#ExploitObserverAlert
CVE-2022-28731
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28731. A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.
FIRST-EPSS: 0.000630000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2022-28731
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28731. A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.
FIRST-EPSS: 0.000630000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-33140
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-33140. The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
FIRST-EPSS: 0.001660000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2022-33140
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-33140. The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
FIRST-EPSS: 0.001660000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
GHSA-f7x7-cw3q-5rm9
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-f7x7-cw3q-5rm9. Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
GHSA-f7x7-cw3q-5rm9
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-f7x7-cw3q-5rm9. Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
#ExploitObserverAlert
CVE-2021-43297
DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-43297. A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
FIRST-EPSS: 0.011420000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-43297
DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-43297. A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
FIRST-EPSS: 0.011420000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
GHSA-xj6f-mr2f-7c6m
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-xj6f-mr2f-7c6m. Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.
GHSA-xj6f-mr2f-7c6m
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-xj6f-mr2f-7c6m. Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.
#ExploitObserverAlert
PSS-176797
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176797. Apple Security Advisory 01-22-2024-2. Apple Security Advisory 01-22-2024-2 - iOS 17.3 and iPadOS 17.3 addresses bypass and code execution vulnerabilities.
PSS-176797
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176797. Apple Security Advisory 01-22-2024-2. Apple Security Advisory 01-22-2024-2 - iOS 17.3 and iPadOS 17.3 addresses bypass and code execution vulnerabilities.
#ExploitObserverAlert
GHSA-phrf-fj83-fcfv
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-phrf-fj83-fcfv. An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
GHSA-phrf-fj83-fcfv
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-phrf-fj83-fcfv. An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
#ExploitObserverAlert
WLB-2024010076
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010076. PHPJ-Callback-Widget-1.0-XSS-Stored-admin-Hijacking.
WLB-2024010076
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010076. PHPJ-Callback-Widget-1.0-XSS-Stored-admin-Hijacking.
#ExploitObserverAlert
WLB-2024010079
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010079. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command.
WLB-2024010079
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010079. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command.
#ExploitObserverAlert
CVE-2024-22233
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
CVE-2024-22233
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2021-20202
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
CVE-2021-20202
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2022-22970
DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
CVE-2022-22970
DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
#ExploitObserverAlert
CVE-2021-37579
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-37579
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-31412
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2021-31412
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-3629
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
CVE-2021-3629
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
#ExploitObserverAlert
CVE-2022-1245
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2022-1245
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2024-23898
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-23898. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
CVE-2024-23898
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-23898. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
#ExploitObserverAlert
CVE-2021-36163
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-36163. In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
FIRST-EPSS: 0.319360000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-36163
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-36163. In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
FIRST-EPSS: 0.319360000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-33201
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-33201. Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
FIRST-EPSS: 0.000510000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-33201
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-33201. Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
FIRST-EPSS: 0.000510000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-3513
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3513. A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
FIRST-EPSS: 0.001430000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2021-3513
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3513. A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
FIRST-EPSS: 0.001430000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-24948
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2022-24948. A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
FIRST-EPSS: 0.002720000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2022-24948
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2022-24948. A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
FIRST-EPSS: 0.002720000
NVD-IS: 2.7
NVD-ES: 2.8