Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2023-28700

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
Attacker Value
Unknown

CVE-2024-4894

Disclosure Date: May 15, 2024 (last updated January 05, 2025)
ITPison OMICARD EDM fails to properly filter specific URL parameter, allowing unauthenticated remote attackers to modify the parameters and conduct Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to probe internal network information.
0
Attacker Value
Unknown

CVE-2023-48373

Disclosure Date: December 15, 2023 (last updated December 23, 2023)
ITPison OMICARD EDM has a path traversal vulnerability within its parameter “FileName” in a specific function. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.
Attacker Value
Unknown

CVE-2023-48372

Disclosure Date: December 15, 2023 (last updated December 23, 2023)
ITPison OMICARD EDM 's SMS-related function has insufficient validation for user input. An unauthenticated remote attacker can exploit this vulnerability to inject arbitrary SQL commands to access, modify and delete database.
Attacker Value
Unknown

CVE-2023-48371

Disclosure Date: December 15, 2023 (last updated December 23, 2023)
ITPison OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
Attacker Value
Unknown

CVE-2023-32753

Disclosure Date: June 16, 2023 (last updated October 08, 2023)
OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.