#ExploitObserverAlert
BDU:2024-02620
DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to BDU:2024-02620. Vulnerability of the Grafana monitoring and observation platform associated with the disclosure of confidential information to an unauthorized party, enabling the attacker to expose protected information. The vulnerability of the Grafana monitoring and observation platform is related to the transmission of authentication tokens to certain target plugins. Exploiting this vulnerability could allow a remote attacker to expose protected information.
BDU:2024-02620
DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to BDU:2024-02620. Vulnerability of the Grafana monitoring and observation platform associated with the disclosure of confidential information to an unauthorized party, enabling the attacker to expose protected information. The vulnerability of the Grafana monitoring and observation platform is related to the transmission of authentication tokens to certain target plugins. Exploiting this vulnerability could allow a remote attacker to expose protected information.
#ExploitObserverAlert
BDU:2024-02595
DESCRIPTION: Exploit Observer has 16 entries in 5 file formats related to BDU:2024-02595. Vulnerability in the mapValues() function of the Async utility module for working with asynchronous JavaScript allows an attacker to elevate their privileges. This vulnerability in the mapValues() function of the Async utility module for working with asynchronous JavaScript is related to improperly controlled modification of object prototype attributes. Exploiting the vulnerability could allow a remote attacker to elevate their privileges.
BDU:2024-02595
DESCRIPTION: Exploit Observer has 16 entries in 5 file formats related to BDU:2024-02595. Vulnerability in the mapValues() function of the Async utility module for working with asynchronous JavaScript allows an attacker to elevate their privileges. This vulnerability in the mapValues() function of the Async utility module for working with asynchronous JavaScript is related to improperly controlled modification of object prototype attributes. Exploiting the vulnerability could allow a remote attacker to elevate their privileges.
#ExploitObserverAlert
BDU:2024-02589
DESCRIPTION: Exploit Observer has 16 entries in 3 file formats related to BDU:2024-02589. Vulnerability in the set of software tools and libraries for working with OpenSC smart cards is related to incorrect authentication, allowing an attacker to gain unauthorized access, carry out arbitrary actions, or compromise the system. The vulnerability in the set of software tools and libraries for working with OpenSC smart cards is due to the fact that authentication of the token/card by one process can perform cryptographic operations in other processes when passing an empty PIN code of zero length. Exploiting the vulnerability can allow an attacker to gain unauthorized access, carry out arbitrary actions, or compromise the system.
BDU:2024-02589
DESCRIPTION: Exploit Observer has 16 entries in 3 file formats related to BDU:2024-02589. Vulnerability in the set of software tools and libraries for working with OpenSC smart cards is related to incorrect authentication, allowing an attacker to gain unauthorized access, carry out arbitrary actions, or compromise the system. The vulnerability in the set of software tools and libraries for working with OpenSC smart cards is due to the fact that authentication of the token/card by one process can perform cryptographic operations in other processes when passing an empty PIN code of zero length. Exploiting the vulnerability can allow an attacker to gain unauthorized access, carry out arbitrary actions, or compromise the system.
#ExploitObserverAlert
PD/http/cves/2022/CVE-2022-29013
DESCRIPTION: Exploit Observer has 11 entries in 6 file formats related to PD/http/cves/2022/CVE-2022-29013. A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
PD/http/cves/2022/CVE-2022-29013
DESCRIPTION: Exploit Observer has 11 entries in 6 file formats related to PD/http/cves/2022/CVE-2022-29013. A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
#ExploitObserverAlert
BDU:2024-02597
DESCRIPTION: Exploit Observer has 16 entries in 4 file formats related to BDU:2024-02597. "The vulnerability in the monitoring and observability platform Grafana related to cross-site request forgery, allows an attacker to escalate their privileges. The vulnerability in the Grafana monitoring and observability platform is associated with conducting attacks from various sources against authenticated users of Grafana with high privileges. Exploiting this vulnerability could enable a remote attacker to escalate their privileges."
BDU:2024-02597
DESCRIPTION: Exploit Observer has 16 entries in 4 file formats related to BDU:2024-02597. "The vulnerability in the monitoring and observability platform Grafana related to cross-site request forgery, allows an attacker to escalate their privileges. The vulnerability in the Grafana monitoring and observability platform is associated with conducting attacks from various sources against authenticated users of Grafana with high privileges. Exploiting this vulnerability could enable a remote attacker to escalate their privileges."
#ExploitObserverAlert
PD/http/cves/2018/CVE-2018-10738
DESCRIPTION: Exploit Observer has 13 entries in 6 file formats related to PD/http/cves/2018/CVE-2018-10738. A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.
