#ExploitObserverAlert
CVE-2022-44589
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-44589. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in miniOrange miniOrange's Google Authenticator – WordPress Two Factor Authentication – 2FA , Two Factor, OTP SMS and Email | Passwordless login.This issue affects miniOrange's Google Authenticator – WordPress Two Factor Authentication – 2FA , Two Factor, OTP SMS and Email | Passwordless login: from n/a through 5.6.1.
CVE-2022-44589
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-44589. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in miniOrange miniOrange's Google Authenticator – WordPress Two Factor Authentication – 2FA , Two Factor, OTP SMS and Email | Passwordless login.This issue affects miniOrange's Google Authenticator – WordPress Two Factor Authentication – 2FA , Two Factor, OTP SMS and Email | Passwordless login: from n/a through 5.6.1.
#ExploitObserverAlert
CVE-2023-47840
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47840. Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.
CVE-2023-47840
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47840. Improper Control of Generation of Code ('Code Injection') vulnerability in Qode Interactive Qode Essential Addons.This issue affects Qode Essential Addons: from n/a through 1.5.2.
#ExploitObserverAlert
CVE-2023-7142
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7142. A vulnerability was found in code-projects Client Details System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/clientview.php. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249145 was assigned to this vulnerability.
CVE-2023-7142
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7142. A vulnerability was found in code-projects Client Details System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/clientview.php. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249145 was assigned to this vulnerability.
#ExploitObserverAlert
CVE-2023-7131
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7131. A vulnerability was found in code-projects Intern Membership Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user_registration/ of the component User Registration. The manipulation of the argument userName leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249134 is the identifier assigned to this vulnerability.
CVE-2023-7131
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7131. A vulnerability was found in code-projects Intern Membership Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user_registration/ of the component User Registration. The manipulation of the argument userName leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249134 is the identifier assigned to this vulnerability.
#ExploitObserverAlert
CVE-2023-7143
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7143. A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability.
CVE-2023-7143
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7143. A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability.
#ExploitObserverAlert
CVE-2023-7140
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7140. A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143.
CVE-2023-7140
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7140. A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143.
#ExploitObserverAlert
CVE-2023-46918
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-46918. Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus has an Android manifest file that contains an entry with the android:allowBackup attribute set to true. This could be leveraged by an attacker with physical access to the device.
CVE-2023-46918
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-46918. Phlox com.phlox.simpleserver.plus (aka Simple HTTP Server PLUS) 1.8.1-plus has an Android manifest file that contains an entry with the android:allowBackup attribute set to true. This could be leveraged by an attacker with physical access to the device.
#ExploitObserverAlert
CVE-2022-36399
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-36399. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BoxyStudio Booked - Appointment Booking for WordPress | Calendars.This issue affects Booked - Appointment Booking for WordPress | Calendars: from n/a before 2.4.4.
CVE-2022-36399
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-36399. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BoxyStudio Booked - Appointment Booking for WordPress | Calendars.This issue affects Booked - Appointment Booking for WordPress | Calendars: from n/a before 2.4.4.
#ExploitObserverAlert
CVE-2020-17163
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2020-17163. Visual Studio Code Python Extension Remote Code Execution Vulnerability
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2020-17163
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2020-17163. Visual Studio Code Python Extension Remote Code Execution Vulnerability
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-35985
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-35985. An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
FIRST-EPSS: 0.001540000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-35985
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-35985. An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
FIRST-EPSS: 0.001540000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-41109
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41109. SmartNode SN200 (aka SN200) 3.21.2-23021 allows unauthenticated OS Command Injection.
FIRST-EPSS: 0.000900000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-41109
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41109. SmartNode SN200 (aka SN200) 3.21.2-23021 allows unauthenticated OS Command Injection.
FIRST-EPSS: 0.000900000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-7141
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7141. A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144.
CVE-2023-7141
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7141. A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144.
#ExploitObserverAlert
CVE-2023-7139
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7139. A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability.
CVE-2023-7139
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7139. A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability.
#ExploitObserverAlert
CVE-2023-47882
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47882. The Kami Vision YI IoT com.yunyi.smartcamera application through 4.1.9_20231127 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.ants360.yicamera.activity.WebViewActivity component.
CVE-2023-47882
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47882. The Kami Vision YI IoT com.yunyi.smartcamera application through 4.1.9_20231127 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.ants360.yicamera.activity.WebViewActivity component.
#ExploitObserverAlert
CVE-2022-46487
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2022-46487. Improper initialization of x87 and SSE floating-point configuration registers in the __scone_entry component of SCONE before 5.8.0 for Intel SGX allows a local attacker to compromise the execution integrity of floating-point operations in an enclave or access sensitive information via side-channel analysis.
CVE-2022-46487
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2022-46487. Improper initialization of x87 and SSE floating-point configuration registers in the __scone_entry component of SCONE before 5.8.0 for Intel SGX allows a local attacker to compromise the execution integrity of floating-point operations in an enclave or access sensitive information via side-channel analysis.
#ExploitObserverAlert
CVE-2023-35813
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2023-35813. Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
FIRST-EPSS: 0.271060000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-35813
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2023-35813. Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
FIRST-EPSS: 0.271060000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-3028
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-3028. Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too. Multiple vulnerabilities were identified: - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker. - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend. - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location. - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend. The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.
FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-3028
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-3028. Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too. Multiple vulnerabilities were identified: - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker. - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend. - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location. - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend. The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.
FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-46901
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-46901. examples/6lbr/apps/6lbr-webserver/httpd.c in CETIC-6LBR (aka 6lbr) 1.5.0 has a strcat stack-based buffer overflow via a request for a long URL over a 6LoWPAN network.
CVE-2021-46901
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-46901. examples/6lbr/apps/6lbr-webserver/httpd.c in CETIC-6LBR (aka 6lbr) 1.5.0 has a strcat stack-based buffer overflow via a request for a long URL over a 6LoWPAN network.
#ExploitObserverAlert
CVE-2023-2744
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2744. The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
FIRST-EPSS: 0.000790000
NVD-IS: 5.9
NVD-ES: 1.2
CVE-2023-2744
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2744. The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
FIRST-EPSS: 0.000790000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert
CVE-2016-5535
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2016-5535. Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.0, and 12.2.1.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
FIRST-EPSS: 0.038410000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2016-5535
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2016-5535. Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.0, and 12.2.1.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
FIRST-EPSS: 0.038410000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-46486
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2022-46486. A lack of pointer-validation logic in the __scone_dispatch component of SCONE before v5.8.0 for Intel SGX allows attackers to access sensitive information.
CVE-2022-46486
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2022-46486. A lack of pointer-validation logic in the __scone_dispatch component of SCONE before v5.8.0 for Intel SGX allows attackers to access sensitive information.