#ExploitObserverAlert
PSS-176782
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176782. Ubuntu Security Notice USN-6605-1. Ubuntu Security Notice 6605-1 - Lin Ma discovered that the netfilter subsystem in the Linux kernel did not properly validate network family support while creating a new netfilter table. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
PSS-176782
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176782. Ubuntu Security Notice USN-6605-1. Ubuntu Security Notice 6605-1 - Lin Ma discovered that the netfilter subsystem in the Linux kernel did not properly validate network family support while creating a new netfilter table. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
#ExploitObserverAlert
CVE-2023-46673
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2023-46673. It was identified that malformed scripts used in the script processor of an Ingest Pipeline could cause an Elasticsearch node to crash when calling the Simulate Pipeline API.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2023-46673
DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2023-46673. It was identified that malformed scripts used in the script processor of an Ingest Pipeline could cause an Elasticsearch node to crash when calling the Simulate Pipeline API.
FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-32532
DESCRIPTION: Exploit Observer has 12 entries in 4 file formats related to CVE-2022-32532. Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
FIRST-EPSS: 0.039680000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2022-32532
DESCRIPTION: Exploit Observer has 12 entries in 4 file formats related to CVE-2022-32532. Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
FIRST-EPSS: 0.039680000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
PSS-176787
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176787. Ubuntu Security Notice USN-6609-1. Ubuntu Security Notice 6609-1 - Lin Ma discovered that the netfilter subsystem in the Linux kernel did not properly validate network family support while creating a new netfilter table. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
PSS-176787
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176787. Ubuntu Security Notice USN-6609-1. Ubuntu Security Notice 6609-1 - Lin Ma discovered that the netfilter subsystem in the Linux kernel did not properly validate network family support while creating a new netfilter table. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
#ExploitObserverAlert
GHSA-hrgc-cr5f-pw7v
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-hrgc-cr5f-pw7v. Microsoft Edge for Android Spoofing Vulnerability
GHSA-hrgc-cr5f-pw7v
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-hrgc-cr5f-pw7v. Microsoft Edge for Android Spoofing Vulnerability
#ExploitObserverAlert
CVE-2022-26850
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-26850. When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login Identity Providers configuration to the operating system temporary directory. On most platforms, the operating system temporary directory has global read permissions. NiFi immediately moved the temporary file to the final configuration directory, which significantly limited the window of opportunity for access. NiFi 1.16.0 includes updates to replace the Login Identity Providers configuration without writing a file to the operating system temporary directory.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2022-26850
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-26850. When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login Identity Providers configuration to the operating system temporary directory. On most platforms, the operating system temporary directory has global read permissions. NiFi immediately moved the temporary file to the final configuration directory, which significantly limited the window of opportunity for access. NiFi 1.16.0 includes updates to replace the Login Identity Providers configuration without writing a file to the operating system temporary directory.
FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2021-43859
DESCRIPTION: Exploit Observer has 11 entries in 5 file formats related to CVE-2021-43859. XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.
FIRST-EPSS: 0.012320000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2021-43859
DESCRIPTION: Exploit Observer has 11 entries in 5 file formats related to CVE-2021-43859. XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.
FIRST-EPSS: 0.012320000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-40664
DESCRIPTION: Exploit Observer has 9 entries in 5 file formats related to CVE-2022-40664. Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
FIRST-EPSS: 0.013150000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2022-40664
DESCRIPTION: Exploit Observer has 9 entries in 5 file formats related to CVE-2022-40664. Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
FIRST-EPSS: 0.013150000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-22144
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2021-22144. In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.
FIRST-EPSS: 0.001380000
NVD-IS: 3.6
NVD-ES: 2.8
CVE-2021-22144
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2021-22144. In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.
FIRST-EPSS: 0.001380000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-27166
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-27166. A carefully crafted request on XHRHtml2Markup.jsp could trigger an XSS vulnerability on Apache JSPWiki up to and including 2.11.2, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
FIRST-EPSS: 0.003650000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2022-27166
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-27166. A carefully crafted request on XHRHtml2Markup.jsp could trigger an XSS vulnerability on Apache JSPWiki up to and including 2.11.2, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
FIRST-EPSS: 0.003650000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-40151
DESCRIPTION: Exploit Observer has 5 entries in 5 file formats related to CVE-2022-40151. Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
FIRST-EPSS: 0.002700000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2022-40151
DESCRIPTION: Exploit Observer has 5 entries in 5 file formats related to CVE-2022-40151. Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
FIRST-EPSS: 0.002700000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
PSS-176794
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to PSS-176794. Vinchin Backup And Recovery 7.2 Default MySQL Credentials. A critical security issue has been discovered in Vinchin Backup and Recovery version 7.2. The software has been found to use default MYSQL credentials, which could lead to significant security risks.
