#ExploitObserverAlert
CVE-2023-35885
DESCRIPTION: Exploit Observer has 10 entries related to CVE-2023-35885. CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
FIRST-EPSS: 0.022660000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-35885
DESCRIPTION: Exploit Observer has 10 entries related to CVE-2023-35885. CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
FIRST-EPSS: 0.022660000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-51771
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-51771. In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.
CVE-2023-51771
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-51771. In MicroHttpServer (aka Micro HTTP Server) through a8ab029, _ParseHeader in lib/server.c allows a one-byte recv buffer overflow via a long URI.
#ExploitObserverAlert
CVE-2019-16784
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2019-16784. In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
FIRST-EPSS: 0.000420000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2019-16784
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2019-16784. In PyInstaller before version 3.6, only on Windows, a local privilege escalation vulnerability is present in this particular case: If a software using PyInstaller in "onefile" mode is launched by a privileged user (at least more than the current one) which have his "TempPath" resolving to a world writable directory. This is the case for example if the software is launched as a service or as a scheduled task using a system account (TempPath will be C:\Windows\Temp). In order to be exploitable the software has to be (re)started after the attacker launch the exploit program, so for a service launched at startup, a service restart is needed (e.g. after a crash or an upgrade).
FIRST-EPSS: 0.000420000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2022-34268
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-34268. An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host.
CVE-2022-34268
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-34268. An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host.
#ExploitObserverAlert
CVE-2023-6710
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6710. A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low, as the cluster_manager URL should not be exposed outside and is protected by user/password.
FIRST-EPSS: 0.000430000
NVD-IS: 2.7
NVD-ES: 2.3
CVE-2023-6710
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6710. A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page. The impact of this vulnerability is considered as Low, as the cluster_manager URL should not be exposed outside and is protected by user/password.
FIRST-EPSS: 0.000430000
NVD-IS: 2.7
NVD-ES: 2.3
#ExploitObserverAlert
CVE-2022-39818
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-39818. In NOKIA NFM-T R19.9, an OS Command Injection vulnerability occurs in /cgi-bin/R19.9/log.pl of the VM Manager WebUI via the cmd HTTP GET parameter. This allows authenticated users to execute commands, with root privileges, on the operating system.
CVE-2022-39818
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-39818. In NOKIA NFM-T R19.9, an OS Command Injection vulnerability occurs in /cgi-bin/R19.9/log.pl of the VM Manager WebUI via the cmd HTTP GET parameter. This allows authenticated users to execute commands, with root privileges, on the operating system.
#ExploitObserverAlert
CVE-2023-26035
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2023-26035. ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.
FIRST-EPSS: 0.104040000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-26035
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2023-26035. ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are vulnerable to Unauthenticated Remote Code Execution via Missing Authorization. There are no permissions check on the snapshot action, which expects an id to fetch an existing monitor but can be passed an object to create a new one instead. TriggerOn ends up calling shell_exec using the supplied Id. This issue is fixed in This issue is fixed in versions 1.36.33 and 1.37.33.
FIRST-EPSS: 0.104040000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-39822
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-39822. In NOKIA NFM-T R19.9, a SQL Injection vulnerability occurs in /cgi-bin/R19.9/easy1350.pl of the VM Manager WebUI via the id or host HTTP GET parameter. An authenticated attacker is required for exploitation.
CVE-2022-39822
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-39822. In NOKIA NFM-T R19.9, a SQL Injection vulnerability occurs in /cgi-bin/R19.9/easy1350.pl of the VM Manager WebUI via the id or host HTTP GET parameter. An authenticated attacker is required for exploitation.
#ExploitObserverAlert
CVE-2016-15036
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2016-15036. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Deis Workflow Manager up to 2.3.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to race condition. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.3.3 is able to address this issue. The patch is named 31fe3bccbdde134a185752e53380330d16053f7f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248847. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2016-15036
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2016-15036. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Deis Workflow Manager up to 2.3.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to race condition. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.3.3 is able to address this issue. The patch is named 31fe3bccbdde134a185752e53380330d16053f7f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248847. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
#ExploitObserverAlert
CVE-2022-41760
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41760. An issue was discovered in NOKIA NFM-T R19.9. Relative Path Traversal can occur under /oms1350/data/cpb/log of the Network Element Manager via the filename parameter, allowing a remote authenticated attacker to read arbitrary files.
CVE-2022-41760
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41760. An issue was discovered in NOKIA NFM-T R19.9. Relative Path Traversal can occur under /oms1350/data/cpb/log of the Network Element Manager via the filename parameter, allowing a remote authenticated attacker to read arbitrary files.
#ExploitObserverAlert
CVE-2023-49954
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-49954. The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address.
