ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2023-47882

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-47882. The Kami Vision YI IoT com.yunyi.smartcamera application through 4.1.9_20231127 for Android allows a remote attacker to execute arbitrary JavaScript code via an implicit intent to the com.ants360.yicamera.activity.WebViewActivity component.
#ExploitObserverAlert

CVE-2022-46487

DESCRIPTION: Exploit Observer has 6 entries related to CVE-2022-46487. Improper initialization of x87 and SSE floating-point configuration registers in the __scone_entry component of SCONE before 5.8.0 for Intel SGX allows a local attacker to compromise the execution integrity of floating-point operations in an enclave or access sensitive information via side-channel analysis.
#ExploitObserverAlert

CVE-2023-35813

DESCRIPTION: Exploit Observer has 6 entries related to CVE-2023-35813. Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.

FIRST-EPSS: 0.271060000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-3028

DESCRIPTION: Exploit Observer has 5 entries related to CVE-2023-3028. Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too. Multiple vulnerabilities were identified: - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker. - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend. - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location. - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend. The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.

FIRST-EPSS: 0.000910000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-46901

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-46901. examples/6lbr/apps/6lbr-webserver/httpd.c in CETIC-6LBR (aka 6lbr) 1.5.0 has a strcat stack-based buffer overflow via a request for a long URL over a 6LoWPAN network.
#ExploitObserverAlert

CVE-2023-2744

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-2744. The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.

FIRST-EPSS: 0.000790000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert

CVE-2016-5535

DESCRIPTION: Exploit Observer has 5 entries related to CVE-2016-5535. Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, 12.2.1.0, and 12.2.1.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.

FIRST-EPSS: 0.038410000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2022-46486

DESCRIPTION: Exploit Observer has 3 entries related to CVE-2022-46486. A lack of pointer-validation logic in the __scone_dispatch component of SCONE before v5.8.0 for Intel SGX allows attackers to access sensitive information.
#ExploitObserverAlert

CVE-2023-7130

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-7130. A vulnerability has been found in code-projects College Notes Gallery 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument user leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249133 was assigned to this vulnerability.
#ExploitObserverAlert

CVE-2014-5301

DESCRIPTION: Exploit Observer has 10 entries related to CVE-2014-5301. Directory traversal vulnerability in ServiceDesk Plus MSP v5 to v9.0 v9030; AssetExplorer v4 to v6.1; SupportCenter v5 to v7.9; IT360 v8 to v10.4.

FIRST-EPSS: 0.970950000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2021-46900

DESCRIPTION: Exploit Observer has 3 entries related to CVE-2021-46900. Sympa before 6.2.62 relies on a cookie parameter for certain security objectives, but does not ensure that this parameter exists and has an unpredictable value. Specifically, the cookie parameter is both a salt for stored passwords and an XSS protection mechanism.
#ExploitObserverAlert

CVE-2015-5897

DESCRIPTION: Exploit Observer has 5 entries related to CVE-2015-5897. The Address Book framework in Apple OS X before 10.11 allows local users to gain privileges by using an environment variable to inject code into processes that rely on this framework.

FIRST-EPSS: 0.000420000
NVD-IS: 6.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2020-13849

DESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-13849. The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.

FIRST-EPSS: 0.002050000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2018-25096

DESCRIPTION: Exploit Observer has 4 entries related to CVE-2018-25096. A vulnerability was found in MdAlAmin-aol Own Health Record 0.1-alpha/0.2-alpha/0.3-alpha/0.3.1-alpha. It has been rated as problematic. This issue affects some unknown processing of the file includes/logout.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 0.4-alpha is able to address this issue. The patch is named 58b413aa40820b49070782c786c526850ab7748f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-249191.
#ExploitObserverAlert

CVE-2021-0229

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2021-0229. An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (JET) application designed with a listening port uses the Message Queue Telemetry Transport (MQTT) protocol to connect to a mosquitto broker that is running on Junos OS to subscribe for events. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 16.1R1 and later versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1.

FIRST-EPSS: 0.000810000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2019-12480

DESCRIPTION: Exploit Observer has 10 entries related to CVE-2019-12480. BACnet Protocol Stack through 0.8.6 has a segmentation fault leading to denial of service in BACnet APDU Layer because a malformed DCC in AtomicWriteFile, AtomicReadFile and DeviceCommunicationControl services. An unauthenticated remote attacker could cause a denial of service (bacserv daemon crash) because there is an invalid read in bacdcode.c during parsing of alarm tag numbers.

FIRST-EPSS: 0.064880000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-51467

DESCRIPTION: Exploit Observer has 6 entries related to CVE-2023-51467. The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)
#ExploitObserverAlert

CVE-2015-3785

DESCRIPTION: Exploit Observer has 5 entries related to CVE-2015-3785. The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

FIRST-EPSS: 0.000420000
NVD-IS: 2.9
NVD-ES: 3.4
#ExploitObserverAlert

GHSA-pvvf-569h-5779

DESCRIPTION: Exploit Observer has 3 entries related to GHSA-PVVF-569H-5779. Azure HDInsight Apache Oozie Workflow Scheduler Elevation of Privilege Vulnerability
#ExploitObserverAlert

GHSA-mp2m-2429-rgfv

DESCRIPTION: Exploit Observer has 1 entries related to GHSA-MP2M-2429-RGFV. An issue in Netgate pfSense v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the interfaces_gif_edit.php and interfaces_gre_edit.php components.

GHSS: 8.8
#ExploitObserverAlert

GHSA-p7q7-p4xf-xrpf

DESCRIPTION: Exploit Observer has 3 entries related to GHSA-P7Q7-P4XF-XRPF. The IHwAttestationService interface has a defect in authentication. Successful exploitation of this vulnerability may affect data confidentiality.

GHSS: 7.5