PSS-176794
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to PSS-176794. Vinchin Backup And Recovery 7.2 Default MySQL Credentials. A critical security issue has been discovered in Vinchin Backup and Recovery version 7.2. The software has been found to use default MYSQL credentials, which could lead to significant security risks.
#ExploitObserverAlert
CVE-2021-44140
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2021-44140. Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
FIRST-EPSS: 0.004630000
NVD-IS: 5.2
NVD-ES: 3.9
CVE-2021-44140
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2021-44140. Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.
FIRST-EPSS: 0.004630000
NVD-IS: 5.2
NVD-ES: 3.9
#ExploitObserverAlert
GHSA-v68g-wm8c-6x7j
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-v68g-wm8c-6x7j. Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.
GHSA-v68g-wm8c-6x7j
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-v68g-wm8c-6x7j. Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.
#ExploitObserverAlert
CVE-2021-3597
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2021-3597. A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.35.SP1, prior to 2.2.6.SP1, prior to 2.2.7.SP1, prior to 2.0.36.SP1, prior to 2.2.9.Final and prior to 2.0.39.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
CVE-2021-3597
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2021-3597. A flaw was found in undertow. The HTTP2SourceChannel fails to write the final frame under some circumstances, resulting in a denial of service. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.35.SP1, prior to 2.2.6.SP1, prior to 2.2.7.SP1, prior to 2.0.36.SP1, prior to 2.2.9.Final and prior to 2.0.39.Final.
FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
#ExploitObserverAlert
CVE-2021-22096
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to CVE-2021-22096. In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
FIRST-EPSS: 0.000790000
NVD-IS: 1.4
NVD-ES: 2.8
CVE-2021-22096
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to CVE-2021-22096. In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.
FIRST-EPSS: 0.000790000
NVD-IS: 1.4
NVD-ES: 2.8
#ExploitObserverAlert
PSS-176776
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176776. Ubuntu Security Notice USN-6599-1. Ubuntu Security Notice 6599-1 - Yeting Li discovered that Jinja incorrectly handled certain regex. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. It was discovered that Jinja incorrectly handled certain HTML passed with xmlatter filter. An attacker could inject arbitrary HTML attributes keys and values potentially leading to XSS.
PSS-176776
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176776. Ubuntu Security Notice USN-6599-1. Ubuntu Security Notice 6599-1 - Yeting Li discovered that Jinja incorrectly handled certain regex. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. It was discovered that Jinja incorrectly handled certain HTML passed with xmlatter filter. An attacker could inject arbitrary HTML attributes keys and values potentially leading to XSS.
#ExploitObserverAlert
CVE-2021-22146
DESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to CVE-2021-22146. All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
FIRST-EPSS: 0.015230000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2021-22146
DESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to CVE-2021-22146. All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
FIRST-EPSS: 0.015230000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2022-24969
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-24969. bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.
FIRST-EPSS: 0.001370000
NVD-IS: 2.7
NVD-ES: 2.8
CVE-2022-24969
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-24969. bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.
FIRST-EPSS: 0.001370000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert
GHSA-8cr8-4vfw-mr7h
DESCRIPTION: Exploit Observer has 11 entries in 3 file formats related to GHSA-8cr8-4vfw-mr7h. The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
GHSA-8cr8-4vfw-mr7h
DESCRIPTION: Exploit Observer has 11 entries in 3 file formats related to GHSA-8cr8-4vfw-mr7h. The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
#ExploitObserverAlert
CVE-2022-41678
DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to CVE-2022-41678. Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to create JmxRequest through JSONObject. And calls to org.jolokia.http.HttpRequestHandler#executeRequest. Into deeper calling stacks, org.jolokia.handler.ExecHandler#doHandleRequest is able to invoke through refection. And then, RCE is able to be achieved via jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11. 1 Call newRecording. 2 Call setConfiguration. And a webshell data hides in it. 3 Call startRecording. 4 Call copyTo method. The webshell will be written to a .jsp file. The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
FIRST-EPSS: 0.001030000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2022-41678
DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to CVE-2022-41678. Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to create JmxRequest through JSONObject. And calls to org.jolokia.http.HttpRequestHandler#executeRequest. Into deeper calling stacks, org.jolokia.handler.ExecHandler#doHandleRequest is able to invoke through refection. And then, RCE is able to be achieved via jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11. 1 Call newRecording. 2 Call setConfiguration. And a webshell data hides in it. 3 Call startRecording. 4 Call copyTo method. The webshell will be written to a .jsp file. The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia. A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
FIRST-EPSS: 0.001030000
NVD-IS: 5.9
NVD-ES: 2.8