Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown
CVE-2005-4029
Disclosure Date: December 05, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 allows remote attackers to obtain valid usernames via the HTML source of the WebEOC login webpage, which could be useful in other attacks such as locking out valid users via brute force methods.
0
Attacker Value
Unknown
CVE-2005-4002
Disclosure Date: December 05, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 uses the same secret key for all installations, which allows attackers with the key to decrypt data from any WebEOC installation.
0
Attacker Value
Unknown
CVE-2005-2283
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 does not properly restrict the size of an uploaded file, which allows remote authenticated users to cause a denial of service (system and database resource consumption) via a large file.
0
Attacker Value
Unknown
CVE-2005-2284
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
Multiple SQL injection vulnerabilities in WebEOC before 6.0.2 allow remote attackers to modify SQL statements via unknown attack vectors.
0
Attacker Value
Unknown
CVE-2005-2282
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
Multiple cross-site scripting (XSS) vulnerabilities in WebEOC before 6.0.2 allow remote attackers to inject arbitrary web script and HTML via unknown vectors.
0
Attacker Value
Unknown
CVE-2005-2286
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 does not properly check user authorization, which allows remote attackers to gain privileges via a direct request to a resource.
0
Attacker Value
Unknown
CVE-2005-2281
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 uses a weak encryption scheme for passwords, which makes it easier for attackers to crack passwords.
0
Attacker Value
Unknown
CVE-2005-2285
Disclosure Date: July 18, 2005 (last updated February 22, 2025)
WebEOC before 6.0.2 stores sensitive information in locations such as URIs, web pages, and configuration files, which allows remote attackers to obtain information such as Usernames, Passwords, Emergency information, medical information, and system configuration.
0