ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2020-0796

DESCRIPTION: Exploit Observer has 357 entries related to CVE-2020-0796. A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.

FIRST-EPSS: 0.974840000
NVD-IS: 6.0
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2022-30076

DESCRIPTION: Exploit Observer has 17 entries related to CVE-2022-30076. ENTAB ERP 1.0 allows attackers to discover users' full names via a brute force attack with a series of student usernames such as s10000 through s20000. There is no rate limiting.

FIRST-EPSS: 0.000540000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-38433

DESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-38433. Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900?D / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.

FIRST-EPSS: 0.004380000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-28252

DESCRIPTION: Exploit Observer has 20 entries related to CVE-2023-28252. Windows Common Log File System Driver Elevation of Privilege Vulnerability

FIRST-EPSS: 0.018150000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2022-41973

DESCRIPTION: Exploit Observer has 14 entries related to CVE-2022-41973. multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.

FIRST-EPSS: 0.000460000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2023-32254

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-32254. A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

FIRST-EPSS: 0.002170000
NVD-IS: 5.9
NVD-ES: 2.2
#ExploitObserverAlert

CVE-2023-20198

DESCRIPTION: Exploit Observer has 153 entries related to CVE-2023-20198. Cisco is aware of active exploitation of a previously unknown vulnerability in the web UI feature of Cisco IOS XE Software when exposed to the internet or to untrusted networks. This vulnerability allows a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system.
For steps to close the attack vector for this vulnerability, see the Recommendations section of this advisory 
Cisco will provide updates on the status of this investigation and when a software patch is available.

FIRST-EPSS: 0.925950000
NVD-IS: 6.0
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-38354

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-38354. The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6.

FIRST-EPSS: 0.000680000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2022-47966

DESCRIPTION: Exploit Observer has 45 entries related to CVE-2022-47966. Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of Apache Santuario xmlsec (aka XML Security for Java) 1.4.1, because the xmlsec XSLT features, by design in that version, make the application responsible for certain security protections, and the ManageEngine applications did not provide those protections. This affects Access Manager Plus before 4308, Active Directory 360 before 4310, ADAudit Plus before 7081, ADManager Plus before 7162, ADSelfService Plus before 6211, Analytics Plus before 5150, Application Control Plus before 10.1.2220.18, Asset Explorer before 6983, Browser Security Plus before 11.1.2238.6, Device Control Plus before 10.1.2220.18, Endpoint Central before 10.1.2228.11, Endpoint Central MSP before 10.1.2228.11, Endpoint DLP before 10.1.2137.6, Key Manager Plus before 6401, OS Deployer before 1.1.2243.1, PAM 360 before 5713, Password Manager Pro before 12124, Patch Manager Plus before 10.1.2220.18, Remote Access Plus before 10.1.2228.11, Remote Monitoring and Management (RMM) before 10.1.41. ServiceDesk Plus before 14004, ServiceDesk Plus MSP before 13001, SupportCenter Plus before 11026, and Vulnerability Manager Plus before 10.1.2220.18. Exploitation is only possible if SAML SSO has ever been configured for a product (for some products, exploitation requires that SAML SSO is currently active).

FIRST-EPSS: 0.970510000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2022-3482

DESCRIPTION: Exploit Observer has 3 entries related to CVE-2022-3482. An improper access control issue in GitLab CE/EE affecting all versions from 11.3 prior to 15.3.5, 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2 allowed an unauthorized user to see release names even when releases we set to be restricted to project members only

FIRST-EPSS: 0.000520000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2022-4236

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-4236. The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file via an AJAX action available to any authenticated users, which could allow users with a role as low as subscriber to read arbitrary files on the server.

FIRST-EPSS: 0.000490000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2023-35349

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-35349. Microsoft Message Queuing Remote Code Execution Vulnerability

FIRST-EPSS: 0.008000000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-38334

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-38334. The WP Design Maps
#ExploitObserverAlert

CVE-2023-28771

DESCRIPTION: Exploit Observer has 17 entries related to CVE-2023-28771. Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.

FIRST-EPSS: 0.918550000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-36844

DESCRIPTION: Exploit Observer has 13 entries related to CVE-2023-36844. A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.

Using a crafted request an attacker is able to modify

certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:



* All versions prior to 20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions

prior to

21.3R3-S5;
* 21.4 versions

prior to

21.4R3-S5;
* 22.1 versions

prior to

22.1R3-S4;
* 22.2 versions

prior to

22.2R3-S2;
* 22.3 versions

prior to 22.3R3-S1;
* 22.4 versions

prior to

22.4R2-S2, 22.4R3;
* 23.2 versions prior to

23.2R1-S1, 23.2R2.

FIRST-EPSS: 0.025570000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-35934

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-35934. yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download fragments differs from their parent manifest's host. This vulnerable behavior is present in yt-dlp prior to 2023.07.06 and nightly 2023.07.06.185519. All native and external downloaders are affected, except for `curl` and `httpie` (version 3.1.0 or later).

At the file download stage, all cookies are passed by yt-dlp to the file downloader as a `Cookie` header, thereby losing their scope. This also occurs in yt-dlp's info JSON output, which may be used by external tools. As a result, the downloader or external tool may indiscriminately send cookies with requests to domains or paths for which the cookies are not scoped.

yt-dlp version 2023.07.06 and nightly 2023.07.06.185519 fix this issue by removing the `Cookie` header upon HTTP redirects; having native downloaders calculate the `Cookie` header from the cookiejar, utilizing external downloaders' built-in support for cookies instead of passing them as header arguments, disabling HTTP redirectiong if the external downloader does not have proper cookie support, processing cookies passed as HTTP headers to limit their scope, and having a separate field for cookies in the info dict storing more information about scoping

Some workarounds are available for those who are unable to upgrade. Avoid using cookies and user authentication methods. While extractors may set custom cookies, these usually do not contain sensitive information. Alternatively, avoid using `--load-info-json`. Or, if authentication is a must: verify the integrity of download links from unknown sources in browser (including redirects) before passing them to yt-dlp; use `curl` as external downloader, since it is not impacted; and/or avoid fragmented formats such as HLS/m3u8, DASH/mpd and ISM.

FIRST-EPSS: 0.000900000
NVD-IS: 4.7
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2023-5487

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5487. Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)

FIRST-EPSS: 0.000520000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2023-4586

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-4586. A vulnerability was found in the Hot Rod client. This security issue occurs as the Hot Rod client does not enable hostname validation when using TLS, possibly resulting in a man-in-the-middle (MITM) attack.

FIRST-EPSS: 0.000870000
NVD-IS: 5.2
NVD-ES: 2.2
#ExploitObserverAlert

CVE-2020-2236

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-2236. Jenkins Yet Another Build Visualizer Plugin 1.11 and earlier does not escape tooltip content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Run/Update permission.

FIRST-EPSS: 0.000540000
NVD-IS: 2.7
NVD-ES: 2.3
#ExploitObserverAlert

CVE-2021-22218

DESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-22218. All versions of GitLab CE/EE starting from 12.8 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits.

FIRST-EPSS: 0.000670000
NVD-IS: 1.4
NVD-ES: 1.2
#ExploitObserverAlert

CVE-2022-30190

DESCRIPTION: Exploit Observer has 308 entries related to CVE-2022-30190. Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.

FIRST-EPSS: 0.971670000
NVD-IS: 5.9
NVD-ES: 1.8