#ExploitObserverAlert
CVE-2019-1215
DESCRIPTION: Exploit Observer has 15 entries related to CVE-2019-1215. An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2019-1215
DESCRIPTION: Exploit Observer has 15 entries related to CVE-2019-1215. An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2020-8195
DESCRIPTION: Exploit Observer has 14 entries related to CVE-2020-8195. Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
FIRST-EPSS: 0.869420000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2020-8195
DESCRIPTION: Exploit Observer has 14 entries related to CVE-2020-8195. Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
FIRST-EPSS: 0.869420000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2019-18988
DESCRIPTION: Exploit Observer has 12 entries related to CVE-2019-18988. TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system.
FIRST-EPSS: 0.002520000
NVD-IS: 5.9
NVD-ES: 1.0
CVE-2019-18988
DESCRIPTION: Exploit Observer has 12 entries related to CVE-2019-18988. TeamViewer Desktop through 14.7.1965 allows a bypass of remote-login access control because the same key is used for different customers' installations. It used a shared AES key for all installations since at least as far back as v7.0.43148, and used it for at least OptionsPasswordAES in the current version of the product. If an attacker were to know this key, they could decrypt protect information stored in the registry or configuration files of TeamViewer. With versions before v9.x , this allowed for attackers to decrypt the Unattended Access password to the system (which allows for remote login to the system as well as headless file browsing). The latest version still uses the same key for OptionPasswordAES but appears to have changed how the Unattended Access password is stored. While in most cases an attacker requires an existing session on a system, if the registry/configuration keys were stored off of the machine (such as in a file share or online), an attacker could then decrypt the required password to login to the system.
FIRST-EPSS: 0.002520000
NVD-IS: 5.9
NVD-ES: 1.0
#ExploitObserverAlert
CVE-2023-38606
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-38606. This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
FIRST-EPSS: 0.002420000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2023-38606
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-38606. This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
FIRST-EPSS: 0.002420000
NVD-IS: 3.6
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2021-40450
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2021-40450. Win32k Elevation of Privilege Vulnerability
FIRST-EPSS: 0.005580000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2021-40450
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2021-40450. Win32k Elevation of Privilege Vulnerability
FIRST-EPSS: 0.005580000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2017-11317
DESCRIPTION: Exploit Observer has 20 entries related to CVE-2017-11317. Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
FIRST-EPSS: 0.108060000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2017-11317
DESCRIPTION: Exploit Observer has 20 entries related to CVE-2017-11317. Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
FIRST-EPSS: 0.108060000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-22047
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2022-22047. Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
FIRST-EPSS: 0.000620000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2022-22047
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2022-22047. Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
FIRST-EPSS: 0.000620000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2019-0703
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2019-0703. An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821.
FIRST-EPSS: 0.002070000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2019-0703
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2019-0703. An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821.
FIRST-EPSS: 0.002070000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2019-1315
DESCRIPTION: Exploit Observer has 18 entries related to CVE-2019-1315. An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342.
FIRST-EPSS: 0.921340000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2019-1315
DESCRIPTION: Exploit Observer has 18 entries related to CVE-2019-1315. An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342.
FIRST-EPSS: 0.921340000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2022-41082
DESCRIPTION: Exploit Observer has 94 entries related to CVE-2022-41082. Microsoft Exchange Server Remote Code Execution Vulnerability.
FIRST-EPSS: 0.969490000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2022-41082
DESCRIPTION: Exploit Observer has 94 entries related to CVE-2022-41082. Microsoft Exchange Server Remote Code Execution Vulnerability.
FIRST-EPSS: 0.969490000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2017-6736
DESCRIPTION: Exploit Observer has 9 entries related to CVE-2017-6736. The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697.
FIRST-EPSS: 0.013030000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2017-6736
DESCRIPTION: Exploit Observer has 9 entries related to CVE-2017-6736. The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697.
FIRST-EPSS: 0.013030000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2021-37415
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-37415. Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
FIRST-EPSS: 0.958200000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-37415
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-37415. Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
FIRST-EPSS: 0.958200000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-42013
DESCRIPTION: Exploit Observer has 168 entries related to CVE-2021-42013. It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
FIRST-EPSS: 0.973400000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-42013
DESCRIPTION: Exploit Observer has 168 entries related to CVE-2021-42013. It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.
FIRST-EPSS: 0.973400000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2019-1253
DESCRIPTION: Exploit Observer has 32 entries related to CVE-2019-1253. An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.
FIRST-EPSS: 0.000800000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2019-1253
DESCRIPTION: Exploit Observer has 32 entries related to CVE-2019-1253. An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.
FIRST-EPSS: 0.000800000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-28204
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2023-28204. An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
FIRST-EPSS: 0.001500000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2023-28204
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2023-28204. An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
FIRST-EPSS: 0.001500000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2021-1675
DESCRIPTION: Exploit Observer has 257 entries related to CVE-2021-1675. Windows Print Spooler Remote Code Execution Vulnerability
FIRST-EPSS: 0.962600000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2021-1675
DESCRIPTION: Exploit Observer has 257 entries related to CVE-2021-1675. Windows Print Spooler Remote Code Execution Vulnerability
FIRST-EPSS: 0.962600000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-22515
DESCRIPTION: Exploit Observer has 244 entries related to CVE-2023-22515. Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
FIRST-EPSS: 0.955290000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-22515
DESCRIPTION: Exploit Observer has 244 entries related to CVE-2023-22515. Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
FIRST-EPSS: 0.955290000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2014-0496
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2014-0496. Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
FIRST-EPSS: 0.033400000
NVD-IS: 10.0
NVD-ES: 10.0
CVE-2014-0496
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2014-0496. Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.9 and 11.x before 11.0.06 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
FIRST-EPSS: 0.033400000
NVD-IS: 10.0
NVD-ES: 10.0
#ExploitObserverAlert
CVE-2012-5054
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2012-5054. Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments.
FIRST-EPSS: 0.373400000
NVD-IS: 10.0
NVD-ES: 8.6
CVE-2012-5054
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2012-5054. Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments.
FIRST-EPSS: 0.373400000
NVD-IS: 10.0
NVD-ES: 8.6
#ExploitObserverAlert
CVE-2022-40765
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-40765. A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters.
FIRST-EPSS: 0.002010000
NVD-IS: 5.9
NVD-ES: 0.9
CVE-2022-40765
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-40765. A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker with internal network access to conduct a command-injection attack, due to insufficient restriction of URL parameters.
FIRST-EPSS: 0.002010000
NVD-IS: 5.9
NVD-ES: 0.9
#ExploitObserverAlert
CVE-2018-10562
DESCRIPTION: Exploit Observer has 18 entries related to CVE-2018-10562. An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
FIRST-EPSS: 0.974410000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2018-10562
DESCRIPTION: Exploit Observer has 18 entries related to CVE-2018-10562. An issue was discovered on Dasan GPON home routers. Command Injection can occur via the dest_host parameter in a diag_action=ping request to a GponForm/diag_Form URI. Because the router saves ping results in /tmp and transmits them to the user when the user revisits /diag.html, it's quite simple to execute commands and retrieve their output.
FIRST-EPSS: 0.974410000
NVD-IS: 5.9
NVD-ES: 3.9