Philips Vue Motion
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Philips Vue Motion.
By the Year
In 2026 there have been 0 vulnerabilities in Philips Vue Motion. Vue Motion did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 8 | 7.83 |
It may take a day or so for new Vue Motion vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Philips Vue Motion Security Vulnerabilities
Philips Vue MyVue PACS <=12.2.x.x VideoStream Path Traversal Authenticated
CVE-2021-39369
6.5 - Medium
- December 26, 2022
In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root.
Directory traversal
Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel
CVE-2021-33022
7.5 - High
- April 01, 2022
Philips Vue PACS versions 12.2.x.x and prior transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Cleartext Transmission of Sensitive Information
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk
CVE-2021-33018
7.5 - High
- April 01, 2022
The use of a broken or risky cryptographic algorithm in Philips Vue PACS versions 12.2.x.x and prior is an unnecessary risk that may result in the exposure of sensitive information.
Use of a Broken or Risky Cryptographic Algorithm
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development
CVE-2021-27501
9.8 - Critical
- April 01, 2022
Philips Vue PACS versions 12.2.x.x and prior does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities.
Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and
CVE-2021-27493
6.5 - Medium
- April 01, 2022
Philips Vue PACS versions 12.2.x.x and prior does not ensure or incorrectly ensures structured messages or data are well formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.
Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials
CVE-2021-33024
7.5 - High
- April 01, 2022
Philips Vue PACS versions 12.2.x.x and prior transmits or stores authentication credentials, but it uses an insecure method susceptible to unauthorized interception and/or retrieval.
Insufficiently Protected Credentials
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against
CVE-2021-33020
7.5 - High
- April 01, 2022
Philips Vue PACS versions 12.2.x.x and prior uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
Operation on a Resource after Expiration or Release
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism
CVE-2021-27497
9.8 - Critical
- April 01, 2022
Philips Vue PACS versions 12.2.x.x and prior does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Philips Vue Motion or by Philips? Click the Watch button to subscribe.