||
CVE-2018-18035 | 1 Open-emr | 1 Openemr | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A vulnerability in flashcanvas.swf in OpenEMR before 5.0.1 Patch 6 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system. |