#ExploitObserverAlert
CVE-2017-7921
DESCRIPTION: Exploit Observer has 40 entries related to CVE-2017-7921. An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.
FIRST-EPSS: 0.013610000
NVD-IS: 6.0
NVD-ES: 3.9
CVE-2017-7921
DESCRIPTION: Exploit Observer has 40 entries related to CVE-2017-7921. An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.
FIRST-EPSS: 0.013610000
NVD-IS: 6.0
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-1177
DESCRIPTION: Exploit Observer has 9 entries related to CVE-2023-1177. Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
FIRST-EPSS: 0.022630000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-1177
DESCRIPTION: Exploit Observer has 9 entries related to CVE-2023-1177. Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1.
FIRST-EPSS: 0.022630000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2017-8917
DESCRIPTION: Exploit Observer has 56 entries related to CVE-2017-8917. SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors.
FIRST-EPSS: 0.975550000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2017-8917
DESCRIPTION: Exploit Observer has 56 entries related to CVE-2017-8917. SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors.
FIRST-EPSS: 0.975550000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
GHSA-rcjv-mgp8-qvmr
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-RCJV-MGP8-QVMR.
GHSS: 7.5
GHSA-rcjv-mgp8-qvmr
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-RCJV-MGP8-QVMR.
GHSS: 7.5
#ExploitObserverAlert
CVE-2023-5142
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5142. A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000520000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-5142
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5142. A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000520000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-0337
DESCRIPTION: Exploit Observer has 12 entries related to CVE-2022-0337. Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High)
FIRST-EPSS: 0.000680000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2022-0337
DESCRIPTION: Exploit Observer has 12 entries related to CVE-2022-0337. Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High)
FIRST-EPSS: 0.000680000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
GHSA-qqvq-6xgj-jw8g
DESCRIPTION: Exploit Observer has 16 entries related to GHSA-QQVQ-6XGJ-JW8G.
GHSS: 8.8
GHSA-qqvq-6xgj-jw8g
DESCRIPTION: Exploit Observer has 16 entries related to GHSA-QQVQ-6XGJ-JW8G.
GHSS: 8.8
#ExploitObserverAlert
CVE-2023-4357
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-4357. Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
FIRST-EPSS: 0.001280000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-4357
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-4357. Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
FIRST-EPSS: 0.001280000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
GHSA-q847-2q57-wmr3
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-Q847-2Q57-WMR3.
GHSS: 6.1
GHSA-q847-2q57-wmr3
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-Q847-2Q57-WMR3.
GHSS: 6.1
#ExploitObserverAlert
GHSA-wj42-v2p3-fq2w
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-WJ42-V2P3-FQ2W.
GHSS: 9.8
GHSA-wj42-v2p3-fq2w
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-WJ42-V2P3-FQ2W.
GHSS: 9.8
#ExploitObserverAlert
GHSA-9wh7-397j-722m
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-9WH7-397J-722M.
GHSS: 6.0
GHSA-9wh7-397j-722m
DESCRIPTION: Exploit Observer has 1 entries related to GHSA-9WH7-397J-722M.
GHSS: 6.0
#ExploitObserverAlert
CVE-2023-4622
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-4622. A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
FIRST-EPSS: 0.000420000
NVD-IS: 5.9
NVD-ES: 1.0
CVE-2023-4622
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-4622. A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
FIRST-EPSS: 0.000420000
NVD-IS: 5.9
NVD-ES: 1.0
#ExploitObserverAlert
GHSA-9xv9-423q-x48x
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-9XV9-423Q-X48X.
GHSS: 7.3
GHSA-9xv9-423q-x48x
DESCRIPTION: Exploit Observer has 2 entries related to GHSA-9XV9-423Q-X48X.
GHSS: 7.3
#ExploitObserverAlert
CVE-2023-40033
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-40033. Flarum is an open source forum software. Flarum is affected by a vulnerability that allows an attacker to conduct a Blind Server-Side Request Forgery (SSRF) attack or disclose any file on the server, even with a basic user account on any Flarum forum. By uploading a file containing a URL and spoofing the MIME type, an attacker can manipulate the application to execute unintended actions. The vulnerability is due to the behavior of the `intervention/image` package, which attempts to interpret the supplied file contents as a URL, which then fetches its contents. This allows an attacker to exploit the vulnerability to perform SSRF attacks, disclose local file contents, or conduct a blind oracle attack. This has been patched in Flarum version 1.8.0. Users are advised to upgrade. Users unable to upgrade may disable PHP's `allow_url_fopen` which will prevent the fetching of external files via URLs as a temporary workaround for the SSRF aspect of the vulnerability.
