#ExploitObserverAlert
PSS-176783
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176783. Ubuntu Security Notice USN-6606-1. Ubuntu Security Notice 6606-1 - It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
PSS-176783
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176783. Ubuntu Security Notice USN-6606-1. Ubuntu Security Notice 6606-1 - It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
#ExploitObserverAlert
CVE-2021-36162
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-36162. Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2
FIRST-EPSS: 0.001650000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2021-36162
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-36162. Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2
FIRST-EPSS: 0.001650000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2021-40369
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2021-40369. A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.
FIRST-EPSS: 0.003050000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2021-40369
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2021-40369. A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.
FIRST-EPSS: 0.003050000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-42004
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-42004. IBM Security Guardium 11.3, 11.4, and 11.5 is potentially vulnerable to CSV injection. A remote attacker could execute malicious commands due to improper validation of csv file contents. IBM X-Force ID: 265262.
FIRST-EPSS: 0.000700000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-42004
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-42004. IBM Security Guardium 11.3, 11.4, and 11.5 is potentially vulnerable to CSV injection. A remote attacker could execute malicious commands due to improper validation of csv file contents. IBM X-Force ID: 265262.
FIRST-EPSS: 0.000700000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
PSS-176777
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176777. Ubuntu Security Notice USN-6600-1. Ubuntu Security Notice 6600-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.39 in Ubuntu 20.04 LTS, 10.6.16 in Ubuntu 22.04 LTS and 10.11.6 in Ubuntu 23.10. CVE-2022-47015 only affected the MariaDB packages in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
PSS-176777
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176777. Ubuntu Security Notice USN-6600-1. Ubuntu Security Notice 6600-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.39 in Ubuntu 20.04 LTS, 10.6.16 in Ubuntu 22.04 LTS and 10.11.6 in Ubuntu 23.10. CVE-2022-47015 only affected the MariaDB packages in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
#ExploitObserverAlert
CVE-2022-28731
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28731. A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.
FIRST-EPSS: 0.000630000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2022-28731
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28731. A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.
FIRST-EPSS: 0.000630000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-33140
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-33140. The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
FIRST-EPSS: 0.001660000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2022-33140
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-33140. The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
FIRST-EPSS: 0.001660000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
GHSA-f7x7-cw3q-5rm9
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-f7x7-cw3q-5rm9. Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
GHSA-f7x7-cw3q-5rm9
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-f7x7-cw3q-5rm9. Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
#ExploitObserverAlert
CVE-2021-43297
DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-43297. A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
FIRST-EPSS: 0.011420000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-43297
DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-43297. A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
FIRST-EPSS: 0.011420000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
GHSA-xj6f-mr2f-7c6m
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-xj6f-mr2f-7c6m. Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.
GHSA-xj6f-mr2f-7c6m
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-xj6f-mr2f-7c6m. Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.
#ExploitObserverAlert
PSS-176797
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176797. Apple Security Advisory 01-22-2024-2. Apple Security Advisory 01-22-2024-2 - iOS 17.3 and iPadOS 17.3 addresses bypass and code execution vulnerabilities.
PSS-176797
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176797. Apple Security Advisory 01-22-2024-2. Apple Security Advisory 01-22-2024-2 - iOS 17.3 and iPadOS 17.3 addresses bypass and code execution vulnerabilities.
#ExploitObserverAlert
GHSA-phrf-fj83-fcfv
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-phrf-fj83-fcfv. An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
GHSA-phrf-fj83-fcfv
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-phrf-fj83-fcfv. An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
#ExploitObserverAlert
WLB-2024010076
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010076. PHPJ-Callback-Widget-1.0-XSS-Stored-admin-Hijacking.
WLB-2024010076
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010076. PHPJ-Callback-Widget-1.0-XSS-Stored-admin-Hijacking.
#ExploitObserverAlert
WLB-2024010079
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010079. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command.
WLB-2024010079
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010079. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command.
#ExploitObserverAlert
CVE-2024-22233
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
CVE-2024-22233
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2021-20202
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
CVE-2021-20202
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2022-22970
DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
CVE-2022-22970
DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
#ExploitObserverAlert
CVE-2021-37579
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-37579
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-31412
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2021-31412
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-3629
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
CVE-2021-3629
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
#ExploitObserverAlert
CVE-2022-1245
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2022-1245
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9