#ExploitObserverAlert
PSS-177214
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177214. Kafka UI 0.7.1 Command Injection. A command injection vulnerability exists in Kafka UI versions 0.4.0 through 0.7.1 that allows an attacker to inject and execute arbitrary shell commands via the groovy filter parameter at the topic section.
PSS-177214
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177214. Kafka UI 0.7.1 Command Injection. A command injection vulnerability exists in Kafka UI versions 0.4.0 through 0.7.1 that allows an attacker to inject and execute arbitrary shell commands via the groovy filter parameter at the topic section.
#ExploitObserverAlert
CVE-2024-25973
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25973. The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser.
CVE-2024-25973
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25973. The Frentix GmbH OpenOlat LMS is affected by multiple stored Cross-Site Scripting (XSS) vulnerabilities. An attacker with rights to create or edit groups can create a course with a name that contains an XSS payload. Furthermore, attackers with the permissions to create or rename a catalog (sub-category) can enter unfiltered input in the name field. In addition, attackers who are allowed to create curriculums can also enter unfiltered input in the name field. This allows an attacker to execute stored JavaScript code with the permissions of the victim in the context of the user's browser.
#ExploitObserverAlert
CVE-2024-1651
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1651. Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.
FIRST-EPSS: 0.000710000
NVD-IS: 6.0
NVD-ES: 3.9
CVE-2024-1651
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1651. Torrentpier version 2.4.1 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to insecure deserialization.
FIRST-EPSS: 0.000710000
NVD-IS: 6.0
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2024-22019
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-22019. A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
FIRST-EPSS: 0.000430000
CVE-2024-22019
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-22019. A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
PSS-177212
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177212. Savsoft Quiz 6.0 Enterprise Cross Site Scripting. Savsoft Quiz version 6.0 Enterprise suffers from a persistent cross site scripting vulnerability.
PSS-177212
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177212. Savsoft Quiz 6.0 Enterprise Cross Site Scripting. Savsoft Quiz version 6.0 Enterprise suffers from a persistent cross site scripting vulnerability.
#ExploitObserverAlert
PSS-177201
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177201. Red Hat Security Advisory 2024-0887-03. Red Hat Security Advisory 2024-0887-03 - An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.
PSS-177201
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177201. Red Hat Security Advisory 2024-0887-03. Red Hat Security Advisory 2024-0887-03 - An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.
#ExploitObserverAlert
TALOS-2024-1931
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to TALOS-2024-1931. Contact Cisco Talos Incident Response.
TALOS-2024-1931
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to TALOS-2024-1931. Contact Cisco Talos Incident Response.
#ExploitObserverAlert
TALOS-2023-1828
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to TALOS-2023-1828. Contact Cisco Talos Incident Response.
TALOS-2023-1828
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to TALOS-2023-1828. Contact Cisco Talos Incident Response.
#ExploitObserverAlert
PD/javascript/misconfiguration/smb/smb-signing-not-required
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/smb/smb-signing-not-required. Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
PD/javascript/misconfiguration/smb/smb-signing-not-required
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/smb/smb-signing-not-required. Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
#ExploitObserverAlert
CVE-2024-1297
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1297. Loomio version 2.22.0 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to OS Command Injection.
FIRST-EPSS: 0.000660000
NVD-IS: 6.0
NVD-ES: 3.9
CVE-2024-1297
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1297. Loomio version 2.22.0 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to OS Command Injection.
FIRST-EPSS: 0.000660000
NVD-IS: 6.0
NVD-ES: 3.9
#ExploitObserverAlert
PD/javascript/misconfiguration/smb/smb-shares
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/smb/smb-shares. Attempts to list shares using the srvsvc.NetShareEnumAll MSRPC function and retrieve more information about them using srvsvc.NetShareGetInfo. If access to those functions is denied, a list of common share names are checked.
PD/javascript/misconfiguration/smb/smb-shares
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/smb/smb-shares. Attempts to list shares using the srvsvc.NetShareEnumAll MSRPC function and retrieve more information about them using srvsvc.NetShareGetInfo. If access to those functions is denied, a list of common share names are checked.
