Page 20 of 5444 results (0.021 seconds)

CVSS: 8.7EPSS: 0%CPEs: -EXPL: 0

12 Nov 2024 — Cross Site Scripting vulnerability in Snipe-IT v.7.0.13 allows a remote attacker to escalate privileges via an unknown part of the file /users/{{user-id}}/#files. ... This can lead to privilege escalation when the payload is executed, granting the attacker super admin permissions within the Snipe-IT system. • https://gist.githubusercontent.com/Tommywarren/ca70f1c43f4ec34dc19cd13459535780/raw/d13192ae50bc7c024b922412dfa3f530faa8d5db/CVE-2024-51093 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

12 Nov 2024 — An issue in Snipe-IT v.7.0.13 build 15514 allows a remote attacker to escalate privileges via the file /account/profile of the component "Name" field value under "Edit Your Profile". • https://gist.githubusercontent.com/Tommywarren/b3a6c6ae5a93dd67c863313f71f53a76/raw/ddff8cbbab5179f680ba3f5e94fc080575ad8913/CVE-2024-51094 • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Nov 2024 — G DATA Total Security Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. This vulnerability allows local attackers to escalate privileges on affected installations of G DATA Total Security. ... An attacker can leverage this vulnerability to escalate privileges and execute a... • https://www.zerodayinitiative.com/advisories/ZDI-24-1486 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 1

08 Nov 2024 — An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a race condition in the Elefant Update Service during the repair or update process. ... • https://packetstorm.news/files/id/182564 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

08 Nov 2024 — An attacker with local access to the medical office computer can access restricted functions of the Elefant Service tool by using a hard-coded "Hotline" password in the Elefant service binary, which is shipped with the software. Un atacante con acceso local a el ordenador del consultorio médico puede acceder a funciones restringidas de la herramienta de servicio Elefant mediante el uso de una contraseña de "línea directa" codificada en el binario del servicio Elefant, que se envía con el softw... • https://packetstorm.news/files/id/182564 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

08 Nov 2024 — An attacker with local access the to medical office computer can escalate his Windows user privileges to "NT AUTHORITY\SYSTEM" by exploiting a command injection vulnerability in the Elefant Update Service. ... A crafted message of type "MessageType.SupportServiceInfos" can be sent to the local ESU service to inject commands, which are then executed as "NT AUTHORITY\SYSTEM". Un atacante con acceso local al equipo del consultorio médico puede escalar sus privilegios de usuario de Windows ... • https://packetstorm.news/files/id/182564 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

08 Nov 2024 — Attackers with local access to the medical office computer can escalate their Windows user privileges to "NT AUTHORITY\SYSTEM" by overwriting one of two Elefant service binaries with weak permissions. ... This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and then restart the system. This means that a local attacker can rename one of the service binaries, replace the service executable with a new executable, and... • https://packetstorm.news/files/id/182564 • CWE-250: Execution with Unnecessary Privileges CWE-276: Incorrect Default Permissions CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

08 Nov 2024 — An unauthenticated attacker with access to the local network of the medical office can query an unprotected Fast Healthcare Interoperability Resources (FHIR) API to get access to sensitive electronic health records (EHR). Un atacante no autenticado con acceso a la red local del consultorio médico puede consultar una API de recursos de interoperabilidad rápida de atención médica (FHIR) desprotegida para obtener acceso a registros médicos electrónicos (EHR) confidenciales. HASOMED Elefant versio... • https://packetstorm.news/files/id/182564 • CWE-306: Missing Authentication for Critical Function •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

08 Nov 2024 — An unauthenticated attacker with access to the local network of the medical office can use known default credentials to gain remote DBA access to the Elefant Firebird database. ... Un atacante no autenticado con acceso a la red local del consultorio médico puede utilizar credenciales predeterminadas conocidas para obtener acceso remoto de administrador de base de datos a la base de datos Firebird de Elefant. ... HASOMED Elefant versions prior to 24.04.00 and Elefant Software Updater versions p... • https://packetstorm.news/files/id/182564 • CWE-419: Unprotected Primary Channel CWE-1393: Use of Default Password •

CVSS: 6.8EPSS: 0%CPEs: -EXPL: 0

08 Nov 2024 — An incorrect access control issue in Life: Personal Diary, Journal android app 17.5.0 allows a physically proximate attacker to escalate privileges via the fingerprint authentication function. • https://play.google.com/store/apps/details?id=com.hitbytes.minidiarynotes •