
Rangely District Hospital
Rangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.



Rangely District Hospital is a 25 bed Critical Access Hospital and Level IV Trauma Center, located at 225 Eagle Crest Drive, Rangely, CO, 81648.

Leading Private Healthcare Provider in the Middle East With a vision to be the most trusted healthcare provider in medical excellence and patient experience globally, Dr. Sulaiman Al-Habib Medical Group (HMG) has become the largest provider of comprehensive healthcare services in the Middle East. As it is currently operating 20 Medical Facilities across Saudi Arabia, UAE, and Bahrain; in addition to developing the first private medical city in Saudi Arabia. Dr. Sulaiman AL-Habib Medical Group mission is to develop and operate state of the art medical facilities and provide innovative healthcare services to create value for people starting from the early stages of planning and designing until the final implementation, operation, obtaining the required accreditations. HMG has received 38 international and national awards and accreditations which include JCI, ISO, MEED, Forbes, CPQ, Arab Health Awards, The Middle East HR Excellence Award, and Middle East Insights’ Quality Service Awards.
Security & Compliance Standards Overview












No incidents recorded for Rangely District Hospital in 2025.
No incidents recorded for Dr. Sulaiman Al Habib Medical Group in 2025.
Rangely District Hospital cyber incidents detection timeline including parent company and subsidiaries
Dr. Sulaiman Al Habib Medical Group cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).