PD/http/cves/2018/CVE-2018-10738
DESCRIPTION: Exploit Observer has 13 entries in 6 file formats related to PD/http/cves/2018/CVE-2018-10738. A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.
#ExploitObserverAlert
BDU:2024-02610
DESCRIPTION: Exploit Observer has 26 entries in 9 file formats related to BDU:2024-02610. Vulnerability in the Node.js follow-redirects module, associated with insufficient protection of sensitive data, allows an attacker to gain unauthorized access to protected information. The vulnerability in the Node.js follow-redirects module is related to inadequate protection of sensitive data. Exploiting the vulnerability could allow a remote attacker to gain unauthorized access to protected information.
BDU:2024-02610
DESCRIPTION: Exploit Observer has 26 entries in 9 file formats related to BDU:2024-02610. Vulnerability in the Node.js follow-redirects module, associated with insufficient protection of sensitive data, allows an attacker to gain unauthorized access to protected information. The vulnerability in the Node.js follow-redirects module is related to inadequate protection of sensitive data. Exploiting the vulnerability could allow a remote attacker to gain unauthorized access to protected information.
#ExploitObserverAlert
BDU:2024-02621
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to BDU:2024-02621. The vulnerability of the Grafana monitoring and observation platform, related to incorrect cryptographic signature verification, allows an attacker to install malicious software on a vulnerable device. The vulnerability in the Grafana monitoring and observation platform is related to bypassing plugin signature verification. Exploiting the vulnerability can allow a remote attacker to install malicious software on a vulnerable device.
BDU:2024-02621
DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to BDU:2024-02621. The vulnerability of the Grafana monitoring and observation platform, related to incorrect cryptographic signature verification, allows an attacker to install malicious software on a vulnerable device. The vulnerability in the Grafana monitoring and observation platform is related to bypassing plugin signature verification. Exploiting the vulnerability can allow a remote attacker to install malicious software on a vulnerable device.
#ExploitObserverAlert
BDU:2024-02598
DESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to BDU:2024-02598. Vulnerability of the Grafana monitoring and observability platform is related to URL redirection to an untrusted site, allowing an attacker to redirect a user to an arbitrary website. The vulnerability in the Grafana monitoring and observability platform is associated with bypassing security configurations if a malicious data source is operating on an authorized host. Exploiting the vulnerability could allow a remote attacker to redirect a user to an arbitrary site.
BDU:2024-02598
DESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to BDU:2024-02598. Vulnerability of the Grafana monitoring and observability platform is related to URL redirection to an untrusted site, allowing an attacker to redirect a user to an arbitrary website. The vulnerability in the Grafana monitoring and observability platform is associated with bypassing security configurations if a malicious data source is operating on an authorized host. Exploiting the vulnerability could allow a remote attacker to redirect a user to an arbitrary site.
#ExploitObserverAlert
BDU:2024-02613
DESCRIPTION: Exploit Observer has 12 entries in 3 file formats related to BDU:2024-02613. Vulnerability in the adodb_addslashes() function of the adodb library allows an attacker to bypass the authentication process. The vulnerability in the adodb library's adodb_addslashes() function is related to improper authentication. Exploiting this vulnerability may enable a remote attacker to bypass the authentication process.
BDU:2024-02613
DESCRIPTION: Exploit Observer has 12 entries in 3 file formats related to BDU:2024-02613. Vulnerability in the adodb_addslashes() function of the adodb library allows an attacker to bypass the authentication process. The vulnerability in the adodb library's adodb_addslashes() function is related to improper authentication. Exploiting this vulnerability may enable a remote attacker to bypass the authentication process.
#ExploitObserverAlert
BDU:2024-02608
DESCRIPTION: Exploit Observer has 27 entries in 5 file formats related to BDU:2024-02608. The vulnerability of the Apache Tomcat application server, associated with inadequate input data validation, allows an attacker to cause a denial of service. The vulnerability of the Apache Tomcat application server is linked to insufficient input data validation. Exploiting this vulnerability may enable a remote attacker to cause a denial of service using specially crafted HTTP/2 requests.
BDU:2024-02608
DESCRIPTION: Exploit Observer has 27 entries in 5 file formats related to BDU:2024-02608. The vulnerability of the Apache Tomcat application server, associated with inadequate input data validation, allows an attacker to cause a denial of service. The vulnerability of the Apache Tomcat application server is linked to insufficient input data validation. Exploiting this vulnerability may enable a remote attacker to cause a denial of service using specially crafted HTTP/2 requests.
