#ExploitObserverAlert
GHSA-7x4v-9gxg-9hwj
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-7X4V-9GXG-9HWJ. When running with XLA, tf.raw_ops.Bincount segfaults when given a parameter weights that is neither the same shape as parameter arr nor a length-0 tensor.
GHSS: 7.5
GHSA-7x4v-9gxg-9hwj
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-7X4V-9GXG-9HWJ. When running with XLA, tf.raw_ops.Bincount segfaults when given a parameter weights that is neither the same shape as parameter arr nor a length-0 tensor.
GHSS: 7.5
#ExploitObserverAlert
CVE-2023-47079
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47079. Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
FIRST-EPSS: 0.001240000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2023-47079
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47079. Adobe Dimension versions 3.4.10 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
FIRST-EPSS: 0.001240000
NVD-IS: 3.6
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-3834
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-3834. A vulnerability was found in Bug Finder EX-RATE 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2023-3834
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-3834. A vulnerability was found in Bug Finder EX-RATE 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-44991
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-44991. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Media File Renamer: Rename Files (Manual, Auto & AI).This issue affects Media File Renamer: Rename Files (Manual, Auto & AI): from n/a through 5.6.9.
FIRST-EPSS: 0.000870000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-44991
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-44991. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Jordy Meow Media File Renamer: Rename Files (Manual, Auto & AI).This issue affects Media File Renamer: Rename Files (Manual, Auto & AI): from n/a through 5.6.9.
FIRST-EPSS: 0.000870000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-32998
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32998. A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
FIRST-EPSS: 0.000580000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-32998
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32998. A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
FIRST-EPSS: 0.000580000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-3874
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3874. A vulnerability, which was classified as critical, was found in Campcodes Beauty Salon Management System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235236.
FIRST-EPSS: 0.000640000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-3874
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3874. A vulnerability, which was classified as critical, was found in Campcodes Beauty Salon Management System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235236.
FIRST-EPSS: 0.000640000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-3457
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3457. A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232674 is the identifier assigned to this vulnerability.
FIRST-EPSS: 0.000770000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-3457
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-3457. A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232674 is the identifier assigned to this vulnerability.
FIRST-EPSS: 0.000770000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-40756
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-40756. User enumeration is found in PHPJabbers Callback Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-40756
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-40756. User enumeration is found in PHPJabbers Callback Widget v1.0. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-21065
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-21065. In fdt_next_tag of fdt.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630493References: N/A
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 0.8
CVE-2023-21065
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-21065. In fdt_next_tag of fdt.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630493References: N/A
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 0.8
#ExploitObserverAlert
CVE-2023-28576
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28576. The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.0
CVE-2023-28576
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-28576. The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.0
#ExploitObserverAlert
CVE-2023-35638
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-35638. DHCP Server Service Denial of Service Vulnerability
FIRST-EPSS: 0.000690000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-35638
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-35638. DHCP Server Service Denial of Service Vulnerability
FIRST-EPSS: 0.000690000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
GHSA-p6p2-qq95-vq5h
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-P6P2-QQ95-VQ5H. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code.
GHSS: 8.8
GHSA-p6p2-qq95-vq5h
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-P6P2-QQ95-VQ5H. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code.
GHSS: 8.8
#ExploitObserverAlert
CVE-2023-46660
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46660. Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token hashes are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-46660
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-46660. Jenkins Zanata Plugin 0.6 and earlier uses a non-constant time comparison function when checking whether the provided and expected webhook token hashes are equal, potentially allowing attackers to use statistical methods to obtain a valid webhook token.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-43496
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-43496. Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
FIRST-EPSS: 0.000550000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-43496
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-43496. Jenkins 2.423 and earlier, LTS 2.414.1 and earlier creates a temporary file in the system temporary directory with the default permissions for newly created files when installing a plugin from a URL, potentially allowing attackers with access to the system temporary directory to replace the file before it is installed in Jenkins, potentially resulting in arbitrary code execution.
FIRST-EPSS: 0.000550000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-3329
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-3329. SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition.
FIRST-EPSS: 0.000460000
NVD-IS: 5.2
NVD-ES: 1.2
CVE-2023-3329
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-3329. SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition.
FIRST-EPSS: 0.000460000
NVD-IS: 5.2
NVD-ES: 1.2
#ExploitObserverAlert
CVE-2023-2783
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-2783. Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
FIRST-EPSS: 0.000450000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2023-2783
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-2783. Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
FIRST-EPSS: 0.000450000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-2509
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-2509. A Cross-Site Scripting(XSS) vulnerability was found on ADM, LooksGood and SoundsGood Apps. An attacker can exploit this vulnerability to inject malicious scripts into the target applications to access any cookies or sensitive information retained by the browser and used with that application. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below, LooksGood 2.0.0.R129 and below and SoundsGood 2.3.0.r1027 and below.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2023-2509
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-2509. A Cross-Site Scripting(XSS) vulnerability was found on ADM, LooksGood and SoundsGood Apps. An attacker can exploit this vulnerability to inject malicious scripts into the target applications to access any cookies or sensitive information retained by the browser and used with that application. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below, LooksGood 2.0.0.R129 and below and SoundsGood 2.3.0.r1027 and below.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-3869
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-3869. The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment.
FIRST-EPSS: 0.000520000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-3869
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-3869. The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment.
FIRST-EPSS: 0.000520000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-31701
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-31701. TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.
FIRST-EPSS: 0.001300000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-31701
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-31701. TP-Link TL-WPA4530 KIT V2 (EU)_170406 and V2 (EU)_161115 is vulnerable to Command Injection via _httpRpmPlcDeviceRemove.
FIRST-EPSS: 0.001300000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-7020
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-7020. A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. This issue affects some unknown processing of the file general/wiki/cp/ct/view.php. The manipulation of the argument TEMP_ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248567. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-7020
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-7020. A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. This issue affects some unknown processing of the file general/wiki/cp/ct/view.php. The manipulation of the argument TEMP_ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248567. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-40627
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-40627. A reflected XSS vulnerability was discovered in the LivingWord component for Joomla.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2023-40627
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-40627. A reflected XSS vulnerability was discovered in the LivingWord component for Joomla.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8