Skip to content

Commit

Permalink
generated content from 2024-11-08
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Nov 8, 2024
1 parent de23c6d commit 25e878f
Show file tree
Hide file tree
Showing 4 changed files with 69 additions and 0 deletions.
3 changes: 3 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -255119,3 +255119,6 @@ vulnerability,CVE-2024-24409,vulnerability--03c31f43-992c-4964-8f42-1006fad16f44
vulnerability,CVE-2024-50588,vulnerability--9b21218e-e09b-4eed-b0dc-2aa283ac6f0d
vulnerability,CVE-2024-10187,vulnerability--06dc9e43-b580-46c3-98ce-0d947bf05910
vulnerability,CVE-2024-10839,vulnerability--65e424bf-4861-4f11-b246-e538bece38cf
vulnerability,CVE-2024-10325,vulnerability--c52dda2f-108b-490a-8f16-d9debeac22d8
vulnerability,CVE-2024-50589,vulnerability--ce32df52-6716-42c2-b8d2-ec2190644313
vulnerability,CVE-2024-50590,vulnerability--520848d2-e8a6-4286-b2a4-d0a02828d788
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--fe978c39-c12c-4cd9-8bf8-2aa9650271e0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--520848d2-e8a6-4286-b2a4-d0a02828d788",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-08T12:36:47.467402Z",
"modified": "2024-11-08T12:36:47.467402Z",
"name": "CVE-2024-50590",
"description": "Attackers with local access to the medical office computer can \nescalate their Windows user privileges to \"NT AUTHORITY\\SYSTEM\" by \noverwriting one of two Elefant service binaries with weak permissions. The default installation directory of Elefant is \"C:\\Elefant1\" which is \nwritable for all users. In addition, the Elefant installer registers two\n Firebird database services which are running as “NT AUTHORITY\\SYSTEM”. \n\nPath: C:\\Elefant1\\Firebird_2\\bin\\fbserver.exe\n\nPath: C:\\Elefant1\\Firebird_2\\bin\\fbguard.exe\n\n\nBoth service binaries are user writable. This means that a local \nattacker can rename one of the service binaries, replace the service \nexecutable with a new executable, and then restart the system. Once the \nsystem has rebooted, the new service binary is executed as \"NT \nAUTHORITY\\SYSTEM\".",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50590"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a6b4465a-4f72-44dd-b853-392812da2253",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c52dda2f-108b-490a-8f16-d9debeac22d8",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-08T12:36:47.242667Z",
"modified": "2024-11-08T12:36:47.242667Z",
"name": "CVE-2024-10325",
"description": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG File uploads in all versions up to, and including, 1.6.45 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-10325"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--6ecdf723-a748-4e61-a3ba-627d83934ea8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--ce32df52-6716-42c2-b8d2-ec2190644313",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2024-11-08T12:36:47.455101Z",
"modified": "2024-11-08T12:36:47.455101Z",
"name": "CVE-2024-50589",
"description": "An unauthenticated attacker with access to the local network of the \nmedical office can query an unprotected Fast Healthcare Interoperability\n Resources (FHIR) API to get access to sensitive electronic health \nrecords (EHR).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-50589"
}
]
}
]
}

0 comments on commit 25e878f

Please sign in to comment.