#ExploitObserverAlert
WLB-2024020034
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020034. Newgen Technologies SQL Injection Vulnerability.
WLB-2024020034
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020034. Newgen Technologies SQL Injection Vulnerability.
#ExploitObserverAlert
PSS-177050
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177050. Red Hat Security Advisory 2024-0746-03. Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.
PSS-177050
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177050. Red Hat Security Advisory 2024-0746-03. Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.
#ExploitObserverAlert
ZDI-24-104
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-104. Allegra saveFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22548.
ZDI-24-104
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-104. Allegra saveFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22548.
#ExploitObserverAlert
PSS-177069
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to PSS-177069. IBM i Access Client Solutions Remote Credential Theft. IBM i Access Client Solutions (ACS) versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 suffer from a remote credential theft vulnerability.
PSS-177069
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to PSS-177069. IBM i Access Client Solutions Remote Credential Theft. IBM i Access Client Solutions (ACS) versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 suffer from a remote credential theft vulnerability.
#ExploitObserverAlert
PSS-177052
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177052. Advanced Page Visit Counter 1.0 Cross Site Scripting. Advanced Page Visit Counter version 1.0 suffers from a persistent cross site scripting vulnerability.
PSS-177052
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177052. Advanced Page Visit Counter 1.0 Cross Site Scripting. Advanced Page Visit Counter version 1.0 suffers from a persistent cross site scripting vulnerability.
#ExploitObserverAlert
WLB-2024020037
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020037. Cacti pollers.php SQL Injection / Remote Code Execution.
WLB-2024020037
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020037. Cacti pollers.php SQL Injection / Remote Code Execution.
#ExploitObserverAlert
PSS-177070
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177070. Faraday 5.1.0. Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
PSS-177070
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177070. Faraday 5.1.0. Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
#ExploitObserverAlert
PSS-177053
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177053. Red Hat Security Advisory 2024-0749-03. Red Hat Security Advisory 2024-0749-03 - An update for unbound is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include an integer overflow vulnerability.
PSS-177053
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177053. Red Hat Security Advisory 2024-0749-03. Red Hat Security Advisory 2024-0749-03 - An update for unbound is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include an integer overflow vulnerability.
#ExploitObserverAlert
WLB-2024020038
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020038. chenarkhayyam SQL Injection.
WLB-2024020038
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020038. chenarkhayyam SQL Injection.
#ExploitObserverAlert
CVE-2024-24213
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24213. Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query.
FIRST-EPSS: 0.000450000
CVE-2024-24213
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24213. Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
CVE-2024-23749
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23749. KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
FIRST-EPSS: 0.000430000
CVE-2024-23749
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23749. KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
ZDI-24-116
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-116. Centreon updateLCARelation SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23116.
ZDI-24-116
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-116. Centreon updateLCARelation SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23116.
#ExploitObserverAlert
ZDI-24-098
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to ZDI-24-098. Schneider Electric Easergy Studio InitializeChannel Deserialization of Untrusted Data Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric Easergy Studio. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-7032.
ZDI-24-098
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to ZDI-24-098. Schneider Electric Easergy Studio InitializeChannel Deserialization of Untrusted Data Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric Easergy Studio. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-7032.
#ExploitObserverAlert
ZDI-24-105
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-105. Allegra loadFieldMatch Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22506.
ZDI-24-105
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-105. Allegra loadFieldMatch Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22506.
#ExploitObserverAlert
ZDI-24-112
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-112. Allegra downloadAttachmentGlobal Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-22507.
ZDI-24-112
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-112. Allegra downloadAttachmentGlobal Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-22507.
#ExploitObserverAlert
CVE-2024-22795
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-22795. Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 allows a local attacker to escalate privileges via the Recheck Compliance Status component.
FIRST-EPSS: 0.000450000
CVE-2024-22795
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-22795. Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 allows a local attacker to escalate privileges via the Recheck Compliance Status component.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
PSS-177057
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177057. Red Hat Security Advisory 2024-0753-03. Red Hat Security Advisory 2024-0753-03 - An update for linux-firmware is now available for Red Hat Enterprise Linux 7.
PSS-177057
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177057. Red Hat Security Advisory 2024-0753-03. Red Hat Security Advisory 2024-0753-03 - An update for linux-firmware is now available for Red Hat Enterprise Linux 7.
