#ExploitObserverAlert
GHSA-vrx4-754w-fhfx
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-VRX4-754W-FHFX. TOTOLINK_A3700R_V9.1.2u.6165_20211012has a stack overflow vulnerability via setLanguageCfg
GHSA-vrx4-754w-fhfx
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-VRX4-754W-FHFX. TOTOLINK_A3700R_V9.1.2u.6165_20211012has a stack overflow vulnerability via setLanguageCfg
#ExploitObserverAlert
CVE-2024-22233
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
CVE-2024-22233
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-23641
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23641. SvelteKit is a web development kit. In SvelteKit 2, sending a GET request with a body eg `{}` to a built and previewed/hosted sveltekit app throws `Request with GET/HEAD method cannot have body.` and crashes the preview/hosting. After this happens, one must manually restart the app. `TRACE` requests will also cause the app to crash. Prerendered pages and SvelteKit 1 apps are not affected. `@sveltejs/adapter-node` versions 2.1.2, 3.0.3, and 4.0.1 and `@sveltejs/kit` version 2.4.3 contain a patch for this issue.
CVE-2024-23641
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23641. SvelteKit is a web development kit. In SvelteKit 2, sending a GET request with a body eg `{}` to a built and previewed/hosted sveltekit app throws `Request with GET/HEAD method cannot have body.` and crashes the preview/hosting. After this happens, one must manually restart the app. `TRACE` requests will also cause the app to crash. Prerendered pages and SvelteKit 1 apps are not affected. `@sveltejs/adapter-node` versions 2.1.2, 3.0.3, and 4.0.1 and `@sveltejs/kit` version 2.4.3 contain a patch for this issue.
#ExploitObserverAlert
CVE-2023-0787
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-0787. Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 2.3
CVE-2023-0787
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-0787. Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 2.3
#ExploitObserverAlert
CVE-2024-22751
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22751. D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the sub_477AA0 function.
CVE-2024-22751
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22751. D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the sub_477AA0 function.
#ExploitObserverAlert
CVE-2024-22195
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2024-22195. Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2024-22195
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2024-22195. Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.
FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-6148
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2023-6148. Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
FIRST-EPSS: 0.000450000
NVD-IS: 2.7
NVD-ES: 2.3
CVE-2023-6148
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2023-6148. Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data
FIRST-EPSS: 0.000450000
NVD-IS: 2.7
NVD-ES: 2.3
#ExploitObserverAlert
CVE-2024-0264
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-0264. A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /LoginRegistration.php. The manipulation of the argument formToken leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249820.
FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2024-0264
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-0264. A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /LoginRegistration.php. The manipulation of the argument formToken leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249820.
FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-43988
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43988. An issue in nature fitness saijo mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43988
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43988. An issue in nature fitness saijo mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert
CVE-2023-44000
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44000. An issue in Otakara lapis totuka mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-44000
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44000. An issue in Otakara lapis totuka mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert
GHSA-r64r-5h43-26qv
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-r64r-5h43-26qv. Users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports.
GHSA-r64r-5h43-26qv
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-r64r-5h43-26qv. Users can report private messages, even when they're neither sender nor recipient of the message. The API response to creating a private message report contains the private message itself, which means any user can just iterate over message ids to (loudly) obtain all private messages of an instance. A user with instance admin privileges can also abuse this if the private message is removed from the response, as they're able to see the resulting reports.
#ExploitObserverAlert
CVE-2024-0532
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0532. A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.001140000
NVD-IS: 5.9
NVD-ES: 1.2
CVE-2024-0532
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0532. A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects unknown code of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-250702 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.001140000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert
CVE-2024-0351
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0351. A vulnerability classified as problematic has been found in SourceCodester Engineers Online Portal 1.0. This affects an unknown part. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250119.
FIRST-EPSS: 0.000510000
NVD-IS: 2.5
NVD-ES: 0.9
CVE-2024-0351
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0351. A vulnerability classified as problematic has been found in SourceCodester Engineers Online Portal 1.0. This affects an unknown part. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250119.
FIRST-EPSS: 0.000510000
NVD-IS: 2.5
NVD-ES: 0.9
#ExploitObserverAlert
GHSA-mrqg-mwh7-q94j
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-mrqg-mwh7-q94j. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password.
GHSA-mrqg-mwh7-q94j
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-mrqg-mwh7-q94j. The password reset functionality sends to the the user requesting a password change an email containing an URL to reset its password.
#ExploitObserverAlert
CVE-2023-0566
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2023-0566. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in froxlor/froxlor prior to 2.0.10.
FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 1.7
CVE-2023-0566
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2023-0566. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in froxlor/froxlor prior to 2.0.10.
FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 1.7
#ExploitObserverAlert
GHSA-j2p7-j8v8-q5g2
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-j2p7-j8v8-q5g2. Orthanc versions before 1.12.2 are affected by a reflected cross-site scripting (XSS) vulnerability. The vulnerability was present in the server's error reporting.
GHSA-j2p7-j8v8-q5g2
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-j2p7-j8v8-q5g2. Orthanc versions before 1.12.2 are affected by a reflected cross-site scripting (XSS) vulnerability. The vulnerability was present in the server's error reporting.
#ExploitObserverAlert
CVE-2023-50290
DESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2023-50290. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
FIRST-EPSS: 0.054520000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2023-50290
DESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2023-50290. Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
FIRST-EPSS: 0.054520000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2024-0181
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0181. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin_user.php of the component Admin Panel. The manipulation of the argument Firstname/Lastname/Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249433 was assigned to this vulnerability.
FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 1.7
CVE-2024-0181
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0181. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/admin_user.php of the component Admin Panel. The manipulation of the argument Firstname/Lastname/Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249433 was assigned to this vulnerability.
FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 1.7
#ExploitObserverAlert
CVE-2024-22725
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-22725. Orthanc versions before 1.12.2 are affected by a reflected cross-site scripting (XSS) vulnerability. The vulnerability was present in the server's error reporting.
CVE-2024-22725
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-22725. Orthanc versions before 1.12.2 are affected by a reflected cross-site scripting (XSS) vulnerability. The vulnerability was present in the server's error reporting.
#ExploitObserverAlert
CVE-2023-1753
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-1753. Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
FIRST-EPSS: 0.000870000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-1753
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-1753. Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
FIRST-EPSS: 0.000870000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-51384
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-51384. In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
FIRST-EPSS: 0.000450000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2023-51384
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-51384. In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
FIRST-EPSS: 0.000450000
NVD-IS: 3.6
NVD-ES: 1.8