#ExploitObserverAlert
GHSA-m5xw-3jph-chxg
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-M5XW-3JPH-CHXG. Transient DOS in Modem after RRC Setup message is received.
GHSS: 7.5
GHSA-m5xw-3jph-chxg
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-M5XW-3JPH-CHXG. Transient DOS in Modem after RRC Setup message is received.
GHSS: 7.5
#ExploitObserverAlert
CVE-2023-50096
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50096. STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
CVE-2023-50096
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50096. STMicroelectronics STSAFE-A1xx middleware before 3.3.7 allows MCU code execution if an adversary has the ability to read from and write to the I2C bus. This is caused by an StSafeA_ReceiveBytes buffer overflow in the X-CUBE-SAFEA1 Software Package for STSAFE-A sample applications (1.2.0), and thus can affect user-written code that was derived from a published sample application.
#ExploitObserverAlert
CVE-2023-41942
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-41942. A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2023-41942
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-41942. A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-42425
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-42425. An issue in Turing Video Turing Edge+ EVC5FD v.1.38.6 allows remote attacker to execute arbitrary code and obtain sensitive information via the cloud connection components.
FIRST-EPSS: 0.002330000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-42425
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-42425. An issue in Turing Video Turing Edge+ EVC5FD v.1.38.6 allows remote attacker to execute arbitrary code and obtain sensitive information via the cloud connection components.
FIRST-EPSS: 0.002330000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-43885
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-43885. Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device.
FIRST-EPSS: 0.000450000
NVD-IS: 5.2
NVD-ES: 2.8
CVE-2023-43885
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-43885. Missing error handling in the HTTP server component of Tenda RX9 Pro Firmware V22.03.02.20 allows authenticated attackers to arbitrarily lock the device.
FIRST-EPSS: 0.000450000
NVD-IS: 5.2
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-24588
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-24588. Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.
FIRST-EPSS: 0.000540000
NVD-IS: 3.6
NVD-ES: 0.9
CVE-2023-24588
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-24588. Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.
FIRST-EPSS: 0.000540000
NVD-IS: 3.6
NVD-ES: 0.9
#ExploitObserverAlert
CVE-2023-6792
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6792. An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
FIRST-EPSS: 0.000420000
NVD-IS: 3.4
NVD-ES: 2.8
CVE-2023-6792
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6792. An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
FIRST-EPSS: 0.000420000
NVD-IS: 3.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-3740
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3740. Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)
FIRST-EPSS: 0.000880000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2023-3740
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3740. Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)
FIRST-EPSS: 0.000880000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-36881
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36881. Azure Apache Ambari Spoofing Vulnerability
FIRST-EPSS: 0.000510000
NVD-IS: 3.6
NVD-ES: 0.9
CVE-2023-36881
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36881. Azure Apache Ambari Spoofing Vulnerability
FIRST-EPSS: 0.000510000
NVD-IS: 3.6
NVD-ES: 0.9
#ExploitObserverAlert
CVE-2023-23552
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-23552. On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-23552
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-23552. On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-48312
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-48312. capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.
FIRST-EPSS: 0.000610000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-48312
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-48312. capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade.
FIRST-EPSS: 0.000610000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-27915
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-27915. A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
FIRST-EPSS: 0.000550000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2023-27915
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-27915. A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
FIRST-EPSS: 0.000550000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
GHSA-gc57-xhh5-m94r
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-GC57-XHH5-M94R. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, currently it is only checked if the user has permission to view the collaboration.
GHSS: 5.4
GHSA-gc57-xhh5-m94r
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-GC57-XHH5-M94R. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, currently it is only checked if the user has permission to view the collaboration.
GHSS: 5.4
#ExploitObserverAlert
CVE-2023-30517
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-30517. Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-30517
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-30517. Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-6105
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6105. An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2023-6105
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-6105. An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database.
FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 1.8
#ExploitObserverAlert
GHSA-whj9-m24x-qhhp
DESCRIPTION: Exploit Observer has 4 entries related to GHSA-WHJ9-M24X-QHHP. Before 2.6.3
GHSS: 6.2
GHSA-whj9-m24x-qhhp
DESCRIPTION: Exploit Observer has 4 entries related to GHSA-WHJ9-M24X-QHHP. Before 2.6.3
GHSS: 6.2
#ExploitObserverAlert
CVE-2023-49447
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49447. JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/update.
FIRST-EPSS: 0.000580000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-49447
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49447. JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/nav/update.
FIRST-EPSS: 0.000580000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-21993
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-21993. Vulnerability in the Oracle Clinical Remote Data Capture product of Oracle Health Sciences Applications (component: Forms). The supported version that is affected is 5.4.0.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Clinical Remote Data Capture. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Clinical Remote Data Capture accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
FIRST-EPSS: 0.000470000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2023-21993
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-21993. Vulnerability in the Oracle Clinical Remote Data Capture product of Oracle Health Sciences Applications (component: Forms). The supported version that is affected is 5.4.0.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Clinical Remote Data Capture. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Clinical Remote Data Capture accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
FIRST-EPSS: 0.000470000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-36720
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36720. Windows Mixed Reality Developer Tools Denial of Service Vulnerability
FIRST-EPSS: 0.000990000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-36720
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36720. Windows Mixed Reality Developer Tools Denial of Service Vulnerability
FIRST-EPSS: 0.000990000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-49819
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49819. Deserialization of Untrusted Data vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-49819
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49819. Deserialization of Untrusted Data vulnerability in Gordon Böhme, Antonio Leutsch Structured Content (JSON-LD) #wpsc.This issue affects Structured Content (JSON-LD) #wpsc: from n/a through 1.5.3.
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-43645
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-43645. OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA is vulnerable to a denial of service attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. Users are advised to upgrade to v1.3.2 and update any offending models. There are no known workarounds for this vulnerability. Note that for models which contained cycles or a relation definition that has the relation itself in its evaluation path, checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. Users who do not have cyclic models are unaffected.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 2.2
CVE-2023-43645
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-43645. OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA is vulnerable to a denial of service attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. Users are advised to upgrade to v1.3.2 and update any offending models. There are no known workarounds for this vulnerability. Note that for models which contained cycles or a relation definition that has the relation itself in its evaluation path, checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. Users who do not have cyclic models are unaffected.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 2.2