#ExploitObserverAlert
WLB-2024020100
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020100. Source Guardian Cross Site Scripting.
WLB-2024020100
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020100. Source Guardian Cross Site Scripting.
#ExploitObserverAlert
WLB-2024020101
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020101. Saflok System 6000 Key Derivation.
WLB-2024020101
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020101. Saflok System 6000 Key Derivation.
#ExploitObserverAlert
WLB-2024020103
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020103. WP Fastest Cache 1.2.2 Unauthenticated SQL Injection.
WLB-2024020103
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020103. WP Fastest Cache 1.2.2 Unauthenticated SQL Injection.
#ExploitObserverAlert
PD/http/cves/2023/CVE-2023-6895
DESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.
PD/http/cves/2023/CVE-2023-6895
DESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.
#ExploitObserverAlert
BDU:2024-01665
DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to BDU:2024-01665. Vulnerability of the Ultimate Member plugin in the content management system of the WordPress website, allowing an attacker to execute arbitrary SQL queries to the database. The vulnerability of the Ultimate Member plugin in the content management system of the WordPress website is related to the lack of measures to protect the SQL query structure. Exploiting the vulnerability may allow a remote attacker to execute arbitrary SQL queries to the database.
BDU:2024-01665
DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to BDU:2024-01665. Vulnerability of the Ultimate Member plugin in the content management system of the WordPress website, allowing an attacker to execute arbitrary SQL queries to the database. The vulnerability of the Ultimate Member plugin in the content management system of the WordPress website is related to the lack of measures to protect the SQL query structure. Exploiting the vulnerability may allow a remote attacker to execute arbitrary SQL queries to the database.
#ExploitObserverAlert
MSF/exploit_multi/http/cve_2023_38836_boidcms
DESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.
MSF/exploit_multi/http/cve_2023_38836_boidcms
DESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.
#CyberNewsAlert
The Cyber Security Research and Development (CSRD) Group at Ministry of Electronics & Information Technology (MEITY) of India invites R&D proposals in Cybersecurity with focus on innovation & indigenous technology development leading to productization.
https://www.meity.gov.in/content/call-project-proposals-rd-cyber-security/
The Cyber Security Research and Development (CSRD) Group at Ministry of Electronics & Information Technology (MEITY) of India invites R&D proposals in Cybersecurity with focus on innovation & indigenous technology development leading to productization.
https://www.meity.gov.in/content/call-project-proposals-rd-cyber-security/
#ExploitObserverAlert
CVE-2024-27199
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
FIRST-EPSS: 0.000430000
CVE-2024-27199
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-27198
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
FIRST-EPSS: 0.000430000
CVE-2024-27198
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-22252
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22252. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
CVE-2024-22252
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22252. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
#ExploitObserverAlert
CVE-2024-23296
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23296. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
CVE-2024-23296
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23296. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
#ExploitObserverAlert
GHSA-9vg9-x38g-9hfx
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to GHSA-9vg9-x38g-9hfx. Jenkins allows attackers to determine whether a user exists
GHSA-9vg9-x38g-9hfx
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to GHSA-9vg9-x38g-9hfx. Jenkins allows attackers to determine whether a user exists
#ExploitObserverAlert
CVE-2024-22253
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22253. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
CVE-2024-22253
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22253. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
#ExploitObserverAlert
EDB-51858
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51858. Neontext Wordpress Plugin - Stored XSS
EDB-51858
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51858. Neontext Wordpress Plugin - Stored XSS
#ExploitObserverAlert
CVE-2024-22254
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22254. VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.
CVE-2024-22254
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22254. VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.
#ExploitObserverAlert
CVE-2024-22255
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22255. VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
CVE-2024-22255
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22255. VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
#ExploitObserverAlert
EDB-51857
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51857. Solar-Log 200 PM+ 3.6.0 Build 99 - 15.10.2019 - Stored XSS
EDB-51857
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51857. Solar-Log 200 PM+ 3.6.0 Build 99 - 15.10.2019 - Stored XSS
#ExploitObserverAlert
GHSA-jw44-4f3j-q396
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-jw44-4f3j-q396. Helm shows secrets in clear text
GHSA-jw44-4f3j-q396
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-jw44-4f3j-q396. Helm shows secrets in clear text
#ExploitObserverAlert
CVE-2024-23225
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23225. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
CVE-2024-23225
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23225. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
#ExploitObserverAlert
CVE-2024-24783
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24783. Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
FIRST-EPSS: 0.000450000
CVE-2024-24783
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24783. Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
PD/http/cves/2024/CVE-2024-27198
DESCRIPTION: Exploit Observer has 69 entries in 7 file formats related to PD/http/cves/2024/CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
PD/http/cves/2024/CVE-2024-27198
DESCRIPTION: Exploit Observer has 69 entries in 7 file formats related to PD/http/cves/2024/CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible