#ExploitObserverAlert
CVE-2021-0255
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0255. A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permissions enabled and is owned by the root user, allowing local users to run ethtraceroute with root privileges. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D240; 17.3 versions prior to 17.3R3-S11, 17.4 versions prior to 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S1.
FIRST-EPSS: 0.000420000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2021-0255
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0255. A local privilege escalation vulnerability in ethtraceroute of Juniper Networks Junos OS may allow a locally authenticated user with shell access to escalate privileges and write to the local filesystem as root. ethtraceroute is shipped with setuid permissions enabled and is owned by the root user, allowing local users to run ethtraceroute with root privileges. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D240; 17.3 versions prior to 17.3R3-S11, 17.4 versions prior to 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3-S4; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S1, 20.2R3; 20.3 versions prior to 20.3R1-S1.
FIRST-EPSS: 0.000420000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-1720
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-1720. Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.
FIRST-EPSS: 0.000870000
NVD-IS: 5.9
NVD-ES: 2.1
CVE-2023-1720
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-1720. Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile.
FIRST-EPSS: 0.000870000
NVD-IS: 5.9
NVD-ES: 2.1
#ExploitObserverAlert
CVE-2022-0216
DESCRIPTION: Exploit Observer has 9 entries related to CVE-2022-0216. A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 0.8
CVE-2022-0216
DESCRIPTION: Exploit Observer has 9 entries related to CVE-2022-0216. A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.
FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 0.8
#ExploitObserverAlert
CVE-2020-2902
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2020-2902. Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
FIRST-EPSS: 0.000430000
NVD-IS: 6.0
NVD-ES: 2.0
CVE-2020-2902
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2020-2902. Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.40, prior to 6.0.20 and prior to 6.1.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
FIRST-EPSS: 0.000430000
NVD-IS: 6.0
NVD-ES: 2.0
#ExploitObserverAlert
CVE-2020-0889
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-0889. A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0988, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008.
FIRST-EPSS: 0.011230000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2020-0889
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-0889. A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0988, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008.
FIRST-EPSS: 0.011230000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2020-3800
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-3800. Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a memory address leak vulnerability. Successful exploitation could lead to information disclosure .
FIRST-EPSS: 0.002420000
NVD-IS: 3.6
NVD-ES: 3.9
CVE-2020-3800
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-3800. Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a memory address leak vulnerability. Successful exploitation could lead to information disclosure .
FIRST-EPSS: 0.002420000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert
GHSA-7r43-v6hm-qrjh
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-7R43-V6HM-QRJH. An insecure password reset issue discovered in MEGAFEIS, BOFEI DBD Application for IOS
GHSA-7r43-v6hm-qrjh
DESCRIPTION: Exploit Observer has 3 entries related to GHSA-7R43-V6HM-QRJH. An insecure password reset issue discovered in MEGAFEIS, BOFEI DBD Application for IOS
#ExploitObserverAlert
CVE-2021-34979
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-34979. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13512.
FIRST-EPSS: 0.000720000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2021-34979
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-34979. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13512.
FIRST-EPSS: 0.000720000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-41951
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41951. OroPlatform is a PHP Business Application Platform (BAP) designed to make development of custom business applications easier and faster. Path Traversal is possible in `Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName`. With this method, an attacker can pass the path to a non-existent file, which will allow writing the content to a new file that will be available during script execution. This vulnerability has been fixed in version 5.0.9.
CVE-2022-41951
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-41951. OroPlatform is a PHP Business Application Platform (BAP) designed to make development of custom business applications easier and faster. Path Traversal is possible in `Oro\Bundle\GaufretteBundle\FileManager::getTemporaryFileName`. With this method, an attacker can pass the path to a non-existent file, which will allow writing the content to a new file that will be available during script execution. This vulnerability has been fixed in version 5.0.9.
#ExploitObserverAlert
CVE-2022-0168
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2022-0168. A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.
FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 0.8
CVE-2022-0168
DESCRIPTION: Exploit Observer has 6 entries related to CVE-2022-0168. A denial of service (DOS) issue was found in the Linux kernel’s smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.
FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 0.8
#ExploitObserverAlert
CVE-2020-2674
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-2674. Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
FIRST-EPSS: 0.000450000
NVD-IS: 6.0
NVD-ES: 1.5
CVE-2020-2674
DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-2674. Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
FIRST-EPSS: 0.000450000
NVD-IS: 6.0
NVD-ES: 1.5
#ExploitObserverAlert
CVE-2023-46604
DESCRIPTION: Exploit Observer has 98 entries related to CVE-2023-46604. The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
FIRST-EPSS: 0.966470000
NVD-IS: 5.9
NVD-ES: 3.9
CVE-2023-46604
DESCRIPTION: Exploit Observer has 98 entries related to CVE-2023-46604. The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.
FIRST-EPSS: 0.966470000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert
CVE-2021-22234
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-22234. An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.11 before 13.11.7, all versions starting from 13.12 before 13.12.8, and all versions starting from 14.0 before 14.0.4. A specially crafted design image allowed attackers to read arbitrary files on the server.
FIRST-EPSS: 0.000660000
NVD-IS: 2.7
NVD-ES: 3.1
CVE-2021-22234
DESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-22234. An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.11 before 13.11.7, all versions starting from 13.12 before 13.12.8, and all versions starting from 14.0 before 14.0.4. A specially crafted design image allowed attackers to read arbitrary files on the server.
FIRST-EPSS: 0.000660000
NVD-IS: 2.7
NVD-ES: 3.1
#ExploitObserverAlert
CVE-2020-0634
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-0634. An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.
FIRST-EPSS: 0.002090000
NVD-IS: 5.9
NVD-ES: 1.8
CVE-2020-0634
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-0634. An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.
FIRST-EPSS: 0.002090000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-2318
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2318. DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.
FIRST-EPSS: 0.001150000
NVD-IS: 6.0
NVD-ES: 2.8
CVE-2023-2318
DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2318. DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.
FIRST-EPSS: 0.001150000
NVD-IS: 6.0
NVD-ES: 2.8
#ExploitObserverAlert
CVE-2022-21877
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2022-21877. Storage Spaces Controller Information Disclosure Vulnerability.
FIRST-EPSS: 0.000490000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2022-21877
DESCRIPTION: Exploit Observer has 7 entries related to CVE-2022-21877. Storage Spaces Controller Information Disclosure Vulnerability.
FIRST-EPSS: 0.000490000
NVD-IS: 3.6
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-49313
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49313.
CVE-2023-49313
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-49313.
#ExploitObserverAlert
GHSA-vp49-2g4r-m3x3
DESCRIPTION: Exploit Observer has 50 entries related to GHSA-VP49-2G4R-M3X3.
GHSS: 6.5
GHSA-vp49-2g4r-m3x3
DESCRIPTION: Exploit Observer has 50 entries related to GHSA-VP49-2G4R-M3X3.
GHSS: 6.5
#ExploitObserverAlert
CVE-2021-4206
DESCRIPTION: Exploit Observer has 8 entries related to CVE-2021-4206. A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
FIRST-EPSS: 0.000500000
NVD-IS: 6.0
NVD-ES: 1.5
CVE-2021-4206
DESCRIPTION: Exploit Observer has 8 entries related to CVE-2021-4206. A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
FIRST-EPSS: 0.000500000
NVD-IS: 6.0
NVD-ES: 1.5
#ExploitObserverAlert
CVE-2023-46316
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-46316. In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
FIRST-EPSS: 0.000430000
NVD-IS: 3.6
NVD-ES: 1.8
CVE-2023-46316
DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-46316. In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
FIRST-EPSS: 0.000430000
NVD-IS: 3.6
NVD-ES: 1.8
#ExploitObserverAlert
CVE-2023-36025
DESCRIPTION: Exploit Observer has 19 entries related to CVE-2023-36025. Windows SmartScreen Security Feature Bypass Vulnerability
FIRST-EPSS: 0.007930000
NVD-IS: 5.9
NVD-ES: 2.8
CVE-2023-36025
DESCRIPTION: Exploit Observer has 19 entries related to CVE-2023-36025. Windows SmartScreen Security Feature Bypass Vulnerability
FIRST-EPSS: 0.007930000
NVD-IS: 5.9
NVD-ES: 2.8