#ExploitObserverAlert
CVE-2023-32845
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-32845. In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860).
FIRST-EPSS: 0.000800000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-32845
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-32845. In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860).
FIRST-EPSS: 0.000800000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-48476
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2022-48476. In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible
FIRST-EPSS: 0.000900000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2022-48476
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2022-48476. In JetBrains Ktor before 2.3.0 path traversal in the `resolveResource` method was possible
FIRST-EPSS: 0.000900000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-24453
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-24453. A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
FIRST-EPSS: 0.000480000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2023-24453
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-24453. A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
FIRST-EPSS: 0.000480000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-4304
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-4304. Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.22,2.1.0.
FIRST-EPSS: 0.000440000
NVD-IS: 1.4
NVD-ES: 1.2
CVE-2023-4304
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-4304. Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.22,2.1.0.
FIRST-EPSS: 0.000440000
NVD-IS: 1.4
NVD-ES: 1.2
#ExploitObserverAlert
CVE-2023-0789
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-0789. Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
FIRST-EPSS: 0.001010000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-0789
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-0789. Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
FIRST-EPSS: 0.001010000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-43992
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43992. An issue in STOCKMAN GROUP mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43992
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43992. An issue in STOCKMAN GROUP mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert
CVE-2023-41474
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-41474. Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component.
CVE-2023-41474
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-41474. Directory Traversal vulnerability in Ivanti Avalanche 6.3.4.153 allows a remote authenticated attacker to obtain sensitive information via the javax.faces.resource component.
#ExploitObserverAlert
WLB-2024010075
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010075. MiniWeb HTTP Server 0.8.19 - Denied of Service (DoS).
WLB-2024010075
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010075. MiniWeb HTTP Server 0.8.19 - Denied of Service (DoS).
#ExploitObserverAlert
GHSA-g5m6-hxpp-fc49
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-g5m6-hxpp-fc49. In SvelteKit 2 sending a GET request with a body eg {} to a SvelteKit app in preview or with adapter-node throws Request with GET/HEAD method cannot have body. and crashes the app.
GHSA-g5m6-hxpp-fc49
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-g5m6-hxpp-fc49. In SvelteKit 2 sending a GET request with a body eg {} to a SvelteKit app in preview or with adapter-node throws Request with GET/HEAD method cannot have body. and crashes the app.
#ExploitObserverAlert
PSS-176717
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to PSS-176717. Debian Security Advisory 5605-1. Debian Linux Security Advisory 5605-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.
PSS-176717
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to PSS-176717. Debian Security Advisory 5605-1. Debian Linux Security Advisory 5605-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.
#ExploitObserverAlert
CVE-2022-38152
DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to CVE-2022-38152. An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.
FIRST-EPSS: 0.002470000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2022-38152
DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to CVE-2022-38152. An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.
FIRST-EPSS: 0.002470000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2024-0533
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0533. A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.001140000
NVD-IS: 5.9
NVD-ES: 1.2
CVE-2024-0533
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0533. A vulnerability was found in Tenda A15 15.13.07.13. It has been rated as critical. This issue affects some unknown processing of the file /goform/SetOnlineDevName of the component Web-based Management Interface. The manipulation of the argument devName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250703. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.001140000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert
CVE-2024-23898
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-23898. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
CVE-2024-23898
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-23898. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
#ExploitObserverAlert
CVE-2023-43990
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43990. An issue in cherub-hair mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43990
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43990. An issue in cherub-hair mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert
CVE-2023-43994
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43994. An issue in Cleaning_makotoya mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43994
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43994. An issue in Cleaning_makotoya mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert
CVE-2023-43993
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43993. An issue in smaregi_app_market mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43993
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43993. An issue in smaregi_app_market mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert
CVE-2024-0185
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0185. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.
FIRST-EPSS: 0.000610000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2024-0185
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0185. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file dasboard_teacher.php of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249443.
FIRST-EPSS: 0.000610000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-47211
DESCRIPTION: Exploit Observer has 4 entries in 4 file formats related to CVE-2023-47211. A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
FIRST-EPSS: 0.001640000
NVD-IS: 4.0
NVD-ES: 3.9
CVE-2023-47211
DESCRIPTION: Exploit Observer has 4 entries in 4 file formats related to CVE-2023-47211. A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
FIRST-EPSS: 0.001640000
NVD-IS: 4.0
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2024-0208
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-0208. GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2024-0208
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-0208. GVCP dissector crash in Wireshark 4.2.0, 4.0.0 to 4.0.11, and 3.6.0 to 3.6.19 allows denial of service via packet injection or crafted capture file
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-0572
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2023-0572. Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10.
FIRST-EPSS: 0.000530000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-0572
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2023-0572. Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10.
FIRST-EPSS: 0.000530000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-28531
DESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2023-28531. ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-28531
DESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2023-28531. ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 3.9