#ExploitObserverAlert
WLB-2024020094
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020094. Ficus Global - Blind Sql Injection.
WLB-2024020094
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020094. Ficus Global - Blind Sql Injection.
#ExploitObserverAlert
WLB-2024020092
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020092. WordPress WP Fastest Cache 1.2.2 SQL Injection.
WLB-2024020092
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020092. WordPress WP Fastest Cache 1.2.2 SQL Injection.
#ExploitObserverAlert
WLB-2024020095
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020095. Agencia NUBA- Sql Injection.
WLB-2024020095
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020095. Agencia NUBA- Sql Injection.
#ExploitObserverAlert
PD/http/cves/2015/CVE-2015-1635
DESCRIPTION: Exploit Observer has 64 entries in 15 file formats related to PD/http/cves/2015/CVE-2015-1635. HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
PD/http/cves/2015/CVE-2015-1635
DESCRIPTION: Exploit Observer has 64 entries in 15 file formats related to PD/http/cves/2015/CVE-2015-1635. HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
#ExploitObserverAlert
WLB-2024020093
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020093. Blood Bank 1.0 SQL Injection.
WLB-2024020093
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020093. Blood Bank 1.0 SQL Injection.
#ExploitObserverAlert
WLB-2024020099
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020099. Backdoor.Win32.Agent.amt / Authentication Bypass.
WLB-2024020099
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020099. Backdoor.Win32.Agent.amt / Authentication Bypass.
#ExploitObserverAlert
WLB-2024020102
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020102. Moodle 4.3 Insecure Direct Object Reference.
WLB-2024020102
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020102. Moodle 4.3 Insecure Direct Object Reference.
#ExploitObserverAlert
WLB-2024020098
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020098. Backdoor.Win32.Agent.amt MVID-2024-0673 Authentication Bypass / Code Execution.
WLB-2024020098
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020098. Backdoor.Win32.Agent.amt MVID-2024-0673 Authentication Bypass / Code Execution.
#ExploitObserverAlert
WLB-2024020096
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020096. WordPress IDonate Blood Request Management System 1.8.1 Cross Site Scripting.
WLB-2024020096
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020096. WordPress IDonate Blood Request Management System 1.8.1 Cross Site Scripting.
#ExploitObserverAlert
WLB-2024020097
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020097. Backdoor.Win32.Jeemp.c / Cleartext Hardcoded Credentials.
WLB-2024020097
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020097. Backdoor.Win32.Jeemp.c / Cleartext Hardcoded Credentials.
#ExploitObserverAlert
WLB-2024020100
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020100. Source Guardian Cross Site Scripting.
WLB-2024020100
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020100. Source Guardian Cross Site Scripting.
#ExploitObserverAlert
WLB-2024020101
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020101. Saflok System 6000 Key Derivation.
WLB-2024020101
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020101. Saflok System 6000 Key Derivation.
#ExploitObserverAlert
WLB-2024020103
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020103. WP Fastest Cache 1.2.2 Unauthenticated SQL Injection.
WLB-2024020103
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020103. WP Fastest Cache 1.2.2 Unauthenticated SQL Injection.
#ExploitObserverAlert
PD/http/cves/2023/CVE-2023-6895
DESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.
PD/http/cves/2023/CVE-2023-6895
DESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.
#ExploitObserverAlert
BDU:2024-01665
DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to BDU:2024-01665. Vulnerability of the Ultimate Member plugin in the content management system of the WordPress website, allowing an attacker to execute arbitrary SQL queries to the database. The vulnerability of the Ultimate Member plugin in the content management system of the WordPress website is related to the lack of measures to protect the SQL query structure. Exploiting the vulnerability may allow a remote attacker to execute arbitrary SQL queries to the database.
BDU:2024-01665
DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to BDU:2024-01665. Vulnerability of the Ultimate Member plugin in the content management system of the WordPress website, allowing an attacker to execute arbitrary SQL queries to the database. The vulnerability of the Ultimate Member plugin in the content management system of the WordPress website is related to the lack of measures to protect the SQL query structure. Exploiting the vulnerability may allow a remote attacker to execute arbitrary SQL queries to the database.
#ExploitObserverAlert
MSF/exploit_multi/http/cve_2023_38836_boidcms
DESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.
MSF/exploit_multi/http/cve_2023_38836_boidcms
DESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.
#CyberNewsAlert
The Cyber Security Research and Development (CSRD) Group at Ministry of Electronics & Information Technology (MEITY) of India invites R&D proposals in Cybersecurity with focus on innovation & indigenous technology development leading to productization.
https://www.meity.gov.in/content/call-project-proposals-rd-cyber-security/
The Cyber Security Research and Development (CSRD) Group at Ministry of Electronics & Information Technology (MEITY) of India invites R&D proposals in Cybersecurity with focus on innovation & indigenous technology development leading to productization.
https://www.meity.gov.in/content/call-project-proposals-rd-cyber-security/
#ExploitObserverAlert
CVE-2024-27199
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
FIRST-EPSS: 0.000430000
CVE-2024-27199
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-27198
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
FIRST-EPSS: 0.000430000
CVE-2024-27198
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-22252
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22252. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
CVE-2024-22252
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22252. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
#ExploitObserverAlert
CVE-2024-23296
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23296. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
CVE-2024-23296
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23296. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.