CVE-2023-49954
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-49954. The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address.
#ExploitObserverAlert
CVE-2022-41762
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41762. An issue was discovered in NOKIA NFM-T R19.9. Multiple Reflected XSS vulnerabilities exist in the Network Element Manager via any parameter to log.pl, the bench or pid parameter to top.pl, or the id parameter to easy1350.pl.
CVE-2022-41762
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41762. An issue was discovered in NOKIA NFM-T R19.9. Multiple Reflected XSS vulnerabilities exist in the Network Element Manager via any parameter to log.pl, the bench or pid parameter to top.pl, or the id parameter to easy1350.pl.
#ExploitObserverAlert
PD/http/cves/2015/CVE-2015-2794
DESCRIPTION: Exploit Observer has 10 entries related to PD/http/cves/2015/CVE-2015-2794. The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.
PD/http/cves/2015/CVE-2015-2794
DESCRIPTION: Exploit Observer has 10 entries related to PD/http/cves/2015/CVE-2015-2794. The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.
#ExploitObserverAlert
CVE-2023-24955
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-24955. Microsoft SharePoint Server Remote Code Execution Vulnerability
FIRST-EPSS: 0.359560000
NVD-IS: 5.9
NVD-ES: 1.2
CVE-2023-24955
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-24955. Microsoft SharePoint Server Remote Code Execution Vulnerability
FIRST-EPSS: 0.359560000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert
PD/http/cves/2023/CVE-2023-42343
DESCRIPTION: Exploit Observer has 1 entries related to PD/http/cves/2023/CVE-2023-42343. OpenCMS below 10.5.1 is vulnerable to Cross-Site Scripting vulnerability.
PD/http/cves/2023/CVE-2023-42343
DESCRIPTION: Exploit Observer has 1 entries related to PD/http/cves/2023/CVE-2023-42343. OpenCMS below 10.5.1 is vulnerable to Cross-Site Scripting vulnerability.
#ExploitObserverAlert
GHSA-rxg7-fjph-p5j8
DESCRIPTION: Exploit Observer has 4 entries related to GHSA-RXG7-FJPH-P5J8. Synaman v5.1 and below was discovered to contain weak file permissions which allows authenticated attackers to escalate privileges.
GHSS: 7.8
GHSA-rxg7-fjph-p5j8
DESCRIPTION: Exploit Observer has 4 entries related to GHSA-RXG7-FJPH-P5J8. Synaman v5.1 and below was discovered to contain weak file permissions which allows authenticated attackers to escalate privileges.
GHSS: 7.8
#ExploitObserverAlert
CVE-2018-17552
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2018-17552. SQL Injection in login.php in Naviwebs Navigate CMS 2.8 allows remote attackers to bypass authentication via the navigate-user cookie.
FIRST-EPSS: 0.296770000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2018-17552
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2018-17552. SQL Injection in login.php in Naviwebs Navigate CMS 2.8 allows remote attackers to bypass authentication via the navigate-user cookie.
FIRST-EPSS: 0.296770000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-49003
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49003. An issue in simplemobiletools Simple Dialer 5.18.1 allows an attacker to bypass intended access restrictions via interaction with com.simplemobiletools.dialer.activities.DialerActivity.
CVE-2023-49003
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49003. An issue in simplemobiletools Simple Dialer 5.18.1 allows an attacker to bypass intended access restrictions via interaction with com.simplemobiletools.dialer.activities.DialerActivity.
#ExploitObserverAlert
GHSA-cq97-7vrx-7chg
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-CQ97-7VRX-7CHG. A SQL injection vulnerability exists in the “notes view” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
GHSS: 8.8
GHSA-cq97-7vrx-7chg
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-CQ97-7VRX-7CHG. A SQL injection vulnerability exists in the “notes view” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
GHSS: 8.8
#ExploitObserverAlert
CVE-2023-49001
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49001. An issue in Indi Browser (aka kvbrowser) v.12.11.23 allows an attacker to bypass intended access restrictions via interaction with the com.example.gurry.kvbrowswer.webview component.
CVE-2023-49001
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49001. An issue in Indi Browser (aka kvbrowser) v.12.11.23 allows an attacker to bypass intended access restrictions via interaction with the com.example.gurry.kvbrowswer.webview component.
#ExploitObserverAlert
GHSA-f5vv-hcgf-xvxq
DESCRIPTION: Exploit Observer has 5 entries related to GHSA-F5VV-HCGF-XVXQ. Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).
GHSA-f5vv-hcgf-xvxq
DESCRIPTION: Exploit Observer has 5 entries related to GHSA-F5VV-HCGF-XVXQ. Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).