#ExploitObserverAlert
CVE-2015-5897
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2015-5897. The Address Book framework in Apple OS X before 10.11 allows local users to gain privileges by using an environment variable to inject code into processes that rely on this framework.
FIRST-EPSS: 0.000420000
NVD-IS: 6.4
NVD-ES: 3.9
CVE-2015-5897
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2015-5897. The Address Book framework in Apple OS X before 10.11 allows local users to gain privileges by using an environment variable to inject code into processes that rely on this framework.
FIRST-EPSS: 0.000420000
NVD-IS: 6.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2020-13849
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-13849. The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
FIRST-EPSS: 0.002050000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2020-13849
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-13849. The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
FIRST-EPSS: 0.002050000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2018-25096
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2018-25096. A vulnerability was found in MdAlAmin-aol Own Health Record 0.1-alpha/0.2-alpha/0.3-alpha/0.3.1-alpha. It has been rated as problematic. This issue affects some unknown processing of the file includes/logout.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 0.4-alpha is able to address this issue. The patch is named 58b413aa40820b49070782c786c526850ab7748f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-249191.
CVE-2018-25096
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2018-25096. A vulnerability was found in MdAlAmin-aol Own Health Record 0.1-alpha/0.2-alpha/0.3-alpha/0.3.1-alpha. It has been rated as problematic. This issue affects some unknown processing of the file includes/logout.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 0.4-alpha is able to address this issue. The patch is named 58b413aa40820b49070782c786c526850ab7748f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-249191.
#ExploitObserverAlert
CVE-2021-0229
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0229. An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (JET) application designed with a listening port uses the Message Queue Telemetry Transport (MQTT) protocol to connect to a mosquitto broker that is running on Junos OS to subscribe for events. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 16.1R1 and later versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1.
FIRST-EPSS: 0.000810000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2021-0229
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0229. An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (JET) application designed with a listening port uses the Message Queue Telemetry Transport (MQTT) protocol to connect to a mosquitto broker that is running on Junos OS to subscribe for events. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 16.1R1 and later versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1.
FIRST-EPSS: 0.000810000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2019-12480
DESCRIPTION: Exploit Observer has 10 entries related to CVE-2019-12480. BACnet Protocol Stack through 0.8.6 has a segmentation fault leading to denial of service in BACnet APDU Layer because a malformed DCC in AtomicWriteFile, AtomicReadFile and DeviceCommunicationControl services. An unauthenticated remote attacker could cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers.
FIRST-EPSS: 0.064880000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2019-12480
DESCRIPTION: Exploit Observer has 10 entries related to CVE-2019-12480. BACnet Protocol Stack through 0.8.6 has a segmentation fault leading to denial of service in BACnet APDU Layer because a malformed DCC in AtomicWriteFile, AtomicReadFile and DeviceCommunicationControl services. An unauthenticated remote attacker could cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers.
FIRST-EPSS: 0.064880000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-51467
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2023-51467. The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)
CVE-2023-51467
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2023-51467. The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)
#ExploitObserverAlert
CVE-2015-3785
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2015-3785. The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.
FIRST-EPSS: 0.000420000
NVD-IS: 2.9
NVD-ES: 3.4
CVE-2015-3785
DESCRIPTION: Exploit Observer has 5 entries related to CVE-2015-3785. The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.
FIRST-EPSS: 0.000420000
NVD-IS: 2.9
NVD-ES: 3.4
#ExploitObserverAlert
GHSA-pvvf-569h-5779
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-PVVF-569H-5779. Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability
GHSA-pvvf-569h-5779
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-PVVF-569H-5779. Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability
#ExploitObserverAlert
GHSA-mp2m-2429-rgfv
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-MP2M-2429-RGFV. An issue in Netgate pfSense v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the interfaces_gif_edit.php and interfaces_gre_edit.php components.
GHSS: 8.8
GHSA-mp2m-2429-rgfv
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-MP2M-2429-RGFV. An issue in Netgate pfSense v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the interfaces_gif_edit.php and interfaces_gre_edit.php components.
GHSS: 8.8
#ExploitObserverAlert
GHSA-p7q7-p4xf-xrpf
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-P7Q7-P4XF-XRPF. The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality.
GHSS: 7.5
GHSA-p7q7-p4xf-xrpf
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-P7Q7-P4XF-XRPF. The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality.
GHSS: 7.5
#ExploitObserverAlert
GHSA-m5xw-3jph-chxg
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-M5XW-3JPH-CHXG. Transient DOS in Modem after RRC Setup message is received.
GHSS: 7.5
GHSA-m5xw-3jph-chxg
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-M5XW-3JPH-CHXG. Transient DOS in Modem after RRC Setup message is received.
GHSS: 7.5
#ExploitObserverAlert
CVE-2023-50096
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50096. STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
CVE-2023-50096
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50096. STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
#ExploitObserverAlert
CVE-2023-41942
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-41942. A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2023-41942
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-41942. A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-42425
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-42425. An issue in Turing Video Turing Edge+ EVC5FD v.1.38.6 allows remote attacker to execute arbitrary code and obtain sensitive information via the cloud connection components.
FIRST-EPSS: 0.002330000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-42425
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-42425. An issue in Turing Video Turing Edge+ EVC5FD v.1.38.6 allows remote attacker to execute arbitrary code and obtain sensitive information via the cloud connection components.
FIRST-EPSS: 0.002330000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-43885
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-43885. Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device.
FIRST-EPSS: 0.000450000
NVD-IS: 5.2
NVD-ES: 2.8
CVE-2023-43885
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-43885. Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device.
FIRST-EPSS: 0.000450000
NVD-IS: 5.2
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-24588
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-24588. Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.
FIRST-EPSS: 0.000540000
NVD-IS: 3.6
NVD-ES: 0.9
CVE-2023-24588
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-24588. Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.
FIRST-EPSS: 0.000540000
NVD-IS: 3.6
NVD-ES: 0.9
#ExploitObserverAlert
CVE-2023-6792
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6792. An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
FIRST-EPSS: 0.000420000
NVD-IS: 3.4
NVD-ES: 2.8
CVE-2023-6792
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6792. An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
FIRST-EPSS: 0.000420000
NVD-IS: 3.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-3740
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3740. Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)
FIRST-EPSS: 0.000880000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2023-3740
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3740. Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)
FIRST-EPSS: 0.000880000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-36881
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36881. Azure Apache Ambari Spoofing Vulnerability
FIRST-EPSS: 0.000510000
NVD-IS: 3.6
NVD-ES: 0.9
CVE-2023-36881
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36881. Azure Apache Ambari Spoofing Vulnerability
FIRST-EPSS: 0.000510000
NVD-IS: 3.6
NVD-ES: 0.9
#ExploitObserverAlert
CVE-2023-23552
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-23552. On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-23552
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-23552. On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-48312
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-48312. capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.
FIRST-EPSS: 0.000610000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-48312
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-48312. capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.
FIRST-EPSS: 0.000610000
NVD-IS: 5.9
NVD-ES: 3.9