#ExploitObserverAlert
GHSA-pxvc-5jrx-h52p
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-pxvc-5jrx-h52p. A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
GHSA-pxvc-5jrx-h52p
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-pxvc-5jrx-h52p. A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert
GHSA-m7gj-wmp7-fwfx
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m7gj-wmp7-fwfx. A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
GHSA-m7gj-wmp7-fwfx
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m7gj-wmp7-fwfx. A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert
GHSA-jhhh-mxj4-r289
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-jhhh-mxj4-r289. Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the jpegxl_anim_read_packet component in the JPEG XL Animation decoder.
GHSA-jhhh-mxj4-r289
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-jhhh-mxj4-r289. Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the jpegxl_anim_read_packet component in the JPEG XL Animation decoder.
#ExploitObserverAlert
GHSA-vhw4-mjfv-p3gg
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-vhw4-mjfv-p3gg. Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file.
GHSA-vhw4-mjfv-p3gg
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-vhw4-mjfv-p3gg. Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file.
#ExploitObserverAlert
WLB-2024010081
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010081. Yahweh Touch - Blind Sql Injection.
WLB-2024010081
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010081. Yahweh Touch - Blind Sql Injection.
#ExploitObserverAlert
GHSA-m295-r33q-79rg
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m295-r33q-79rg. An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
GHSA-m295-r33q-79rg
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m295-r33q-79rg. An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
#ExploitObserverAlert
WLB-2024010087
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010087. PHPJ-Callback-Widget-1.0-XSS-Reflected-admin-Hijacking.
WLB-2024010087
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010087. PHPJ-Callback-Widget-1.0-XSS-Reflected-admin-Hijacking.
#ExploitObserverAlert
GHSA-x4j2-fh47-r6r6
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-x4j2-fh47-r6r6. Alinto SOGo 5.8.0 is vulnerable to HTML Injection.
GHSA-x4j2-fh47-r6r6
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-x4j2-fh47-r6r6. Alinto SOGo 5.8.0 is vulnerable to HTML Injection.
#ExploitObserverAlert
GHSA-gxg7-pxwf-9r28
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to GHSA-gxg7-pxwf-9r28. An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
GHSA-gxg7-pxwf-9r28
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to GHSA-gxg7-pxwf-9r28. An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
#ExploitObserverAlert
WLB-2024020035
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020035. Laravel Env file Access Open Directory.
WLB-2024020035
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020035. Laravel Env file Access Open Directory.
#ExploitObserverAlert
ZDI-24-097
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-097. Wazuh Log Collector Integer Underflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wazuh. Log Injection is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-42463.
ZDI-24-097
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-097. Wazuh Log Collector Integer Underflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wazuh. Log Injection is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-42463.
#ExploitObserverAlert
CVE-2024-22318
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22318. IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
FIRST-EPSS: 0.000450000
CVE-2024-22318
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22318. IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
ZDI-24-117
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-117. Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23115.
ZDI-24-117
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-117. Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23115.
#ExploitObserverAlert
EDB-51786
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51786. Zyxel zysh - Format string
EDB-51786
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51786. Zyxel zysh - Format string
#ExploitObserverAlert
PSS-177059
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177059. Red Hat Security Advisory 2024-0754-03. Red Hat Security Advisory 2024-0754-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.
PSS-177059
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177059. Red Hat Security Advisory 2024-0754-03. Red Hat Security Advisory 2024-0754-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.
#ExploitObserverAlert
PSS-177063
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177063. Red Hat Security Advisory 2024-0758-03. Red Hat Security Advisory 2024-0758-03 - An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
PSS-177063
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177063. Red Hat Security Advisory 2024-0758-03. Red Hat Security Advisory 2024-0758-03 - An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
#ExploitObserverAlert
CVE-2024-25448
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25448. An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
FIRST-EPSS: 0.000430000
CVE-2024-25448
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25448. An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2023-47020
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-47020. Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types.
FIRST-EPSS: 0.000430000
CVE-2023-47020
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-47020. Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
EDB-51788
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51788. Wordpress Augmented-Reality - Remote Code Execution Unauthenticated
EDB-51788
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51788. Wordpress Augmented-Reality - Remote Code Execution Unauthenticated
#ExploitObserverAlert
ZDI-24-107
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-107. Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22504.
ZDI-24-107
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-107. Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22504.
#ExploitObserverAlert
PSS-177064
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177064. Ubuntu Security Notice USN-6625-2. Ubuntu Security Notice 6625-2 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
PSS-177064
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177064. Ubuntu Security Notice USN-6625-2. Ubuntu Security Notice 6625-2 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.