Skip to content

File tree

7 files changed

+286
-0
lines changed

7 files changed

+286
-0
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-4r2r-hjrw-mpq6",
4+
"modified": "2024-11-08T12:31:12Z",
5+
"published": "2024-11-08T12:31:12Z",
6+
"aliases": [
7+
"CVE-2024-10839"
8+
],
9+
"details": "Zohocorp ManageEngine SharePoint Manager Plus versions 4503 and prior are vulnerable to authenticated XML External Entity (XXE) in the Management option.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L"
14+
}
15+
],
16+
"affected": [
17+
18+
],
19+
"references": [
20+
{
21+
"type": "ADVISORY",
22+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10839"
23+
},
24+
{
25+
"type": "WEB",
26+
"url": "https://www.manageengine.com/sharepoint-management-reporting/advisory/CVE-2024-10839.html"
27+
}
28+
],
29+
"database_specific": {
30+
"cwe_ids": [
31+
"CWE-611"
32+
],
33+
"severity": "HIGH",
34+
"github_reviewed": false,
35+
"github_reviewed_at": null,
36+
"nvd_published_at": "2024-11-08T11:15:03Z"
37+
}
38+
}
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-943v-4mfm-9hjg",
4+
"modified": "2024-11-08T12:31:12Z",
5+
"published": "2024-11-08T12:31:12Z",
6+
"aliases": [
7+
"CVE-2024-10187"
8+
],
9+
"details": "The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_link shortcode in all versions up to, and including, 2.7.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [
17+
18+
],
19+
"references": [
20+
{
21+
"type": "ADVISORY",
22+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10187"
23+
},
24+
{
25+
"type": "WEB",
26+
"url": "https://plugins.trac.wordpress.org/changeset/3183178"
27+
},
28+
{
29+
"type": "WEB",
30+
"url": "https://wordpress.org/plugins/mycred/#developers"
31+
},
32+
{
33+
"type": "WEB",
34+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23a081d4-443d-4b3b-8c89-9eb0e23c961e?source=cve"
35+
}
36+
],
37+
"database_specific": {
38+
"cwe_ids": [
39+
"CWE-79"
40+
],
41+
"severity": "MODERATE",
42+
"github_reviewed": false,
43+
"github_reviewed_at": null,
44+
"nvd_published_at": "2024-11-08T10:15:03Z"
45+
}
46+
}
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-g632-g6jh-g6fg",
4+
"modified": "2024-11-08T12:31:13Z",
5+
"published": "2024-11-08T12:31:13Z",
6+
"aliases": [
7+
"CVE-2024-50590"
8+
],
9+
"details": "Attackers with local access to the medical office computer can \nescalate their Windows user privileges to \"NT AUTHORITY\\SYSTEM\" by \noverwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is \"C:\\Elefant1\" which is \nwritable for all users. In addition, the Elefant installer registers two\n Firebird database services which are running as “NT AUTHORITY\\SYSTEM”. \n\nPath: C:\\Elefant1\\Firebird_2\\bin\\fbserver.exe\n\nPath: C:\\Elefant1\\Firebird_2\\bin\\fbguard.exe\n\n\nBoth service binaries are user writable. This means that a local \nattacker can rename one of the service binaries, replace the service \nexecutable with a new executable, and then restart the system. Once the \nsystem has rebooted, the new service binary is executed as \"NT \nAUTHORITY\\SYSTEM\".",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50590"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://hasomed.de/produkte/elefant"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://r.sec-consult.com/hasomed"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [
32+
"CWE-250"
33+
],
34+
"severity": null,
35+
"github_reviewed": false,
36+
"github_reviewed_at": null,
37+
"nvd_published_at": "2024-11-08T12:15:14Z"
38+
}
39+
}
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-hggh-f6m4-4c3w",
4+
"modified": "2024-11-08T12:31:14Z",
5+
"published": "2024-11-08T12:31:14Z",
6+
"aliases": [
7+
"CVE-2024-50591"
8+
],
9+
