#ExploitObserverAlert
CVE-2024-20337
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20337. A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
FIRST-EPSS: 0.000430000
CVE-2024-20337
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20337. A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
BDU:2024-01792
DESCRIPTION: Exploit Observer has 75 entries in 7 file formats related to BDU:2024-01792. TeamCity JetBrains continuous integration and delivery (CI/CD) system vulnerability related to bypassing the authentication procedure using an alternative path or channel, allowing an attacker to execute arbitrary code. Vulnerability in JetBrains TeamCity's continuous integration and delivery (CI/CD) system is related to bypassing the authentication procedure using an alternative path or channel. Exploiting the vulnerability may allow a remote attacker to execute arbitrary code with elevated privileges.
BDU:2024-01792
DESCRIPTION: Exploit Observer has 75 entries in 7 file formats related to BDU:2024-01792. TeamCity JetBrains continuous integration and delivery (CI/CD) system vulnerability related to bypassing the authentication procedure using an alternative path or channel, allowing an attacker to execute arbitrary code. Vulnerability in JetBrains TeamCity's continuous integration and delivery (CI/CD) system is related to bypassing the authentication procedure using an alternative path or channel. Exploiting the vulnerability may allow a remote attacker to execute arbitrary code with elevated privileges.
#ExploitObserverAlert
EDB-51863
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51863. CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution
EDB-51863
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51863. CSZ CMS Version 1.3.0 - Authenticated Remote Command Execution
#ExploitObserverAlert
CVE-2024-20346
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20346. A vulnerability in the web-based management interface of Cisco AppDynamics Controller could allow an authenticated, remote attacker to perform a reflected cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
FIRST-EPSS: 0.000430000
CVE-2024-20346
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20346. A vulnerability in the web-based management interface of Cisco AppDynamics Controller could allow an authenticated, remote attacker to perform a reflected cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
BDU:2024-01793
DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to BDU:2024-01793. Vulnerability in the functions get_system_log and get_crash_log of the logread module of the microcode software for GL.iNet A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, B1300 routers, allowing an attacker to execute arbitrary code. Vulnerability in the functions get_system_log and get_crash_log of the logread module of the microcode software for GL.iNet A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, B1300 routers exists due to the failure to neutralize special elements used in the operating system command. Exploitation of the vulnerability could allow an attacker to execute arbitrary code
BDU:2024-01793
DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to BDU:2024-01793. Vulnerability in the functions get_system_log and get_crash_log of the logread module of the microcode software for GL.iNet A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, B1300 routers, allowing an attacker to execute arbitrary code. Vulnerability in the functions get_system_log and get_crash_log of the logread module of the microcode software for GL.iNet A1300, AX1800, AXT1800, MT3000, MT2500, MT6000, MT1300, MT300N-V2, AR750S, AR750, AR300M, B1300 routers exists due to the failure to neutralize special elements used in the operating system command. Exploitation of the vulnerability could allow an attacker to execute arbitrary code
#ExploitObserverAlert
CVE-2024-2174
DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2174. Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
FIRST-EPSS: 0.000430000
CVE-2024-2174
DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-2174. Inappropriate implementation in V8 in Google Chrome prior to 122.0.6261.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
EDB-51860
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51860. Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution
EDB-51860
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51860. Lot Reservation Management System - Unauthenticated File Upload and Remote Code Execution
#ExploitObserverAlert
CVE-2024-1931
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1931. NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely.
CVE-2024-1931
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1931. NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely.
#ExploitObserverAlert
WLB-2024030021
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030021. Sandhya Branding Agency - Sql Injection.
WLB-2024030021
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030021. Sandhya Branding Agency - Sql Injection.
#ExploitObserverAlert
PSS-177516
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to PSS-177516. Hitachi NAS SMU Backup And Restore Insecure Direct Object Reference. Hitachi NAS SMU Backup and Restore versions prior to 14.8.7825.01 suffer from an insecure direct object reference vulnerability.
PSS-177516
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to PSS-177516. Hitachi NAS SMU Backup And Restore Insecure Direct Object Reference. Hitachi NAS SMU Backup and Restore versions prior to 14.8.7825.01 suffer from an insecure direct object reference vulnerability.
#ExploitObserverAlert
EDB-51869
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51869. Ladder v0.0.21 - Server-side request forgery (SSRF)
EDB-51869
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51869. Ladder v0.0.21 - Server-side request forgery (SSRF)
#ExploitObserverAlert
WLB-2024030023
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030023. Backdoor.Win32.Beastdoor.oq / Unauthenticated Remote Command Execution.
WLB-2024030023
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030023. Backdoor.Win32.Beastdoor.oq / Unauthenticated Remote Command Execution.
#ExploitObserverAlert
WLB-2024030016
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030016. Artica Proxy 4.50 Unauthenticated PHP Deserialization.
WLB-2024030016
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030016. Artica Proxy 4.50 Unauthenticated PHP Deserialization.
#ExploitObserverAlert
EDB-51875
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51875. Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier - Arbitrary File Read
EDB-51875
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51875. Adobe ColdFusion versions 2018_15 (and earlier) and 2021_5 and earlier - Arbitrary File Read
#ExploitObserverAlert
WLB-2024030015
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030015. FullCourt Enterprise 8.2 Cross Site Scripting.
WLB-2024030015
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030015. FullCourt Enterprise 8.2 Cross Site Scripting.
#ExploitObserverAlert
GHSA-r84p-88g2-2vx2
DESCRIPTION: Exploit Observer has 33 entries in 9 file formats related to GHSA-r84p-88g2-2vx2. Apache Tomcat EncryptInterceptor error leads to Uncontrolled Resource Consumption
GHSA-r84p-88g2-2vx2
DESCRIPTION: Exploit Observer has 33 entries in 9 file formats related to GHSA-r84p-88g2-2vx2. Apache Tomcat EncryptInterceptor error leads to Uncontrolled Resource Consumption
#ExploitObserverAlert
WLB-2024030017
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030017. WordPress Hide My WP SQL Injection.
WLB-2024030017
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030017. WordPress Hide My WP SQL Injection.
#ExploitObserverAlert
WLB-2024030014
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030014. NDtaskmatic-1.0-by-Mayuri.K Multiple-SQLi.
WLB-2024030014
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030014. NDtaskmatic-1.0-by-Mayuri.K Multiple-SQLi.
#ExploitObserverAlert
EDB-51868
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51868. DataCube3 v1.0 - Unrestricted file upload 'RCE'
EDB-51868
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51868. DataCube3 v1.0 - Unrestricted file upload 'RCE'
#ExploitObserverAlert
WLB-2024030024
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030024. RUPPEINVOICE-1.0 Multiple-SQLi.
WLB-2024030024
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030024. RUPPEINVOICE-1.0 Multiple-SQLi.
#ExploitObserverAlert
EDB-51876
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51876. Sitecore - Remote Code Execution v8.2
EDB-51876
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51876. Sitecore - Remote Code Execution v8.2