ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2020-1938

DESCRIPTION: Exploit Observer has 241 entries related to CVE-2020-1938. When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.

FIRST-EPSS: 0.974830000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2015-4902

DESCRIPTION: Exploit Observer has 23 entries related to CVE-2015-4902. Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.

FIRST-EPSS: 0.008610000
NVD-IS: 2.9
NVD-ES: 10.0
#ExploitObserverAlert

CVE-2018-19953

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2018-19953. If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.

FIRST-EPSS: 0.003790000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2022-23134

DESCRIPTION: Exploit Observer has 11 entries related to CVE-2022-23134. After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.

FIRST-EPSS: 0.202480000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2016-7855

DESCRIPTION: Exploit Observer has 10 entries related to CVE-2016-7855. Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016.

FIRST-EPSS: 0.086750000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2010-3904

DESCRIPTION: Exploit Observer has 111 entries related to CVE-2010-3904. The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.

FIRST-EPSS: 0.000880000
NVD-IS: 10.0
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-36846

DESCRIPTION: Exploit Observer has 8 entries related to CVE-2023-36846. A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain  part of the file system, which may allow chaining to other vulnerabilities. This issue affects Juniper Networks Junos OS on SRX Series: * All versions prior to 20.4R3-S8; * 21.1 versions 21.1R1 and later; * 21.2 versions prior to 21.2R3-S6; * 21.3 versions prior to 21.3R3-S5; * 21.4 versions prior to 21.4R3-S5; * 22.1 versions prior to 22.1R3-S3; * 22.2 versions prior to 22.2R3-S2; * 22.3 versions prior to 22.3R2-S2, 22.3R3; * 22.4 versions prior to 22.4R2-S1, 22.4R3.

FIRST-EPSS: 0.017140000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-31201

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2021-31201. Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

FIRST-EPSS: 0.003920000
NVD-IS: 2.7
NVD-ES: 2.0
#ExploitObserverAlert

CVE-2018-19320

DESCRIPTION: Exploit Observer has 21 entries related to CVE-2018-19320. The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRAPHICS ENGINE before 1.57, XTREME GAMING ENGINE before 1.26, and OC GURU II v2.08 exposes ring0 memcpy-like functionality that could allow a local attacker to take complete control of the affected system.

FIRST-EPSS: 0.001850000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2016-7255

DESCRIPTION: Exploit Observer has 78 entries related to CVE-2016-7255. The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

FIRST-EPSS: 0.011530000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2015-5122

DESCRIPTION: Exploit Observer has 35 entries related to CVE-2015-5122. Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.

FIRST-EPSS: 0.973610000
NVD-IS: 10.0
NVD-ES: 10.0
#ExploitObserverAlert

CVE-2016-0752

DESCRIPTION: Exploit Observer has 28 entries related to CVE-2016-0752. Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.

FIRST-EPSS: 0.973610000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2015-1130

DESCRIPTION: Exploit Observer has 15 entries related to CVE-2015-1130. The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors.

FIRST-EPSS: 0.000470000
NVD-IS: 10.0
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2018-11776

DESCRIPTION: Exploit Observer has 175 entries related to CVE-2018-11776. Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.

FIRST-EPSS: 0.975500000
NVD-IS: 5.9
NVD-ES: 2.2
#ExploitObserverAlert

CVE-2017-8464

DESCRIPTION: Exploit Observer has 112 entries related to CVE-2017-8464. Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."

FIRST-EPSS: 0.974560000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2018-0171

DESCRIPTION: Exploit Observer has 16 entries related to CVE-2018-0171. A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.

FIRST-EPSS: 0.816680000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-30858

DESCRIPTION: Exploit Observer has 29 entries related to CVE-2021-30858. A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

FIRST-EPSS: 0.007920000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2018-19943

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2018-19943. If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later

FIRST-EPSS: 0.001760000
NVD-IS: 2.7
NVD-ES: 2.3
#ExploitObserverAlert

CVE-2021-21220

DESCRIPTION: Exploit Observer has 15 entries related to CVE-2021-21220. Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

FIRST-EPSS: 0.969930000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2022-26352

DESCRIPTION: Exploit Observer has 13 entries related to CVE-2022-26352. An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.

FIRST-EPSS: 0.974840000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2018-8581

DESCRIPTION: Exploit Observer has 60 entries related to CVE-2018-8581. An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server.

FIRST-EPSS: 0.038350000
NVD-IS: 5.2
NVD-ES: 2.2