#ExploitObserverAlert
GHSA-m295-r33q-79rg
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m295-r33q-79rg. An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
GHSA-m295-r33q-79rg
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m295-r33q-79rg. An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
#ExploitObserverAlert
WLB-2024010087
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010087. PHPJ-Callback-Widget-1.0-XSS-Reflected-admin-Hijacking.
WLB-2024010087
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010087. PHPJ-Callback-Widget-1.0-XSS-Reflected-admin-Hijacking.
#ExploitObserverAlert
GHSA-x4j2-fh47-r6r6
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-x4j2-fh47-r6r6. Alinto SOGo 5.8.0 is vulnerable to HTML Injection.
GHSA-x4j2-fh47-r6r6
DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-x4j2-fh47-r6r6. Alinto SOGo 5.8.0 is vulnerable to HTML Injection.
#ExploitObserverAlert
GHSA-gxg7-pxwf-9r28
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to GHSA-gxg7-pxwf-9r28. An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
GHSA-gxg7-pxwf-9r28
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to GHSA-gxg7-pxwf-9r28. An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
#ExploitObserverAlert
WLB-2024020035
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020035. Laravel Env file Access Open Directory.
WLB-2024020035
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020035. Laravel Env file Access Open Directory.
#ExploitObserverAlert
ZDI-24-097
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-097. Wazuh Log Collector Integer Underflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wazuh. Log Injection is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-42463.
ZDI-24-097
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-097. Wazuh Log Collector Integer Underflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wazuh. Log Injection is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-42463.
#ExploitObserverAlert
CVE-2024-22318
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22318. IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
FIRST-EPSS: 0.000450000
CVE-2024-22318
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22318. IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
ZDI-24-117
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-117. Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23115.
ZDI-24-117
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-117. Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23115.
#ExploitObserverAlert
EDB-51786
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51786. Zyxel zysh - Format string
EDB-51786
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51786. Zyxel zysh - Format string
#ExploitObserverAlert
PSS-177059
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177059. Red Hat Security Advisory 2024-0754-03. Red Hat Security Advisory 2024-0754-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.
PSS-177059
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177059. Red Hat Security Advisory 2024-0754-03. Red Hat Security Advisory 2024-0754-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.
#ExploitObserverAlert
PSS-177063
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177063. Red Hat Security Advisory 2024-0758-03. Red Hat Security Advisory 2024-0758-03 - An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
PSS-177063
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177063. Red Hat Security Advisory 2024-0758-03. Red Hat Security Advisory 2024-0758-03 - An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
#ExploitObserverAlert
CVE-2024-25448
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25448. An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
FIRST-EPSS: 0.000430000
CVE-2024-25448
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25448. An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2023-47020
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-47020. Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types.
FIRST-EPSS: 0.000430000
CVE-2023-47020
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-47020. Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
EDB-51788
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51788. Wordpress Augmented-Reality - Remote Code Execution Unauthenticated
EDB-51788
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51788. Wordpress Augmented-Reality - Remote Code Execution Unauthenticated
#ExploitObserverAlert
ZDI-24-107
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-107. Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22504.
ZDI-24-107
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-107. Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22504.
#ExploitObserverAlert
PSS-177064
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177064. Ubuntu Security Notice USN-6625-2. Ubuntu Security Notice 6625-2 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
PSS-177064
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177064. Ubuntu Security Notice USN-6625-2. Ubuntu Security Notice 6625-2 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
#ExploitObserverAlert
CVE-2024-24350
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24350. File Upload vulnerability in Software Publico e-Sic Livre v.2.0 and before allows a remote attacker to execute arbitrary code via the extension filtering component.
FIRST-EPSS: 0.000430000
CVE-2024-24350
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24350. File Upload vulnerability in Software Publico e-Sic Livre v.2.0 and before allows a remote attacker to execute arbitrary code via the extension filtering component.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
ZDI-24-108
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-108. Allegra saveInlineEdit Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2023-22528.
ZDI-24-108
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-108. Allegra saveInlineEdit Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2023-22528.
#ExploitObserverAlert
CVE-2024-24706
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24706. Cross-Site Request Forgery (CSRF) vulnerability in Forum One WP-CFM wp-cfm.This issue affects WP-CFM: from n/a through 1.7.8.
FIRST-EPSS: 0.000430000
CVE-2024-24706
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24706. Cross-Site Request Forgery (CSRF) vulnerability in Forum One WP-CFM wp-cfm.This issue affects WP-CFM: from n/a through 1.7.8.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
EDB-51789
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51789. Wordpress Seotheme - Remote Code Execution Unauthenticated
EDB-51789
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51789. Wordpress Seotheme - Remote Code Execution Unauthenticated
#ExploitObserverAlert
PSS-177051
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177051. Red Hat Security Advisory 2024-0748-03. Red Hat Security Advisory 2024-0748-03 - An update for the container-tools:4.0 module is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.
PSS-177051
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177051. Red Hat Security Advisory 2024-0748-03. Red Hat Security Advisory 2024-0748-03 - An update for the container-tools:4.0 module is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.