May 3rd, 2023 | ๐
iSpeech # Exploit Title: OpenEMR v7.0.1 - Authentication credentials brute force# Date: 2023-04-28# Exploit Author: abhhi (Abhishek Birdawade)# Vendor Homepage:
February 25th, 2023 | ๐
Text to Speech submitted by /u/_noraj_ comments] Source link
December 16th, 2021 | ๐
https://www.ispeech.org # Trovent Security Advisory 2109-01 ###################################### Authenticated SQL injection in OpenEMR calendar search###################################################### Overview######## Advisory ID: TRSA-2109-01Advisory version: 1.0Advisory
September 2nd, 2021 | ๐
iSpeech.org # Exploit Title: Openemr 6.0.0 - Insecure direct object references # Date: 31/8/2021 # Exploit Author: Allen Enosh Upputori
July 14th, 2021 | ๐
iSpeech.org # Title: OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated) (2)# Exploit author: noraj (Alexandre ZANNI) for SEC-IT (http://secit.fr)#
July 6th, 2021 | ๐
text to speech # Title: OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated) (2)# Exploit author: noraj (Alexandre ZANNI) for SEC-IT
June 19th, 2021 | ๐
iSpeech.org*] # Exploit Title: OpenEMR 5.0.1.3 - '/portal/account/register.php' Authentication Bypass# Date 15.06.2021# Exploit Author: Ron Jost (Hacker5preme)# Vendor Homepage: https://www.open-emr.org/#
June 15th, 2021 | ๐
https://www.ispeech.org # Exploit Title: OpenEMR 5.0.1.3 - 'manage_site_files' Remote Code Execution (Authenticated)# Date 12.06.2021# Exploit Author: Ron Jost (Hacker5preme)# Vendor
June 12th, 2021 | ๐
https://www.ispeech.org*] # Exploit Title: OpenEMR 5.0.0 - Remote Code Execution (Authenticated)# Date 10.06.2021# Exploit Author: Ron Jost (Hacker5preme)# Vendor Homepage:
January 30th, 2021 | ๐
iSpeech # Title: OpenEMR 5.0.1 - Remote Code Execution (Authenticated) (2) # Exploit Author: Alexandre ZANNI # Date: 2020-07-16 #
June 30th, 2020 | ๐
iSpeech # Exploit Title: OpenEMR 5.0.1 - 'controller' Remote Code Execution# Date: 2020-06-22# Exploit Author: Emre รVรNร# Vendor Homepage: https://www.open-emr.org/#
June 26th, 2020 | ๐
Text to Voice # Exploit Title: OpenEMR 5.0.1 - 'controller' Remote Code Execution # Date: 2020-06-22 # Exploit Author: Emre
May 27th, 2020 | ๐
https://www.ispeech.org # Title: OpenEMR 5.0.1 - Remote Code Execution# Exploit Author: Musyoka Ian# Date: 2020-05-25# Title: OpenEMR < 5.0.1 -
May 26th, 2020 | ๐
iSpeech # Title: OpenEMR 5.0.1 - Remote Code Execution # Exploit Author: Musyoka Ian # Date: 2020-05-25 # Title: OpenEMR
Gloss