#ExploitObserverAlert
CVE-2022-2806
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2022-2806. It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev
FIRST-EPSS: 0.000440000
NVD-IS: 3.6
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5941964
CVE-2022-2806
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2022-2806. It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev
FIRST-EPSS: 0.000440000
NVD-IS: 3.6
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5941964
#ExploitObserverAlert
CVE-2024-29834
DESCRIPTION: Exploit Observer has 13 entries in 4 file formats related to CVE-2024-29834. This vulnerability allows authenticated users with produce or consume permissions to perform unauthorized operations on partitioned topics, such as unloading topics and triggering compaction. These management operations should be restricted to users with the tenant admin role or superuser role. An authenticated user with produce permission can create subscriptions and update subscription properties on partitioned topics, even though this should be limited to users with consume permissions. This impact analysis assumes that Pulsar has been configured with the default authorization provider. For custom authorization providers, the impact could be slightly different. Additionally, the vulnerability allows an authenticated user to read, create, modify, and delete namespace properties in any namespace in any tenant. In Pulsar, namespace properties are reserved for user provided metadata about the namespace. This issue affects Apache Pulsar versions from 2.7.1 to 2.10.6, from 2.11.0 to 2.11.4, from 3.0.0 to 3.0.3, from 3.1.0 to 3.1.3, and from 3.2.0 to 3.2.1. 3.0 Apache Pulsar users should upgrade to at least 3.0.4. 3.1 and 3.2 Apache Pulsar users should upgrade to at least 3.2.2. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.715534
CVE-2024-29834
DESCRIPTION: Exploit Observer has 13 entries in 4 file formats related to CVE-2024-29834. This vulnerability allows authenticated users with produce or consume permissions to perform unauthorized operations on partitioned topics, such as unloading topics and triggering compaction. These management operations should be restricted to users with the tenant admin role or superuser role. An authenticated user with produce permission can create subscriptions and update subscription properties on partitioned topics, even though this should be limited to users with consume permissions. This impact analysis assumes that Pulsar has been configured with the default authorization provider. For custom authorization providers, the impact could be slightly different. Additionally, the vulnerability allows an authenticated user to read, create, modify, and delete namespace properties in any namespace in any tenant. In Pulsar, namespace properties are reserved for user provided metadata about the namespace. This issue affects Apache Pulsar versions from 2.7.1 to 2.10.6, from 2.11.0 to 2.11.4, from 3.0.0 to 3.0.3, from 3.1.0 to 3.1.3, and from 3.2.0 to 3.2.1. 3.0 Apache Pulsar users should upgrade to at least 3.0.4. 3.1 and 3.2 Apache Pulsar users should upgrade to at least 3.2.2. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.715534
#ExploitObserverAlert
CVE-2024-31864
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-31864. Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin. The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue.
FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.5747126
CVE-2024-31864
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-31864. Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin. The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue.
FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.5747126
#ExploitObserverAlert
CVE-2024-27992
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27992. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Whisper Link Whisper Free allows Reflected XSS.This issue affects Link Whisper Free: from n/a through 0.6.8.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-27992
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27992. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Whisper Link Whisper Free allows Reflected XSS.This issue affects Link Whisper Free: from n/a through 0.6.8.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2023-5824
DESCRIPTION: Exploit Observer has 19 entries in 4 file formats related to CVE-2023-5824. Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.
FIRST-EPSS: 0.009670000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.6359197
CVE-2023-5824
DESCRIPTION: Exploit Observer has 19 entries in 4 file formats related to CVE-2023-5824. Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.
FIRST-EPSS: 0.009670000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.6359197
#ExploitObserverAlert
CVE-2024-21508
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-21508. Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.
FIRST-EPSS: 0.000440000
ARPS-EXPLOITABILITY: 0.6373563
CVE-2024-21508
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-21508. Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.
FIRST-EPSS: 0.000440000
ARPS-EXPLOITABILITY: 0.6373563
#ExploitObserverAlert
CVE-2024-23192
DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-23192. RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Potentially malicious attributes now get removed from external RSS content. No publicly available exploits are known.
FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.7373563
CVE-2024-23192
DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-23192. RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Potentially malicious attributes now get removed from external RSS content. No publicly available exploits are known.
FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.7373563
#ExploitObserverAlert
CVE-2024-27969
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27969. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Enhanced Free Downloads WooCommerce allows Stored XSS.This issue affects Free Downloads WooCommerce: from n/a through 3.5.8.2.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-27969
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27969. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Enhanced Free Downloads WooCommerce allows Stored XSS.This issue affects Free Downloads WooCommerce: from n/a through 3.5.8.2.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2024-27991
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27991. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SupportCandy allows Stored XSS.This issue affects SupportCandy: from n/a through 3.2.3.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-27991
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27991. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SupportCandy allows Stored XSS.This issue affects SupportCandy: from n/a through 3.2.3.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2023-4408
DESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to CVE-2023-4408. The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
FIRST-EPSS: 0.000810000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.6482605
CVE-2023-4408
DESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to CVE-2023-4408. The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
FIRST-EPSS: 0.000810000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.6482605
#ExploitObserverAlert
CVE-2024-27967
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27967. Cross-Site Request Forgery (CSRF) vulnerability in Michael Leithold DSGVO All in one for WP.This issue affects DSGVO All in one for WP: from n/a through 4.3.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-27967
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27967. Cross-Site Request Forgery (CSRF) vulnerability in Michael Leithold DSGVO All in one for WP.This issue affects DSGVO All in one for WP: from n/a through 4.3.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2024-25922
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-25922. Missing Authorization vulnerability in Peach Payments Peach Payments Gateway.This issue affects Peach Payments Gateway: from n/a through 3.1.9.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-25922
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-25922. Missing Authorization vulnerability in Peach Payments Peach Payments Gateway.This issue affects Peach Payments Gateway: from n/a through 3.1.9.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2024-25376
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2024-25376. An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based installers before 5.68.0 allows a local attacker to execute arbitrary code via the msiexec.exe repair mode.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.6369742
CVE-2024-25376
DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2024-25376. An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based installers before 5.68.0 allows a local attacker to execute arbitrary code via the msiexec.exe repair mode.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.6369742
#ExploitObserverAlert
CVE-2024-24850
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-24850. Missing Authorization vulnerability in Mark Stockton Quicksand Post Filter jQuery Plugin.This issue affects Quicksand Post Filter jQuery Plugin: from n/a through 3.1.1.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-24850
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-24850. Missing Authorization vulnerability in Mark Stockton Quicksand Post Filter jQuery Plugin.This issue affects Quicksand Post Filter jQuery Plugin: from n/a through 3.1.1.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2023-51672
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-51672. Missing Authorization vulnerability in FunnelKit FunnelKit Checkout.This issue affects FunnelKit Checkout: from n/a through 3.10.3.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2023-51672
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-51672. Missing Authorization vulnerability in FunnelKit FunnelKit Checkout.This issue affects FunnelKit Checkout: from n/a through 3.10.3.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2023-29483
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-29483. eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
FIRST-EPSS: 0.000440000
ARPS-EXPLOITABILITY: 0.6373563
CVE-2023-29483
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-29483. eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
FIRST-EPSS: 0.000440000
ARPS-EXPLOITABILITY: 0.6373563
#ExploitObserverAlert
CVE-2024-29019
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-29019. ESPHome is a system to control microcontrollers remotely through Home Automation systems. API endpoints in dashboard component of ESPHome version 2023.12.9 (command line installation) are vulnerable to Cross-Site Request Forgery (CSRF) allowing remote attackers to carry out attacks against a logged user of the dashboard to perform operations on configuration files (create, edit, delete). It is possible for a malicious actor to create a specifically crafted web page that triggers a cross site request against ESPHome, this allows bypassing the authentication for API calls on the platform. This vulnerability allows bypassing authentication on API calls accessing configuration file operations on the behalf of a logged user. In order to trigger the vulnerability, the victim must visit a weaponized page. In addition to this, it is possible to chain this vulnerability with GHSA-9p43-hj5j-96h5/ CVE-2024-27287 to obtain a complete takeover of the user account. Version 2024.3.0 contains a patch for this issue.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.6145687
CVE-2024-29019
DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-29019. ESPHome is a system to control microcontrollers remotely through Home Automation systems. API endpoints in dashboard component of ESPHome version 2023.12.9 (command line installation) are vulnerable to Cross-Site Request Forgery (CSRF) allowing remote attackers to carry out attacks against a logged user of the dashboard to perform operations on configuration files (create, edit, delete). It is possible for a malicious actor to create a specifically crafted web page that triggers a cross site request against ESPHome, this allows bypassing the authentication for API calls on the platform. This vulnerability allows bypassing authentication on API calls accessing configuration file operations on the behalf of a logged user. In order to trigger the vulnerability, the victim must visit a weaponized page. In addition to this, it is possible to chain this vulnerability with GHSA-9p43-hj5j-96h5/ CVE-2024-27287 to obtain a complete takeover of the user account. Version 2024.3.0 contains a patch for this issue.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.6145687
#ExploitObserverAlert
CVE-2023-6257
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-6257. The Inline Related Posts WordPress plugin before 3.6.0 does not ensure that post content displayed via an AJAX action are accessible to the user, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5747126
CVE-2023-6257
DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-6257. The Inline Related Posts WordPress plugin before 3.6.0 does not ensure that post content displayed via an AJAX action are accessible to the user, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5747126
#ExploitObserverAlert
CVE-2024-25912
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-25912. Missing Authorization vulnerability in Skymoonlabs MoveTo.This issue affects MoveTo: from n/a through 6.2.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-25912
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-25912. Missing Authorization vulnerability in Skymoonlabs MoveTo.This issue affects MoveTo: from n/a through 6.2.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2024-27985
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27985. Deserialization of Untrusted Data vulnerability in PropertyHive.This issue affects PropertyHive: from n/a through 2.0.9.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-27985
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27985. Deserialization of Untrusted Data vulnerability in PropertyHive.This issue affects PropertyHive: from n/a through 2.0.9.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert
CVE-2024-27989
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27989. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs allows Stored XSS.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
CVE-2024-27989
DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27989. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs allows Stored XSS.This issue affects WP Responsive Tabs horizontal vertical and accordion Tabs: from n/a through 1.1.17.
FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
❤1