#ExploitObserverAlert
CVE-2020-7021
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2020-7021. Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details.
FIRST-EPSS: 0.000650000
NVD-IS: 3.6
NVD-ES: 1.2
CVE-2020-7021
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2020-7021. Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details.
FIRST-EPSS: 0.000650000
NVD-IS: 3.6
NVD-ES: 1.2
#ExploitObserverAlert
PSS-176798
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176798. Apple Security Advisory 01-22-2024-3. Apple Security Advisory 01-22-2024-3 - iOS 16.7.5 and iPadOS 16.7.5 addresses code execution vulnerabilities.
PSS-176798
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176798. Apple Security Advisory 01-22-2024-3. Apple Security Advisory 01-22-2024-3 - iOS 16.7.5 and iPadOS 16.7.5 addresses code execution vulnerabilities.
#ExploitObserverAlert
CVE-2022-28732
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28732. A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.
FIRST-EPSS: 0.003650000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2022-28732
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28732. A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.
FIRST-EPSS: 0.003650000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-24947
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-24947. Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2022-24947
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-24947. Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-46364
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2022-46364. A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
FIRST-EPSS: 0.028500000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2022-46364
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2022-46364. A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
FIRST-EPSS: 0.028500000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
PSS-176780
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176780. Ubuntu Security Notice USN-6603-1. Ubuntu Security Notice 6603-1 - It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information. Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
PSS-176780
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176780. Ubuntu Security Notice USN-6603-1. Ubuntu Security Notice 6603-1 - It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information. Budimir Markovic, Lucas De Marchi, and Pengfei Xu discovered that the perf subsystem in the Linux kernel did not properly validate all event sizes when attaching new events, leading to an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.
#ExploitObserverAlert
WLB-2024010080
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010080. YahooPOPs 1.6 - SMTP - Denial of Service (DoS).
WLB-2024010080
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010080. YahooPOPs 1.6 - SMTP - Denial of Service (DoS).
#ExploitObserverAlert
GHSA-7695-f938-c2jf
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-7695-f938-c2jf. Improper Input Validation in Hitron Systems DVR LGUVR-4H 1.02~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
GHSA-7695-f938-c2jf
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-7695-f938-c2jf. Improper Input Validation in Hitron Systems DVR LGUVR-4H 1.02~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
#ExploitObserverAlert
CVE-2021-42342
DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-42342. An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
FIRST-EPSS: 0.040180000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-42342
DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-42342. An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
FIRST-EPSS: 0.040180000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-26049
DESCRIPTION: Exploit Observer has 9 entries in 4 file formats related to CVE-2023-26049. Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
FIRST-EPSS: 0.001720000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-26049
DESCRIPTION: Exploit Observer has 9 entries in 4 file formats related to CVE-2023-26049. Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
FIRST-EPSS: 0.001720000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2020-27838
DESCRIPTION: Exploit Observer has 6 entries in 5 file formats related to CVE-2020-27838. A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
FIRST-EPSS: 0.081350000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2020-27838
DESCRIPTION: Exploit Observer has 6 entries in 5 file formats related to CVE-2020-27838. A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.
FIRST-EPSS: 0.081350000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
PSS-176784
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176784. YahooPOPs 1.6 Denial Of Service. YahooPOPs version 1.6 remote denial of service exploit.
PSS-176784
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176784. YahooPOPs 1.6 Denial Of Service. YahooPOPs version 1.6 remote denial of service exploit.
#ExploitObserverAlert
CVE-2021-3632
DESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to CVE-2021-3632. A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.
FIRST-EPSS: 0.001630000
NVD-IS: 5.9
NVD-ES: 1.6
CVE-2021-3632
DESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to CVE-2021-3632. A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.
FIRST-EPSS: 0.001630000
NVD-IS: 5.9
NVD-ES: 1.6
#ExploitObserverAlert
PSS-176781
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176781. Ubuntu Security Notice USN-6604-1. Ubuntu Security Notice 6604-1 - It was discovered that the ASUS HID driver in the Linux kernel did not properly handle device removal, leading to a use-after-free vulnerability. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service. Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information.
PSS-176781
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176781. Ubuntu Security Notice USN-6604-1. Ubuntu Security Notice 6604-1 - It was discovered that the ASUS HID driver in the Linux kernel did not properly handle device removal, leading to a use-after-free vulnerability. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service. Jana Hofmann, Emanuele Vannacci, Cedric Fournet, Boris Kopf, and Oleksii Oleksenko discovered that some AMD processors could leak stale data from division operations in certain situations. A local attacker could possibly use this to expose sensitive information.
#ExploitObserverAlert
PSS-176793
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176793. Vinchin Backup And Recovery 7.2 syncNtpTime Command Injection. Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in the syncNtpTime function.
PSS-176793
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176793. Vinchin Backup And Recovery 7.2 syncNtpTime Command Injection. Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in the syncNtpTime function.
#ExploitObserverAlert
CVE-2021-3827
DESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2021-3827. A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
FIRST-EPSS: 0.001130000
NVD-IS: 5.2
NVD-ES: 1.6
CVE-2021-3827
DESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2021-3827. A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
FIRST-EPSS: 0.001130000
NVD-IS: 5.2
NVD-ES: 1.6
#ExploitObserverAlert
PSS-176796
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176796. Vinchin Backup And Recovery 7.2 SystemHandler.class.php Command Injection. Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in SystemHandler.class.php.
PSS-176796
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176796. Vinchin Backup And Recovery 7.2 SystemHandler.class.php Command Injection. Vinchin Backup and Recovery versions 7.2 and below suffer from a command injection vulnerability in SystemHandler.class.php.
#ExploitObserverAlert
CVE-2022-34158
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-34158. A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
FIRST-EPSS: 0.003930000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2022-34158
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-34158. A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked account, and then a reset password request from the login page.
FIRST-EPSS: 0.003930000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-2764
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2022-2764. A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
FIRST-EPSS: 0.000610000
NVD-IS: 3.6
NVD-ES: 1.2
CVE-2022-2764
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2022-2764. A flaw was found in Undertow. Denial of service can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations.
FIRST-EPSS: 0.000610000
NVD-IS: 3.6
NVD-ES: 1.2
#ExploitObserverAlert
PSS-176791
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to PSS-176791. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command. CloudLinux CageFS versions 7.0.8-2 and below insufficiently restrict file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files of certain file formats outside the CageFS environment.
PSS-176791
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to PSS-176791. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command. CloudLinux CageFS versions 7.0.8-2 and below insufficiently restrict file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files of certain file formats outside the CageFS environment.
#ExploitObserverAlert
CVE-2021-22132
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2021-22132. Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
FIRST-EPSS: 0.000820000
NVD-IS: 3.6
NVD-ES: 1.2
CVE-2021-22132
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2021-22132. Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
FIRST-EPSS: 0.000820000
NVD-IS: 3.6
NVD-ES: 1.2