#ExploitObserverAlert
WLB-2024020039
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020039. SKC Infotech Admin Bypass & SQL Injection Vulnerability.
WLB-2024020039
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020039. SKC Infotech Admin Bypass & SQL Injection Vulnerability.
#ExploitObserverAlert
CVE-2024-23452
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-23452. Request smuggling vulnerability in HTTP server in Apache bRPC 0.9.5~1.7.0 on all platforms allows attacker to smuggle request. Vulnerability Cause Description: The http_parser does not comply with the RFC-7230 HTTP 1.1 specification. Attack scenario: If a message is received with both a Transfer-Encoding and a Content-Length header field, such a message might indicate an attempt to perform request smuggling or response splitting. One particular attack scenario is that a bRPC made http server on the backend receiving requests in one persistent connection from frontend server that uses TE to parse request with the logic that 'chunk' is contained in the TE field. in that case an attacker can smuggle a request into the connection to the backend server. Solution: You can choose one solution from below: 1. Upgrade bRPC to version 1.8.0, which fixes this issue. Download link: https://github.com/apache/brpc/releases/tag/1.8.0 2. Apply this patch: https://github.com/apache/brpc/pull/2518
FIRST-EPSS: 0.000450000
CVE-2024-23452
DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-23452. Request smuggling vulnerability in HTTP server in Apache bRPC 0.9.5~1.7.0 on all platforms allows attacker to smuggle request. Vulnerability Cause Description: The http_parser does not comply with the RFC-7230 HTTP 1.1 specification. Attack scenario: If a message is received with both a Transfer-Encoding and a Content-Length header field, such a message might indicate an attempt to perform request smuggling or response splitting. One particular attack scenario is that a bRPC made http server on the backend receiving requests in one persistent connection from frontend server that uses TE to parse request with the logic that 'chunk' is contained in the TE field. in that case an attacker can smuggle a request into the connection to the backend server. Solution: You can choose one solution from below: 1. Upgrade bRPC to version 1.8.0, which fixes this issue. Download link: https://github.com/apache/brpc/releases/tag/1.8.0 2. Apply this patch: https://github.com/apache/brpc/pull/2518
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
CVE-2024-25450
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25450. imlib2 v1.9.1 was discovered to mishandle memory allocation in the function init_imlib_fonts().
FIRST-EPSS: 0.000430000
CVE-2024-25450
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25450. imlib2 v1.9.1 was discovered to mishandle memory allocation in the function init_imlib_fonts().
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-24828
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24828. pkg is tool design to bundle Node.js projects into an executables. Any native code packages built by `pkg` are written to a hardcoded directory. On unix systems, this is `/tmp/pkg/*` which is a shared directory for all users on the same local system. There is no uniqueness to the package names within this directory, they are predictable. An attacker who has access to the same local system has the ability to replace the genuine executables in the shared directory with malicious executables of the same name. A user may then run the malicious executable without realising it has been modified. This package is deprecated. Therefore, there will not be a patch provided for this vulnerability. To check if your executable build by pkg depends on native code and is vulnerable, run the executable and check if `/tmp/pkg/` was created. Users should transition to actively maintained alternatives. We would recommend investigating Node.js 21’s support for single executable applications. Given the decision to deprecate the pkg package, there are no official workarounds or remediations provided by our team. Users should prioritize migrating to other packages that offer similar functionality with enhanced security.
FIRST-EPSS: 0.000430000
CVE-2024-24828
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24828. pkg is tool design to bundle Node.js projects into an executables. Any native code packages built by `pkg` are written to a hardcoded directory. On unix systems, this is `/tmp/pkg/*` which is a shared directory for all users on the same local system. There is no uniqueness to the package names within this directory, they are predictable. An attacker who has access to the same local system has the ability to replace the genuine executables in the shared directory with malicious executables of the same name. A user may then run the malicious executable without realising it has been modified. This package is deprecated. Therefore, there will not be a patch provided for this vulnerability. To check if your executable build by pkg depends on native code and is vulnerable, run the executable and check if `/tmp/pkg/` was created. Users should transition to actively maintained alternatives. We would recommend investigating Node.js 21’s support for single executable applications. Given the decision to deprecate the pkg package, there are no official workarounds or remediations provided by our team. Users should prioritize migrating to other packages that offer similar functionality with enhanced security.
FIRST-EPSS: 0.000430000