Логотип exploitDog
bind:CVE-2018-15142
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-15142

Количество 2

Количество 2

nvd логотип

CVE-2018-15142

больше 7 лет назад

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-ffhh-fjrg-f4fj

больше 3 лет назад

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-15142

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

CVSS3: 8.8
2%
Низкий
больше 7 лет назад
github логотип
GHSA-ffhh-fjrg-f4fj

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

CVSS3: 8.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу