#ExploitObserverAlert
EDB-51805
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51805. Wondercms 4.3.2 - XSS to RCE
EDB-51805
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51805. Wondercms 4.3.2 - XSS to RCE
#ExploitObserverAlert
EDB-51802
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51802. Microsoft Windows Defender - VBScript Detection Bypass
EDB-51802
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51802. Microsoft Windows Defender - VBScript Detection Bypass
#ExploitObserverAlert
CVE-2024-25979
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25979. The URL parameters accepted by forum search were not limited to the allowed parameters.
CVE-2024-25979
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25979. The URL parameters accepted by forum search were not limited to the allowed parameters.
#ExploitObserverAlert
CVE-2024-1344
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1344. Encrypted database credentials in LaborOfficeFree affecting version 19.10. This vulnerability allows an attacker to read and extract the username and password from the database of 'LOF_service.exe' and 'LaborOfficeFree.exe' located in the '%programfiles(x86)%\LaborOfficeFree\' directory. This user can log in remotely and has root-like privileges.
CVE-2024-1344
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1344. Encrypted database credentials in LaborOfficeFree affecting version 19.10. This vulnerability allows an attacker to read and extract the username and password from the database of 'LOF_service.exe' and 'LaborOfficeFree.exe' located in the '%programfiles(x86)%\LaborOfficeFree\' directory. This user can log in remotely and has root-like privileges.
#ExploitObserverAlert
CVE-2024-1580
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1580. An integer overflow in dav1d AV1 decoder that can occur when decoding videos with large frame size. This can lead to memory corruption within the AV1 decoder. We recommend upgrading past version 1.4.0 of dav1d.
CVE-2024-1580
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1580. An integer overflow in dav1d AV1 decoder that can occur when decoding videos with large frame size. This can lead to memory corruption within the AV1 decoder. We recommend upgrading past version 1.4.0 of dav1d.
#ExploitObserverAlert
CVE-2024-1343
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1343. A weak permission was found in the backup directory in LaborOfficeFree affecting version 19.10. This vulnerability allows any authenticated user to read backup files in the directory '%programfiles(x86)% LaborOfficeFree BackUp'.
CVE-2024-1343
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1343. A weak permission was found in the backup directory in LaborOfficeFree affecting version 19.10. This vulnerability allows any authenticated user to read backup files in the directory '%programfiles(x86)% LaborOfficeFree BackUp'.
#ExploitObserverAlert
CVE-2024-25625
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25625. Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.
CVE-2024-25625
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25625. Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.
#ExploitObserverAlert
CVE-2024-1345
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1345. Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to perform a brute force attack and easily discover the root password.
CVE-2024-1345
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1345. Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to perform a brute force attack and easily discover the root password.
#ExploitObserverAlert
EDB-51803
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51803. Employee Management System v1 - 'email' SQL Injection
EDB-51803
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51803. Employee Management System v1 - 'email' SQL Injection
#ExploitObserverAlert
CVE-2024-25982
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25982. The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
CVE-2024-25982
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25982. The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
#ExploitObserverAlert
PSS-177208
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177208. Ubuntu Security Notice USN-6641-1. Ubuntu Security Notice 6641-1 - Harry Sintonen discovered that curl incorrectly handled mixed case cookie domains. A remote attacker could possibly use this issue to set cookies that get sent to different and unrelated sites and domains.
PSS-177208
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177208. Ubuntu Security Notice USN-6641-1. Ubuntu Security Notice 6641-1 - Harry Sintonen discovered that curl incorrectly handled mixed case cookie domains. A remote attacker could possibly use this issue to set cookies that get sent to different and unrelated sites and domains.
#ExploitObserverAlert
PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported. SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.
PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported. SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.
#ExploitObserverAlert
PSS-177216
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177216. Ubuntu Security Notice USN-6643-1. Ubuntu Security Notice 6643-1 - Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery attacks.
PSS-177216
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177216. Ubuntu Security Notice USN-6643-1. Ubuntu Security Notice 6643-1 - Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery attacks.
#ExploitObserverAlert
PSS-177207
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177207. Red Hat Security Advisory 2024-0903-03. Red Hat Security Advisory 2024-0903-03 - Red Hat AMQ Broker 7.10.6 is now available from the Red Hat Customer Portal. Issues addressed include a bypass vulnerability.
PSS-177207
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177207. Red Hat Security Advisory 2024-0903-03. Red Hat Security Advisory 2024-0903-03 - Red Hat AMQ Broker 7.10.6 is now available from the Red Hat Customer Portal. Issues addressed include a bypass vulnerability.
#ExploitObserverAlert
PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo. The system's SSH configuration poses a security risk by allowing weak Message Authentication Code (MAC) algorithms, potentially exposing it to vulnerabilities and unauthorized access. It is crucial to update and strengthen the MAC algorithms for enhanced security.
PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo. The system's SSH configuration poses a security risk by allowing weak Message Authentication Code (MAC) algorithms, potentially exposing it to vulnerabilities and unauthorized access. It is crucial to update and strengthen the MAC algorithms for enhanced security.
#ExploitObserverAlert
CVE-2023-5190
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-5190. Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
CVE-2023-5190
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-5190. Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
#ExploitObserverAlert
CVE-2023-44308
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44308. Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
CVE-2023-44308
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44308. Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
#ExploitObserverAlert
CVE-2024-21892
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-21892. On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.
FIRST-EPSS: 0.000430000
CVE-2024-21892
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-21892. On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
PSS-177204
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177204. Red Hat Security Advisory 2024-0893-03. Red Hat Security Advisory 2024-0893-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.
PSS-177204
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177204. Red Hat Security Advisory 2024-0893-03. Red Hat Security Advisory 2024-0893-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.
#ExploitObserverAlert
PSS-177215
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177215. Ubuntu Security Notice USN-6625-3. Ubuntu Security Notice 6625-3 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
PSS-177215
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177215. Ubuntu Security Notice USN-6625-3. Ubuntu Security Notice 6625-3 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
#ExploitObserverAlert
PSS-177209
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177209. Tourism Management System 2.0 Shell Upload. Tourism Management System version 2.0 suffers from a remote shell upload vulnerability.
PSS-177209
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177209. Tourism Management System 2.0 Shell Upload. Tourism Management System version 2.0 suffers from a remote shell upload vulnerability.