#ExploitObserverAlert
PSS-177936
DESCRIPTION: Exploit Observer has 12 entries in 3 file formats related to PSS-177936. Ubuntu Security Notice USN-6710-2. Ubuntu Security Notice 6710-2 - USN-6710-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Manfred Paul discovered that Firefox did not properly perform bounds checking during range analysis, leading to an out-of-bounds write vulnerability. A attacker could use this to cause a denial of service, or execute arbitrary code. Manfred Paul discovered that Firefox incorrectly handled MessageManager listeners under certain circumstances. An attacker who was able to inject an event handler into a privileged object may have been able to execute arbitrary code.
PSS-177936
DESCRIPTION: Exploit Observer has 12 entries in 3 file formats related to PSS-177936. Ubuntu Security Notice USN-6710-2. Ubuntu Security Notice 6710-2 - USN-6710-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Manfred Paul discovered that Firefox did not properly perform bounds checking during range analysis, leading to an out-of-bounds write vulnerability. A attacker could use this to cause a denial of service, or execute arbitrary code. Manfred Paul discovered that Firefox incorrectly handled MessageManager listeners under certain circumstances. An attacker who was able to inject an event handler into a privileged object may have been able to execute arbitrary code.
#ExploitObserverAlert
BDU:2024-02580
DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-02580. Vulnerability of the modular interface between Rack web servers and web applications, related to uncontrolled resource consumption, allowing an attacker to cause a denial of service. The vulnerability of the modular interface between Rack web servers and web applications is associated with the creation of input data that can cause analysis of the Content-Disposition header in Rack to take an unexpected amount of time. Exploiting the vulnerability can allow a remote attacker to cause a denial of service.
BDU:2024-02580
DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-02580. Vulnerability of the modular interface between Rack web servers and web applications, related to uncontrolled resource consumption, allowing an attacker to cause a denial of service. The vulnerability of the modular interface between Rack web servers and web applications is associated with the creation of input data that can cause analysis of the Content-Disposition header in Rack to take an unexpected amount of time. Exploiting the vulnerability can allow a remote attacker to cause a denial of service.
#ExploitObserverAlert
BDU:2024-02637
DESCRIPTION: Exploit Observer has 12 entries in 2 file formats related to BDU:2024-02637. Vulnerability in Mozilla Firefox, Firefox ESR, and the Thunderbird email client for Mac OS operating systems allows an attacker to execute arbitrary code. The vulnerability in Mozilla Firefox, Firefox ESR, and the Thunderbird email client for Mac OS operating systems is related to access control flaws. Exploiting this vulnerability could allow a remote attacker to execute arbitrary code when loading files with the .inetloc extension.
BDU:2024-02637
DESCRIPTION: Exploit Observer has 12 entries in 2 file formats related to BDU:2024-02637. Vulnerability in Mozilla Firefox, Firefox ESR, and the Thunderbird email client for Mac OS operating systems allows an attacker to execute arbitrary code. The vulnerability in Mozilla Firefox, Firefox ESR, and the Thunderbird email client for Mac OS operating systems is related to access control flaws. Exploiting this vulnerability could allow a remote attacker to execute arbitrary code when loading files with the .inetloc extension.
#ExploitObserverAlert
BDU:2024-02587
DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-02587. Vulnerability in the MyEID driver of the software toolkit and libraries for working with smart cards OpenSC, allowing a potential attacker to gain unauthorized access to confidential data. The vulnerability in the MyEID driver of the software toolkit and libraries for working with smart cards OpenSC is related to reading beyond the boundaries of the buffer in memory during symmetric key encryption processing. Exploiting the vulnerability could potentially allow an attacker to gain unauthorized access to confidential data.
BDU:2024-02587
DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-02587. Vulnerability in the MyEID driver of the software toolkit and libraries for working with smart cards OpenSC, allowing a potential attacker to gain unauthorized access to confidential data. The vulnerability in the MyEID driver of the software toolkit and libraries for working with smart cards OpenSC is related to reading beyond the boundaries of the buffer in memory during symmetric key encryption processing. Exploiting the vulnerability could potentially allow an attacker to gain unauthorized access to confidential data.
#ExploitObserverAlert
PSS-177922
DESCRIPTION: Exploit Observer has 157 entries in 17 file formats related to PSS-177922. Red Hat Security Advisory 2024-1614-03. Red Hat Security Advisory 2024-1614-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include code execution, null pointer, privilege escalation, and use-after-free vulnerabilities.