FIRST-EPSS: 0.000490000
NVD-IS: 4.2
NVD-ES: 2.8
CVE-2023-40033
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-40033. Flarum is an open source forum software. Flarum is affected by a vulnerability that allows an attacker to conduct a Blind Server-Side Request Forgery (SSRF) attack or disclose any file on the server, even with a basic user account on any Flarum forum. By uploading a file containing a URL and spoofing the MIME type, an attacker can manipulate the application to execute unintended actions. The vulnerability is due to the behavior of the `intervention/image` package, which attempts to interpret the supplied file contents as a URL, which then fetches its contents. This allows an attacker to exploit the vulnerability to perform SSRF attacks, disclose local file contents, or conduct a blind oracle attack. This has been patched in Flarum version 1.8.0. Users are advised to upgrade. Users unable to upgrade may disable PHP's `allow_url_fopen` which will prevent the fetching of external files via URLs as a temporary workaround for the SSRF aspect of the vulnerability.
FIRST-EPSS: 0.000490000
NVD-IS: 4.2
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-22491
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-22491. Gatsby is a free and open source framework based on React that helps developers build websites and apps. The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server. To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. A patch has been introduced in `gatsby-transformer-remark@5.25.1` and `gatsby-transformer-remark@6.3.2` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. As a workaround, if an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing. It is encouraged for projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.
FIRST-EPSS: 0.000450000
NVD-IS: 2.7
NVD-ES: 2.3
CVE-2023-22491
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-22491. Gatsby is a free and open source framework based on React that helps developers build websites and apps. The gatsby-transformer-remark plugin prior to versions 5.25.1 and 6.3.2 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present in gatsby-transformer-remark when passing input in data mode (querying MarkdownRemark nodes via GraphQL). Injected JavaScript executes in the context of the build server. To exploit this vulnerability untrusted/unsanitized input would need to be sourced by or added into a file processed by gatsby-transformer-remark. A patch has been introduced in `gatsby-transformer-remark@5.25.1` and `gatsby-transformer-remark@6.3.2` which mitigates the issue by disabling the `gray-matter` JavaScript Frontmatter engine. As a workaround, if an older version of `gatsby-transformer-remark` must be used, input passed into the plugin should be sanitized ahead of processing. It is encouraged for projects to upgrade to the latest major release branch for all Gatsby plugins to ensure the latest security updates and bug fixes are received in a timely manner.
FIRST-EPSS: 0.000450000
NVD-IS: 2.7
NVD-ES: 2.3
#ExploitObserverAlert
CVE-2023-40409
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-40409. The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.
FIRST-EPSS: 0.000560000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2023-40409
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-40409. The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.
FIRST-EPSS: 0.000560000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-41984
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41984. The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
FIRST-EPSS: 0.000770000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2023-41984
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-41984. The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges.
FIRST-EPSS: 0.000770000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-22103
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-22103. Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
FIRST-EPSS: 0.000440000
NVD-IS: 3.6
NVD-ES: 1.2
CVE-2023-22103
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-22103. Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
FIRST-EPSS: 0.000440000
NVD-IS: 3.6
NVD-ES: 1.2
#ExploitObserverAlert
CVE-2023-5484
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5484. Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
FIRST-EPSS: 0.001120000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2023-5484
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5484. Inappropriate implementation in Navigation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Medium)
FIRST-EPSS: 0.001120000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-36717
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36717. Windows Virtual Trusted Platform Module Denial of Service Vulnerability
FIRST-EPSS: 0.000480000
NVD-IS: 4.0
NVD-ES: 2.0
CVE-2023-36717
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36717. Windows Virtual Trusted Platform Module Denial of Service Vulnerability
FIRST-EPSS: 0.000480000
NVD-IS: 4.0
NVD-ES: 2.0
#ExploitObserverAlert
CVE-2023-36553
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36553. A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-36553
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-36553. A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.
FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 3.9