#ExploitObserverAlert
CVE-2024-2483
DESCRIPTION: Exploit Observer has 30 entries in 5 file formats related to CVE-2024-2483. A vulnerability, which was classified as problematic, has been found in Surya2Developer Hostel Management Service 1.0. This issue affects some unknown processing of the file /change-password.php of the component Password Change Handler. The manipulation of the argument oldpassword leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256889 was assigned to this vulnerability.
FIRST-EPSS: 0.000450000
CVE-2024-2483
DESCRIPTION: Exploit Observer has 30 entries in 5 file formats related to CVE-2024-2483. A vulnerability, which was classified as problematic, has been found in Surya2Developer Hostel Management Service 1.0. This issue affects some unknown processing of the file /change-password.php of the component Password Change Handler. The manipulation of the argument oldpassword leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256889 was assigned to this vulnerability.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
CVE-2024-2256
DESCRIPTION: Exploit Observer has 47 entries in 7 file formats related to CVE-2024-2256. The oik plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes such as bw_contact_button and bw_button shortcodes in all versions up to, and including, 4.10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
FIRST-EPSS: 0.000450000
CVE-2024-2256
DESCRIPTION: Exploit Observer has 47 entries in 7 file formats related to CVE-2024-2256. The oik plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes such as bw_contact_button and bw_button shortcodes in all versions up to, and including, 4.10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
PD/http/cves/2024/CVE-2023-5914
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to PD/http/cves/2024/CVE-2023-5914. Reflected Cross-Site Scripting issue which is exploitable without authentication. This vulnerability was exploitable through coercing an error message during an XML parsing procedure in the SSO flow.
PD/http/cves/2024/CVE-2023-5914
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to PD/http/cves/2024/CVE-2023-5914. Reflected Cross-Site Scripting issue which is exploitable without authentication. This vulnerability was exploitable through coercing an error message during an XML parsing procedure in the SSO flow.
#ExploitObserverAlert
CVE-2024-2478
DESCRIPTION: Exploit Observer has 88 entries in 8 file formats related to CVE-2024-2478. A vulnerability was found in BradWenqiang HR 2.0. It has been rated as critical. Affected by this issue is the function selectAll of the file /bishe/register of the component Background Management. The manipulation of the argument userName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256886 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000450000
CVE-2024-2478
DESCRIPTION: Exploit Observer has 88 entries in 8 file formats related to CVE-2024-2478. A vulnerability was found in BradWenqiang HR 2.0. It has been rated as critical. Affected by this issue is the function selectAll of the file /bishe/register of the component Background Management. The manipulation of the argument userName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-256886 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
FIRST-EPSS: 0.000450000
#ExploitObserverAlert
CVE-2024-2204
DESCRIPTION: Exploit Observer has 50 entries in 7 file formats related to CVE-2024-2204. Zemana AntiLogger v2.74.204.664 is vulnerable to a Denial of Service (DoS) vulnerability by triggering the 0x80002004 and 0x80002010 IOCTL codes of the zam64.sys and zamguard64.sys drivers.
FIRST-EPSS: 0.000430000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2024-2204
DESCRIPTION: Exploit Observer has 50 entries in 7 file formats related to CVE-2024-2204. Zemana AntiLogger v2.74.204.664 is vulnerable to a Denial of Service (DoS) vulnerability by triggering the 0x80002004 and 0x80002010 IOCTL codes of the zam64.sys and zamguard64.sys drivers.
FIRST-EPSS: 0.000430000
NVD-IS: 3.6
NVD-ES: 1.8
#ExploitObserverAlert
EDB-51894
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51894. LaborOfficeFree 19.10 - MySQL Root Password Calculator
EDB-51894
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51894. LaborOfficeFree 19.10 - MySQL Root Password Calculator
#ExploitObserverAlert
EDB-51893
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51893. Winter CMS 1.2.3 - Server-Side Template Injection (SSTI) (Authenticated)
EDB-51893
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51893. Winter CMS 1.2.3 - Server-Side Template Injection (SSTI) (Authenticated)
#ExploitObserverAlert
PD/http/cves/2024/CVE-2024-1212
DESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-1212. Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
PD/http/cves/2024/CVE-2024-1212
DESCRIPTION: Exploit Observer has 7 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-1212. Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
#ExploitObserverAlert
BDU:2024-02141
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to BDU:2024-02141. Vulnerability in the microcode of GL.iNet routers GL-A1300, GL-AX1800, GL-AXT1800, GL-MT3000, GL-MT2500, GL-MT6000, GL-MT1300, GL-MT300N-V2, GL-AR750S, GL-AR750, GL-AR300M, GL-B1300 allows an attacker to bypass authentication and gain unauthorized access to the router's web interface. Exploiting this vulnerability could allow a remote attacker to gain unauthorized access to the router's web interface.
BDU:2024-02141
DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to BDU:2024-02141. Vulnerability in the microcode of GL.iNet routers GL-A1300, GL-AX1800, GL-AXT1800, GL-MT3000, GL-MT2500, GL-MT6000, GL-MT1300, GL-MT300N-V2, GL-AR750S, GL-AR750, GL-AR300M, GL-B1300 allows an attacker to bypass authentication and gain unauthorized access to the router's web interface. Exploiting this vulnerability could allow a remote attacker to gain unauthorized access to the router's web interface.