PSS-177922
DESCRIPTION: Exploit Observer has 157 entries in 17 file formats related to PSS-177922. Red Hat Security Advisory 2024-1614-03. Red Hat Security Advisory 2024-1614-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include code execution, null pointer, privilege escalation, and use-after-free vulnerabilities.
#ExploitObserverAlert
BDU:2024-02611
DESCRIPTION: Exploit Observer has 10 entries in 2 file formats related to BDU:2024-02611. Vulnerability in the software for creating, monitoring, and orchestrating Apache Airflow data processing scenarios is related to access control flaws, which allow an attacker to gain unauthorized access to resources. The software vulnerability in creating, monitoring, and orchestrating Apache Airflow data processing scenarios is linked to access control deficiencies. Exploiting this vulnerability can enable a remote attacker to gain unauthorized access to resources.
BDU:2024-02611
DESCRIPTION: Exploit Observer has 10 entries in 2 file formats related to BDU:2024-02611. Vulnerability in the software for creating, monitoring, and orchestrating Apache Airflow data processing scenarios is related to access control flaws, which allow an attacker to gain unauthorized access to resources. The software vulnerability in creating, monitoring, and orchestrating Apache Airflow data processing scenarios is linked to access control deficiencies. Exploiting this vulnerability can enable a remote attacker to gain unauthorized access to resources.
#ExploitObserverAlert
BDU:2024-02628
DESCRIPTION: Exploit Observer has 13 entries in 2 file formats related to BDU:2024-02628. Vulnerability in the software tool for implementing the MediaWiki hypertext environment is related to improper input sanitization during web page creation, allowing an attacker to carry out cross-site scripting attacks. The vulnerability in the software tool for implementing the MediaWiki hypertext environment is associated with the ability to use XSS in the partial block function. Exploiting the vulnerability can allow a remote attacker to execute cross-site scripting attacks.
BDU:2024-02628
DESCRIPTION: Exploit Observer has 13 entries in 2 file formats related to BDU:2024-02628. Vulnerability in the software tool for implementing the MediaWiki hypertext environment is related to improper input sanitization during web page creation, allowing an attacker to carry out cross-site scripting attacks. The vulnerability in the software tool for implementing the MediaWiki hypertext environment is associated with the ability to use XSS in the partial block function. Exploiting the vulnerability can allow a remote attacker to execute cross-site scripting attacks.
#ExploitObserverAlert
PD/http/cves/2024/CVE-2024-28255
DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-28255. OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.
PD/http/cves/2024/CVE-2024-28255
DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-28255. OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.
#ExploitObserverAlert
BDU:2024-02638
DESCRIPTION: Exploit Observer has 9 entries in 2 file formats related to BDU:2024-02638. Vulnerability in the Mozilla Firefox browser, associated with incorrect restriction of visualized layers of the user interface, allows an attacker to conduct spoofing attacks. The vulnerability in the Mozilla Firefox browser is related to the incorrect restriction of visualized layers of the user interface. Exploiting this vulnerability may allow a remote attacker to conduct spoofing attacks.
BDU:2024-02638
DESCRIPTION: Exploit Observer has 9 entries in 2 file formats related to BDU:2024-02638. Vulnerability in the Mozilla Firefox browser, associated with incorrect restriction of visualized layers of the user interface, allows an attacker to conduct spoofing attacks. The vulnerability in the Mozilla Firefox browser is related to the incorrect restriction of visualized layers of the user interface. Exploiting this vulnerability may allow a remote attacker to conduct spoofing attacks.
#ExploitObserverAlert
BDU:2024-02623
DESCRIPTION: Exploit Observer has 16 entries in 3 file formats related to BDU:2024-02623. There is a vulnerability in the _libcap_strdup() function of the Libcap package that allows an attacker to execute arbitrary PHP files on the server. This vulnerability in the _libcap_strdup() function of the Libcap package is related to buffer overflow if the input string is close to 4 GiB. Exploiting this vulnerability could allow an attacker to execute arbitrary PHP files on the server.
BDU:2024-02623
DESCRIPTION: Exploit Observer has 16 entries in 3 file formats related to BDU:2024-02623. There is a vulnerability in the _libcap_strdup() function of the Libcap package that allows an attacker to execute arbitrary PHP files on the server. This vulnerability in the _libcap_strdup() function of the Libcap package is related to buffer overflow if the input string is close to 4 GiB. Exploiting this vulnerability could allow an attacker to execute arbitrary PHP files on the server.