#ExploitObserverAlert
SSVID-99817
DESCRIPTION: Exploit Observer has 15 entries in 2 file formats related to SSVID-99817.
SSVID-99817
DESCRIPTION: Exploit Observer has 15 entries in 2 file formats related to SSVID-99817.
#ExploitObserverAlert
EDB-51879
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51879. OSGi v3.7.2 (and below) Console - RCE
EDB-51879
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51879. OSGi v3.7.2 (and below) Console - RCE
#ExploitObserverAlert
BDU:2024-01908
DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-01908. Vulnerability of the coders/tiff.c component of the ImageMagick console graphics editor, allowing an attacker to cause a denial of service. Vulnerability of the coders/tiff.c component of the ImageMagick console graphics editor is related to buffer overflow. Exploiting the vulnerability could allow an attacker to cause a denial of service.
BDU:2024-01908
DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-01908. Vulnerability of the coders/tiff.c component of the ImageMagick console graphics editor, allowing an attacker to cause a denial of service. Vulnerability of the coders/tiff.c component of the ImageMagick console graphics editor is related to buffer overflow. Exploiting the vulnerability could allow an attacker to cause a denial of service.
#ExploitObserverAlert
BDU:2024-01900
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to BDU:2024-01900. Vulnerability of the Magick::Draw function of the command-line graphics editor ImageMagick, allowing an attacker to cause a denial of service. Vulnerability of the Magick::Draw function of the command-line graphics editor ImageMagick is related to memory release errors. Exploiting the vulnerability can allow an attacker to cause a denial of service.
BDU:2024-01900
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to BDU:2024-01900. Vulnerability of the Magick::Draw function of the command-line graphics editor ImageMagick, allowing an attacker to cause a denial of service. Vulnerability of the Magick::Draw function of the command-line graphics editor ImageMagick is related to memory release errors. Exploiting the vulnerability can allow an attacker to cause a denial of service.
#ExploitObserverAlert
GHSA-8r3f-844c-mc37
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to GHSA-8r3f-844c-mc37. Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON
GHSA-8r3f-844c-mc37
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to GHSA-8r3f-844c-mc37. Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON
#ExploitObserverAlert
CVE-2024-1234
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to CVE-2024-1234. The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via data attribute in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
FIRST-EPSS: 0.000430000
CVE-2024-1234
DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to CVE-2024-1234. The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via data attribute in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
SSVID-99817
DESCRIPTION: Exploit Observer has 15 entries in 2 file formats related to SSVID-99817. SolarWinds Security Event Manager AMF deserialization RCE (CVE-2024-0692)
SSVID-99817
DESCRIPTION: Exploit Observer has 15 entries in 2 file formats related to SSVID-99817. SolarWinds Security Event Manager AMF deserialization RCE (CVE-2024-0692)
#ExploitObserverAlert
CVE-2024-1071
DESCRIPTION: Exploit Observer has 12 entries in 7 file formats related to CVE-2024-1071. The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
FIRST-EPSS: 0.000630000
CVE-2024-1071
DESCRIPTION: Exploit Observer has 12 entries in 7 file formats related to CVE-2024-1071. The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
FIRST-EPSS: 0.000630000
#ExploitObserverAlert
WLB-2024030026
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030026. OSGi 3.18 Remote Code Execution.
WLB-2024030026
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030026. OSGi 3.18 Remote Code Execution.
#ExploitObserverAlert
MSF/exploit_multi/http/jetbrains_teamcity_rce_cve_2024_27198
DESCRIPTION: Exploit Observer has 207 entries in 10 file formats related to MSF/exploit_multi/http/jetbrains_teamcity_rce_cve_2024_27198. This module exploits an authentication bypass vulnerability in JetBrains TeamCity. An unauthenticated attacker can leverage this to access the REST API and create a new administrator access token. This token can be used to upload a plugin which contains a Metasploit payload, allowing the attacker to achieve unauthenticated RCE on the target TeamCity server. On older versions of TeamCity, access tokens do not exist so the exploit will instead create a new administrator account before uploading a plugin. Older version of TeamCity have a debug endpoint (/app/rest/debug/process) that allows for arbitrary commands to be executed, however recent version of TeamCity no longer ship this endpoint, hence why a plugin is leveraged for code execution instead, as this is supported on all versions tested.