#ExploitObserverAlert
BDU:2024-02148
DESCRIPTION: Exploit Observer has 9 entries in 6 file formats related to BDU:2024-02148. The vulnerability of the web interface based on the artificial intelligence ChatGPT-Next-Web, related to insufficient validation of incoming requests, allows an attacker to carry out an SSRF attack. The vulnerability of the web interface based on the artificial intelligence ChatGPT-Next-Web is associated with the lack of protective measures for the webpage structure due to inadequate validation of incoming requests. Exploiting the vulnerability may allow a remote attacker to carry out an SSRF attack.
BDU:2024-02148
DESCRIPTION: Exploit Observer has 9 entries in 6 file formats related to BDU:2024-02148. The vulnerability of the web interface based on the artificial intelligence ChatGPT-Next-Web, related to insufficient validation of incoming requests, allows an attacker to carry out an SSRF attack. The vulnerability of the web interface based on the artificial intelligence ChatGPT-Next-Web is associated with the lack of protective measures for the webpage structure due to inadequate validation of incoming requests. Exploiting the vulnerability may allow a remote attacker to carry out an SSRF attack.
#ExploitObserverAlert
BDU:2024-02123
DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to BDU:2024-02123. Vulnerability in the ftpservlet component of the FileCatalyst Workflow file exchange software allows an attacker to execute arbitrary code. This vulnerability in the ftpservlet component of the FileCatalyst Workflow file exchange software is related to errors in processing HTTP POST requests. Exploiting this vulnerability may allow a remote attacker to execute arbitrary code by uploading specially crafted JSP files.
BDU:2024-02123
DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to BDU:2024-02123. Vulnerability in the ftpservlet component of the FileCatalyst Workflow file exchange software allows an attacker to execute arbitrary code. This vulnerability in the ftpservlet component of the FileCatalyst Workflow file exchange software is related to errors in processing HTTP POST requests. Exploiting this vulnerability may allow a remote attacker to execute arbitrary code by uploading specially crafted JSP files.
#ExploitObserverAlert
WLB-2024030040
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030040. TYPO3 11.5.24 Path Traversal (Authenticated).
WLB-2024030040
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030040. TYPO3 11.5.24 Path Traversal (Authenticated).
#ExploitObserverAlert
WLB-2024030049
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030049. Backdoor.Win32.Emegrab.b / Remote Stack Buffer Overflow (SEH).
WLB-2024030049
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030049. Backdoor.Win32.Emegrab.b / Remote Stack Buffer Overflow (SEH).
#ExploitObserverAlert
WLB-2024030041
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030041. CSZCMS v1.3.0 SQL Injection (Authenticated).
WLB-2024030041
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030041. CSZCMS v1.3.0 SQL Injection (Authenticated).
#ExploitObserverAlert
MSF/exploit_linux/http/opennms_horizon_authenticated_rce
DESCRIPTION: Exploit Observer has 12 entries in 4 file formats related to MSF/exploit_linux/http/opennms_horizon_authenticated_rce. This module exploits built-in functionality in OpenNMS Horizon in order to execute arbitrary commands as the opennms user. For versions 32.0.2 and higher, this module requires valid credentials for a user with ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST. For versions 32.0.1 and lower, credentials are required for a user with ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges. In that case, the module will automatically escalate privileges via CVE-2023-40315 or CVE-2023-0872 if necessary. This module has been successfully tested against OpenNMS version 31.0.7
MSF/exploit_linux/http/opennms_horizon_authenticated_rce
DESCRIPTION: Exploit Observer has 12 entries in 4 file formats related to MSF/exploit_linux/http/opennms_horizon_authenticated_rce. This module exploits built-in functionality in OpenNMS Horizon in order to execute arbitrary commands as the opennms user. For versions 32.0.2 and higher, this module requires valid credentials for a user with ROLE_FILESYSTEM_EDITOR privileges and either ROLE_ADMIN or ROLE_REST. For versions 32.0.1 and lower, credentials are required for a user with ROLE_FILESYSTEM_EDITOR, ROLE_REST, and/or ROLE_ADMIN privileges. In that case, the module will automatically escalate privileges via CVE-2023-40315 or CVE-2023-0872 if necessary. This module has been successfully tested against OpenNMS version 31.0.7
#ExploitObserverAlert
WLB-2024030048
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030048. vm2 3.9.19 Sandbox Escape.
WLB-2024030048
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030048. vm2 3.9.19 Sandbox Escape.
#ExploitObserverAlert
EDB-51913
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51913. Simple Task List 1.0 - 'status' SQLi
EDB-51913
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51913. Simple Task List 1.0 - 'status' SQLi
#ExploitObserverAlert
WLB-2024030043
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030043. Lektor 3.3.10 Arbitrary File upload.
WLB-2024030043
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030043. Lektor 3.3.10 Arbitrary File upload.
#ExploitObserverAlert
WLB-2024030044
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030044. ZoneMinder Snapshots Remote Code Execution.
WLB-2024030044
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030044. ZoneMinder Snapshots Remote Code Execution.
#ExploitObserverAlert
WLB-2024030050
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030050. SARMANSOFT SQL - NO-REDİRECT PoC.
WLB-2024030050
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030050. SARMANSOFT SQL - NO-REDİRECT PoC.
#ExploitObserverAlert
EDB-51911
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51911. Employee Management System 1.0 - 'admin_id' SQLi
EDB-51911
DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51911. Employee Management System 1.0 - 'admin_id' SQLi