Filtered by vendor Open-emr
Subscribe
Total
128 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-4615 | 1 Open-emr | 1 Openemr | 2022-12-23 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2. | |||||
CVE-2022-4567 | 1 Open-emr | 1 Openemr | 2022-12-21 | N/A | 8.1 HIGH |
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.2. | |||||
CVE-2022-4503 | 1 Open-emr | 1 Openemr | 2022-12-16 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.0.2. | |||||
CVE-2022-4502 | 1 Open-emr | 1 Openemr | 2022-12-16 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2. | |||||
CVE-2022-4504 | 1 Open-emr | 1 Openemr | 2022-12-16 | N/A | 7.5 HIGH |
Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.0.2. | |||||
CVE-2020-13565 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2022-10-07 | 5.8 MEDIUM | 6.1 MEDIUM |
An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability. | |||||
CVE-2020-13569 | 1 Open-emr | 1 Openemr | 2022-10-07 | 6.8 MEDIUM | 8.8 HIGH |
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability. | |||||
CVE-2022-2729 | 1 Open-emr | 1 Openemr | 2022-08-12 | N/A | 5.4 MEDIUM |
Cross-site Scripting (XSS) - DOM in GitHub repository openemr/openemr prior to 7.0.0.1. | |||||
CVE-2022-2730 | 1 Open-emr | 1 Openemr | 2022-08-12 | N/A | 6.5 MEDIUM |
Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1. | |||||
CVE-2022-2731 | 1 Open-emr | 1 Openemr | 2022-08-12 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1. | |||||
CVE-2022-2734 | 1 Open-emr | 1 Openemr | 2022-08-12 | N/A | 5.4 MEDIUM |
Improper Restriction of Rendered UI Layers or Frames in GitHub repository openemr/openemr prior to 7.0.0.1. | |||||
CVE-2022-2733 | 1 Open-emr | 1 Openemr | 2022-08-12 | N/A | 6.1 MEDIUM |
Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1. | |||||
CVE-2020-13566 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2022-08-06 | 6.5 MEDIUM | 8.8 HIGH |
SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is “Delete”, the POST parameter delete_group leads to a SQL injection. | |||||
CVE-2020-13568 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2022-08-06 | 6.5 MEDIUM | 8.8 HIGH |
SQL injection vulnerability exists in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability in admin/edit_group.php, when the POST parameter action is “Submit”, the POST parameter parent_id leads to a SQL injection. | |||||
CVE-2020-13564 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2022-07-29 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter. | |||||
CVE-2020-13563 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2022-07-29 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter. | |||||
CVE-2022-2493 | 1 Open-emr | 1 Openemr | 2022-07-27 | N/A | 8.1 HIGH |
Data Access from Outside Expected Data Manager Component in GitHub repository openemr/openemr prior to 7.0.0. | |||||
CVE-2022-2494 | 1 Open-emr | 1 Openemr | 2022-07-26 | N/A | 5.4 MEDIUM |
Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0. | |||||
CVE-2021-25920 | 1 Open-emr | 1 Openemr | 2022-07-12 | 5.5 MEDIUM | 6.5 MEDIUM |
In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user. | |||||
CVE-2020-13562 | 2 Open-emr, Phpgacl Project | 2 Openemr, Phpgacl | 2022-06-29 | 4.3 MEDIUM | 6.1 MEDIUM |
A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter. |