Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Esi Products Subscribe
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2005-4002 1 Esi Products 1 Webeoc 2008-09-05 4.0 MEDIUM N/A
WebEOC before 6.0.2 uses the same secret key for all installations, which allows attackers with the key to decrypt data from any WebEOC installation.
CVE-2005-4029 1 Esi Products 1 Webeoc 2008-09-05 5.0 MEDIUM N/A
WebEOC before 6.0.2 allows remote attackers to obtain valid usernames via the HTML source of the WebEOC login webpage, which could be useful in other attacks such as locking out valid users via brute force methods.
CVE-2005-2283 1 Esi Products 1 Webeoc 2008-09-05 2.1 LOW N/A
WebEOC before 6.0.2 does not properly restrict the size of an uploaded file, which allows remote authenticated users to cause a denial of service (system and database resource consumption) via a large file.
CVE-2005-2284 1 Esi Products 1 Webeoc 2008-09-05 7.5 HIGH N/A
Multiple SQL injection vulnerabilities in WebEOC before 6.0.2 allow remote attackers to modify SQL statements via unknown attack vectors.
CVE-2005-2281 1 Esi Products 1 Webeoc 2008-09-05 5.0 MEDIUM N/A
WebEOC before 6.0.2 uses a weak encryption scheme for passwords, which makes it easier for attackers to crack passwords.
CVE-2005-2286 1 Esi Products 1 Webeoc 2008-09-05 10.0 HIGH N/A
WebEOC before 6.0.2 does not properly check user authorization, which allows remote attackers to gain privileges via a direct request to a resource.
CVE-2005-2285 1 Esi Products 1 Webeoc 2008-09-05 5.0 MEDIUM N/A
WebEOC before 6.0.2 stores sensitive information in locations such as URIs, web pages, and configuration files, which allows remote attackers to obtain information such as Usernames, Passwords, Emergency information, medical information, and system configuration.
CVE-2005-2282 1 Esi Products 1 Webeoc 2008-09-05 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in WebEOC before 6.0.2 allow remote attackers to inject arbitrary web script and HTML via unknown vectors.