MSF/exploit_multi/http/jetbrains_teamcity_rce_cve_2024_27198
DESCRIPTION: Exploit Observer has 207 entries in 10 file formats related to MSF/exploit_multi/http/jetbrains_teamcity_rce_cve_2024_27198. This module exploits an authentication bypass vulnerability in JetBrains TeamCity. An unauthenticated attacker can leverage this to access the REST API and create a new administrator access token. This token can be used to upload a plugin which contains a Metasploit payload, allowing the attacker to achieve unauthenticated RCE on the target TeamCity server. On older versions of TeamCity, access tokens do not exist so the exploit will instead create a new administrator account before uploading a plugin. Older version of TeamCity have a debug endpoint (/app/rest/debug/process) that allows for arbitrary commands to be executed, however recent version of TeamCity no longer ship this endpoint, hence why a plugin is leveraged for code execution instead, as this is supported on all versions tested.
#ExploitObserverAlert
WLB-2024030027
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030027. MSMS-PHP (by: oretnom23 ) v1.0 File Upload - RCE browser using.
WLB-2024030027
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030027. MSMS-PHP (by: oretnom23 ) v1.0 File Upload - RCE browser using.
#ExploitObserverAlert
WLB-2024030029
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030029. Human Resource Management System 1.0 SQL Injection.
WLB-2024030029
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030029. Human Resource Management System 1.0 SQL Injection.
#ExploitObserverAlert
WLB-2024030030
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030030. SnipeIT 6.2.1 Stored Cross Site Scripting.
WLB-2024030030
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030030. SnipeIT 6.2.1 Stored Cross Site Scripting.
#ExploitObserverAlert
WLB-2024030028
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030028. MSMS-PHP (by: oretnom23 - 2024) v1.0 Multiple-SQLi.
WLB-2024030028
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030028. MSMS-PHP (by: oretnom23 - 2024) v1.0 Multiple-SQLi.
#ExploitObserverAlert
CVE-2024-20327
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20327. A vulnerability in the PPP over Ethernet (PPPoE) termination feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to crash the ppp_ma process, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of malformed PPPoE packets that are received on a router that is running Broadband Network Gateway (BNG) functionality with PPPoE termination on a Lightspeed-based or Lightspeed-Plus-based line card. An attacker could exploit this vulnerability by sending a crafted PPPoE packet to an affected line card interface that does not terminate PPPoE. A successful exploit could allow the attacker to crash the ppp_ma process, resulting in a DoS condition for PPPoE traffic across the router.
FIRST-EPSS: 0.000430000
CVE-2024-20327
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20327. A vulnerability in the PPP over Ethernet (PPPoE) termination feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to crash the ppp_ma process, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of malformed PPPoE packets that are received on a router that is running Broadband Network Gateway (BNG) functionality with PPPoE termination on a Lightspeed-based or Lightspeed-Plus-based line card. An attacker could exploit this vulnerability by sending a crafted PPPoE packet to an affected line card interface that does not terminate PPPoE. A successful exploit could allow the attacker to crash the ppp_ma process, resulting in a DoS condition for PPPoE traffic across the router.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
CVE-2024-25228
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-25228. Vinchin Backup and Recovery 7.2 and Earlier is vulnerable to Authenticated Remote Code Execution (RCE) via the getVerifydiyResult function in ManoeuvreHandler.class.php.
FIRST-EPSS: 0.000430000
CVE-2024-25228
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-25228. Vinchin Backup and Recovery 7.2 and Earlier is vulnerable to Authenticated Remote Code Execution (RCE) via the getVerifydiyResult function in ManoeuvreHandler.class.php.
FIRST-EPSS: 0.000430000
#ExploitObserverAlert
EDB-51884
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51884. JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)
EDB-51884
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51884. JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)
#ExploitObserverAlert
EDB-51892
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51892. KiTTY 0.76.1.13 - Command Injection
EDB-51892
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51892. KiTTY 0.76.1.13 - Command Injection
#ExploitObserverAlert
EDB-51890
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51890. KiTTY 0.76.1.13 - 'Start Duplicated Session Hostname' Buffer Overflow
EDB-51890
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51890. KiTTY 0.76.1.13 - 'Start Duplicated Session Hostname' Buffer Overflow
#ExploitObserverAlert
EDB-51887
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51887. Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE)
EDB-51887
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51887. Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE)
#ExploitObserverAlert
PD/http/cves/2024/CVE-2024-1698
DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to PD/http/cves/2024/CVE-2024-1698. The NotificationX - Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
PD/http/cves/2024/CVE-2024-1698
DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to PD/http/cves/2024/CVE-2024-1698. The NotificationX - Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.