#ExploitObserverAlert
CVE-2024-22233
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
CVE-2024-22233
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2021-20202
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
CVE-2021-20202
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2022-22970
DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
CVE-2022-22970
DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
#ExploitObserverAlert
CVE-2021-37579
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-37579
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.
FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-31412
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2021-31412
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.
FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-3629
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
CVE-2021-3629
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
#ExploitObserverAlert
CVE-2022-1245
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2022-1245
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2024-23898
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-23898. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
CVE-2024-23898
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-23898. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
#ExploitObserverAlert
CVE-2021-36163
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-36163. In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
FIRST-EPSS: 0.319360000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2021-36163
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-36163. In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
FIRST-EPSS: 0.319360000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2023-33201
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-33201. Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
FIRST-EPSS: 0.000510000
NVD-IS: 1.4
NVD-ES: 3.9
CVE-2023-33201
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-33201. Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.
FIRST-EPSS: 0.000510000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-3513
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3513. A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
FIRST-EPSS: 0.001430000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2021-3513
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3513. A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
FIRST-EPSS: 0.001430000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-24948
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2022-24948. A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
FIRST-EPSS: 0.002720000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2022-24948
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2022-24948. A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
FIRST-EPSS: 0.002720000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
PSS-176775
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176775. Red Hat Security Advisory 2024-0530-03. Red Hat Security Advisory 2024-0530-03 - An update is now available for the Red Hat build of Cryostat 2 on RHEL 8. Issues addressed include a denial of service vulnerability.
PSS-176775
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176775. Red Hat Security Advisory 2024-0530-03. Red Hat Security Advisory 2024-0530-03 - An update is now available for the Red Hat build of Cryostat 2 on RHEL 8. Issues addressed include a denial of service vulnerability.
#ExploitObserverAlert
CVE-2021-43008
DESCRIPTION: Exploit Observer has 13 entries in 5 file formats related to CVE-2021-43008. Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
FIRST-EPSS: 0.001420000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2021-43008
DESCRIPTION: Exploit Observer has 13 entries in 5 file formats related to CVE-2021-43008. Improper Access Control in Adminer versions 1.12.0 to 4.6.2 (fixed in version 4.6.3) allows an attacker to achieve Arbitrary File Read on the remote server by requesting the Adminer to connect to a remote MySQL database.
FIRST-EPSS: 0.001420000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-20222
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-20222. A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
FIRST-EPSS: 0.001670000
NVD-IS: 5.9
NVD-ES: 1.6
CVE-2021-20222
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-20222. A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
FIRST-EPSS: 0.001670000
NVD-IS: 5.9
NVD-ES: 1.6
#ExploitObserverAlert
GHSA-crvx-w25m-8x7c
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-crvx-w25m-8x7c. Improper Input Validation in Hitron Systems DVR HVR-4781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
GHSA-crvx-w25m-8x7c
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-crvx-w25m-8x7c. Improper Input Validation in Hitron Systems DVR HVR-4781 1.03~4.02 allows an attacker to cause network attack in case of using defalut admin ID/PW.
#ExploitObserverAlert
CVE-2022-1319
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2022-1319. A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
FIRST-EPSS: 0.002120000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2022-1319
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2022-1319. A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
FIRST-EPSS: 0.002120000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-20195
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20195. A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
FIRST-EPSS: 0.001680000
NVD-IS: 6.0
NVD-ES: 2.8
CVE-2021-20195
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20195. A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
FIRST-EPSS: 0.001680000
NVD-IS: 6.0
NVD-ES: 2.8
#ExploitObserverAlert
GHSA-h5f8-8ppp-6wxq
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-h5f8-8ppp-6wxq. Inappropriate implementation in Autofill in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
GHSA-h5f8-8ppp-6wxq
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-h5f8-8ppp-6wxq. Inappropriate implementation in Autofill in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
#ExploitObserverAlert
CVE-2021-4133
DESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2021-4133. A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
FIRST-EPSS: 0.002360000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2021-4133
DESCRIPTION: Exploit Observer has 5 entries in 4 file formats related to CVE-2021-4133. A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
FIRST-EPSS: 0.002360000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2023-31419
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-31419. A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.
FIRST-EPSS: 0.000810000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-31419
DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2023-31419. A flaw was discovered in Elasticsearch, affecting the _search API that allowed a specially crafted query string to cause a Stack Overflow and ultimately a Denial of Service.
FIRST-EPSS: 0.000810000
NVD-IS: 3.6
NVD-ES: 3.9