#ExploitObserverAlert
EDB-51803
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51803. Employee Management System v1 - 'email' SQL Injection
EDB-51803
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51803. Employee Management System v1 - 'email' SQL Injection
#ExploitObserverAlert
CVE-2024-25982
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25982. The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
CVE-2024-25982
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25982. The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
#ExploitObserverAlert
PSS-177208
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177208. Ubuntu Security Notice USN-6641-1. Ubuntu Security Notice 6641-1 - Harry Sintonen discovered that curl incorrectly handled mixed case cookie domains. A remote attacker could possibly use this issue to set cookies that get sent to different and unrelated sites and domains.
PSS-177208
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177208. Ubuntu Security Notice USN-6641-1. Ubuntu Security Notice 6641-1 - Harry Sintonen discovered that curl incorrectly handled mixed case cookie domains. A remote attacker could possibly use this issue to set cookies that get sent to different and unrelated sites and domains.
#ExploitObserverAlert
PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported. SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.
PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported. SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.
#ExploitObserverAlert
PSS-177216
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177216. Ubuntu Security Notice USN-6643-1. Ubuntu Security Notice 6643-1 - Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery attacks.
PSS-177216
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177216. Ubuntu Security Notice USN-6643-1. Ubuntu Security Notice 6643-1 - Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery attacks.
#ExploitObserverAlert
PSS-177207
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177207. Red Hat Security Advisory 2024-0903-03. Red Hat Security Advisory 2024-0903-03 - Red Hat AMQ Broker 7.10.6 is now available from the Red Hat Customer Portal. Issues addressed include a bypass vulnerability.
PSS-177207
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177207. Red Hat Security Advisory 2024-0903-03. Red Hat Security Advisory 2024-0903-03 - Red Hat AMQ Broker 7.10.6 is now available from the Red Hat Customer Portal. Issues addressed include a bypass vulnerability.
#ExploitObserverAlert
PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo. The system's SSH configuration poses a security risk by allowing weak Message Authentication Code (MAC) algorithms, potentially exposing it to vulnerabilities and unauthorized access. It is crucial to update and strengthen the MAC algorithms for enhanced security.
PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo. The system's SSH configuration poses a security risk by allowing weak Message Authentication Code (MAC) algorithms, potentially exposing it to vulnerabilities and unauthorized access. It is crucial to update and strengthen the MAC algorithms for enhanced security.
#ExploitObserverAlert
CVE-2023-5190
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-5190. Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
CVE-2023-5190
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-5190. Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
#ExploitObserverAlert
CVE-2023-44308
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44308. Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
CVE-2023-44308
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44308. Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
FIRST-EPSS: 0.000610000
#ExploitObserverAlert
CVE-2024-21892
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-21892. On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.
FIRST-EPSS: 0.000430000
CVE-2024-21892
DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-21892. On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
PSS-177204
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177204. Red Hat Security Advisory 2024-0893-03. Red Hat Security Advisory 2024-0893-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.
PSS-177204
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177204. Red Hat Security Advisory 2024-0893-03. Red Hat Security Advisory 2024-0893-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.
#ExploitObserverAlert
PSS-177215
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177215. Ubuntu Security Notice USN-6625-3. Ubuntu Security Notice 6625-3 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
PSS-177215
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177215. Ubuntu Security Notice USN-6625-3. Ubuntu Security Notice 6625-3 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
#ExploitObserverAlert
PSS-177209
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177209. Tourism Management System 2.0 Shell Upload. Tourism Management System version 2.0 suffers from a remote shell upload vulnerability.
PSS-177209
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177209. Tourism Management System 2.0 Shell Upload. Tourism Management System version 2.0 suffers from a remote shell upload vulnerability.
#ExploitObserverAlert
CVE-2024-25604
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25604. Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel.
CVE-2024-25604
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25604. Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel.
#ExploitObserverAlert
PSS-177210
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177210. Petrol Pump Management Software 1.0 Shell Upload. Petrol Pump Management Software version 1.0 suffers from a remote shell upload vulnerability.
PSS-177210
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177210. Petrol Pump Management Software 1.0 Shell Upload. Petrol Pump Management Software version 1.0 suffers from a remote shell upload vulnerability.
#ExploitObserverAlert
PSS-177200
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177200. Red Hat Security Advisory 2024-0881-03. Red Hat Security Advisory 2024-0881-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include null pointer, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
PSS-177200
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177200. Red Hat Security Advisory 2024-0881-03. Red Hat Security Advisory 2024-0881-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include null pointer, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
#ExploitObserverAlert
PSS-177213
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177213. Ubuntu Security Notice USN-6642-1. Ubuntu Security Notice 6642-1 - Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled parsing large DNS messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Bind incorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service.
PSS-177213
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177213. Ubuntu Security Notice USN-6642-1. Ubuntu Security Notice 6642-1 - Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled parsing large DNS messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Bind incorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service.
#ExploitObserverAlert
CVE-2024-1608
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1608. In OPPO Usercenter Credit SDK, there's a possible escalation of privilege due to loose permission check, This could lead to application internal information leak w/o user interaction.
CVE-2024-1608
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1608. In OPPO Usercenter Credit SDK, there's a possible escalation of privilege due to loose permission check, This could lead to application internal information leak w/o user interaction.
#ExploitObserverAlert
PSS-177198
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177198. Red Hat Security Advisory 2024-0879-03. Red Hat Security Advisory 2024-0879-03 - An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Issues addressed include denial of service and deserialization vulnerabilities.
PSS-177198
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177198. Red Hat Security Advisory 2024-0879-03. Red Hat Security Advisory 2024-0879-03 - An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Issues addressed include denial of service and deserialization vulnerabilities.
#ExploitObserverAlert
CVE-2024-21890
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21890. The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
FIRST-EPSS: 0.000430000
CVE-2024-21890
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21890. The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example: ``` --allow-fs-read=/home/node/.ssh/*.pub ``` will ignore `pub` and give access to everything after `.ssh/`. This misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2022-48625
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-48625. Yealink Config Encrypt Tool add RSA before 1.2 has a built-in RSA key pair, and thus there is a risk of decryption by an adversary.
FIRST-EPSS: 0.000430000
CVE-2022-48625
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-48625. Yealink Config Encrypt Tool add RSA before 1.2 has a built-in RSA key pair, and thus there is a risk of decryption by an adversary.
FIRST-EPSS: 0.000430000