Show filters
123 Total Results
Displaying 31-40 of 123
Sort by:
Attacker Value
Unknown

CVE-2023-0440

Disclosure Date: January 23, 2023 (last updated October 08, 2023)
Observable Discrepancy in GitHub repository healthchecks/healthchecks prior to v2.6.
Attacker Value
Unknown

CVE-2022-46471

Disclosure Date: January 13, 2023 (last updated October 08, 2023)
Online Health Care System v1.0 was discovered to contain a SQL injection vulnerability via the consulting_id parameter at /healthcare/Admin/consulting_detail.php.
Attacker Value
Unknown

CVE-2015-10032

Disclosure Date: January 09, 2023 (last updated October 20, 2023)
A vulnerability was found in HealthMateWeb. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file createaccount.php. The manipulation of the argument username/password/first_name/last_name/company/phone leads to cross site scripting. The attack can be launched remotely. The patch is named 472776c25b1046ecaf962c46fed7c713c72c28e3. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217663.
Attacker Value
Unknown

CVE-2021-4295

Disclosure Date: December 29, 2022 (last updated October 08, 2023)
A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-45472

Disclosure Date: November 23, 2022 (last updated October 08, 2023)
CAE LearningSpace Enterprise (with Intuity License) image 267r patch 639 allows DOM XSS, related to ontouchmove and onpointerup.
Attacker Value
Unknown

CVE-2022-38100

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical reboot. A UDP broadcast request could be sent that causes a mass denial-of-service attack on all CME8000 devices connected to the same network.
Attacker Value
Unknown

CVE-2022-3027

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
The CMS8000 device does not properly control or sanitize the SSID name of a new Wi-Fi access point. A threat actor could create an SSID with a malicious name, including non-standard characters that, when the device attempts connecting to the malicious SSID, the device can be exploited to write arbitrary files or display incorrect information.
Attacker Value
Unknown

CVE-2022-38453

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and identify additional vulnerabilities.
Attacker Value
Unknown

CVE-2022-36385

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.
Attacker Value
Unknown

CVE-2022-38069

Disclosure Date: September 01, 2022 (last updated February 24, 2025)
Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive patient information or modification of device parameters