Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ca ehealth performance manager vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-0640
Cross-site scripting (XSS) vulnerability in CA eHealth Performance Manager 6.0.x up to and including 6.2.x, when malicious HTML detection is disabled, allows remote malicious users to inject arbitrary web script or HTML via a crafted request.
Ca Ehealth Performance Manager 6.0
Ca Ehealth Performance Manager 6.1
Ca Ehealth Performance Manager 6.2
7.8
CVSSv3
CVE-2021-28250
CA eHealth Performance Manager up to and including 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user. NOTE: This vulnerabilit...
Ca Ehealth Performance Manager
5.4
CVSSv3
CVE-2021-28247
CA eHealth Performance Manager up to and including 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site...
Ca Ehealth Performance Manager
8.8
CVSSv3
CVE-2021-28249
CA eHealth Performance Manager up to and including 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the ...
Ca Ehealth Performance Manager
7.5
CVSSv3
CVE-2021-28248
CA eHealth Performance Manager up to and including 6.3.2.12 is affected by Improper Restriction of Excessive Authentication Attempts. An attacker is able to perform an arbitrary number of /web/frames/ authentication attempts using different passwords, and eventually gain access t...
Broadcom Ehealth
7.8
CVSSv3
CVE-2021-28246
CA eHealth Performance Manager up to and including 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The...
Broadcom Ehealth
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2024-20360
CVE-2021-47559
XXE
CVE-2024-5229
CVE-2021-47543
CVE-2021-47571
SSTI
CVE-2024-4978
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started