"details": "An attacker with local access the to medical office computer can \nescalate his Windows user privileges to \"NT AUTHORITY\\SYSTEM\" by \nexploiting a command injection vulnerability in the Elefant Update \nService. The command injection can be exploited by communicating with \nthe Elefant Update Service which is running as \"SYSTEM\" via Windows \nNamed Pipes.The Elefant Software Updater (ESU) consists of two components. An ESU\n service which runs as \"NT AUTHORITY\\SYSTEM\" and an ESU tray client \nwhich communicates with the service to update or repair the installation\n and is running with user permissions. The communication is implemented \nusing named pipes. A crafted message of type \n\"MessageType.SupportServiceInfos\" can be sent to the local ESU service \nto inject commands, which are then executed as \"NT AUTHORITY\\SYSTEM\".",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50591"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://hasomed.de/produkte/elefant"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://r.sec-consult.com/hasomed"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [
32+
"CWE-77"
33+
],
34+
"severity": null,
35+
"github_reviewed": false,
36+
"github_reviewed_at": null,
37+
"nvd_published_at": "2024-11-08T12:15:14Z"
38+
}
39+
}
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-mvcm-644q-5c9p",
4+
"modified": "2024-11-08T12:31:13Z",
5+
"published": "2024-11-08T12:31:13Z",
6+
"aliases": [
7+
"CVE-2024-50589"
8+
],
9+
"details": "An unauthenticated attacker with access to the local network of the \nmedical office can query an unprotected Fast Healthcare Interoperability\n Resources (FHIR) API to get access to sensitive electronic health \nrecords (EHR).",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50589"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://hasomed.de/produkte/elefant"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://r.sec-consult.com/hasomed"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [
32+
"CWE-306"
33+
],
34+
"severity": null,
35+
"github_reviewed": false,
36+
"github_reviewed_at": null,
37+
"nvd_published_at": "2024-11-08T12:15:14Z"
38+
}
39+
}
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-p4fv-9x78-9jfq",
4+
"modified": "2024-11-08T12:31:14Z",
5+
"published": "2024-11-08T12:31:14Z",
6+
"aliases": [
7+
"CVE-2024-50593"
8+
],
9+
"details": "An attacker with local access to the medical office computer can \naccess restricted functions of the Elefant Service tool by using a \nhard-coded \"Hotline\" password in the Elefant service binary, which is shipped with the software.",
10+
"severity": [
11+
12+
],
13+
"affected": [
14+
15+
],
16+
"references": [
17+
{
18+
"type": "ADVISORY",
19+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50593"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://hasomed.de/produkte/elefant"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://r.sec-consult.com/hasomed"
28+
}
29+
],
30+
"database_specific": {
31+
"cwe_ids": [
32+
"CWE-798"
33+
],
34+
"severity": null,
35+
"github_reviewed": false,
36+
"github_reviewed_at": null,
37+
"nvd_published_at": "2024-11-08T12:15:15Z"
38+
}
39+
}
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vw47-58pm-68j7",
4+
"modified": "2024-11-08T12:31:13Z",
5+
"published": "2024-11-08T12:31:13Z",
6+
"aliases": [
7+
"CVE-2024-10325"
8+
],
9+
"details": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.6.45 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
14+
}
15+
],
16+
"affected": [
17+
18+
],
19+
"references": [
20+
{
21+
"type": "ADVISORY",
22+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10325"
23+
},
24+
{
25+
"type": "WEB",
26+
"url": "https://plugins.trac.wordpress.org/changeset/3182862"
27+
},
28+
{
29+
"type": "WEB",
30+
"url": "https://wordpress.org/plugins/header-footer-elementor/#developers"
31+
},
32+
{
33+
"type": "WEB",
34+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7773fd3a-2417-415e-97b0-735e99e62097?source=cve"
35+
}
36+
],
37+
"database_specific": {
38+
"cwe_ids": [
39+
"CWE-79"
40+
],
41+
"severity": "MODERATE",
42+
"github_reviewed": false,
43+
"github_reviewed_at": null,
44+
"nvd_published_at": "2024-11-08T12:15:14Z"
45+
}
46+
}

0 commit comments

Comments
 (0)