#ExploitObserverAlert
PSS-177196
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177196. Red Hat Security Advisory 2024-0866-03. Red Hat Security Advisory 2024-0866-03 - An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8. Issues addressed include denial of service and deserialization vulnerabilities.
PSS-177196
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177196. Red Hat Security Advisory 2024-0866-03. Red Hat Security Advisory 2024-0866-03 - An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8. Issues addressed include denial of service and deserialization vulnerabilities.
#ExploitObserverAlert
PSS-177206
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177206. Red Hat Security Advisory 2024-0897-03. Red Hat Security Advisory 2024-0897-03 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include null pointer, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
PSS-177206
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177206. Red Hat Security Advisory 2024-0897-03. Red Hat Security Advisory 2024-0897-03 - An update for kernel is now available for Red Hat Enterprise Linux 8. Issues addressed include null pointer, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
#ExploitObserverAlert
CVE-2024-0715
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-0715. Expression Language Injection vulnerability in Hitachi Global Link Manager on Windows allows Code Injection.This issue affects Hitachi Global Link Manager: before 8.8.7-03.
FIRST-EPSS: 0.000610000
CVE-2024-0715
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-0715. Expression Language Injection vulnerability in Hitachi Global Link Manager on Windows allows Code Injection.This issue affects Hitachi Global Link Manager: before 8.8.7-03.
FIRST-EPSS: 0.000610000
#ExploitObserverAlert
CVE-2024-21896
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21896. The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
FIRST-EPSS: 0.000430000
CVE-2024-21896
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21896. The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
PSS-177205
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177205. Red Hat Security Advisory 2024-0894-03. Red Hat Security Advisory 2024-0894-03 - An update for the mysql:8.0 module is now available for Red Hat Enterprise Linux 8.
PSS-177205
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177205. Red Hat Security Advisory 2024-0894-03. Red Hat Security Advisory 2024-0894-03 - An update for the mysql:8.0 module is now available for Red Hat Enterprise Linux 8.
#ExploitObserverAlert
TALOS-2023-1829
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to TALOS-2023-1829. Contact Cisco Talos Incident Response.
TALOS-2023-1829
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to TALOS-2023-1829. Contact Cisco Talos Incident Response.
#ExploitObserverAlert
CVE-2022-45320
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-45320. Liferay Portal before 7.4.3.16 and Liferay DXP before 7.2 fix pack 19, 7.3 before update 6, and 7.4 before update 16 allow remote authenticated users to become the owner of a wiki page by editing the wiki page.
FIRST-EPSS: 0.000430000
CVE-2022-45320
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-45320. Liferay Portal before 7.4.3.16 and Liferay DXP before 7.2 fix pack 19, 7.3 before update 6, and 7.4 before update 16 allow remote authenticated users to become the owner of a wiki page by editing the wiki page.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2023-6764
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-6764. A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration.
FIRST-EPSS: 0.000430000
CVE-2023-6764
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-6764. A format string vulnerability in a function of the IPSec VPN feature in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, and USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1 could allow an attacker to achieve unauthorized remote code execution by sending a sequence of specially crafted payloads containing an invalid pointer; however, such an attack would require detailed knowledge of an affected device’s memory layout and configuration.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
PD/javascript/misconfiguration/ssh/ssh-weak-public-key
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-public-key. SSH host keys with a bit length below 2048 are deemed weak, posing an increased vulnerability to security threats. Employing robust key lengths is crucial for fortifying the integrity of encrypted communication and thwarting potential exploits.
PD/javascript/misconfiguration/ssh/ssh-weak-public-key
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-public-key. SSH host keys with a bit length below 2048 are deemed weak, posing an increased vulnerability to security threats. Employing robust key lengths is crucial for fortifying the integrity of encrypted communication and thwarting potential exploits.
#ExploitObserverAlert
CVE-2024-21891
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21891. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
FIRST-EPSS: 0.000430000
CVE-2024-21891
DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21891. Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
FIRST-EPSS: 0.000430000