CA Technologies Ehealth Performance Manager

Do you want an email whenever new security vulnerabilities are reported in CA Technologies Ehealth Performance Manager?

By the Year

In 2024 there have been 0 vulnerabilities in CA Technologies Ehealth Performance Manager . Ehealth Performance Manager did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 3 7.33
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Ehealth Performance Manager vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent CA Technologies Ehealth Performance Manager Security Vulnerabilities

CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS)

CVE-2021-28247 5.4 - Medium - March 26, 2021

CA eHealth Performance Manager through 6.3.2.12 is affected by Cross Site Scripting (XSS). The impact is: An authenticated remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and perform a Reflected Cross-Site Scripting attack against the platform users. The affected endpoints are: cgi/nhWeb with the parameter report, aviewbin/filtermibobjects.pl with the parameter namefilter, and aviewbin/query.pl with the parameters System, SystemText, Group, and GroupText. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

XSS

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library

CVE-2021-28249 8.8 - High - March 26, 2021

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Untrusted Path

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file

CVE-2021-28250 7.8 - High - March 26, 2021

CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Improper Privilege Management

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for CA Technologies Ehealth Performance Manager or by CA Technologies? Click the Watch button to subscribe.

 
subscribe