ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2016-3461

DESCRIPTION: Exploit Observer has 8 entries related to CVE-2016-3461. Unspecified vulnerability in the MySQL Enterprise Monitor component in Oracle MySQL 3.0.25 and earlier and 3.1.2 and earlier allows remote administrators to affect confidentiality, integrity, and availability via vectors related to Monitoring: Server.

FIRST-EPSS: 0.001460000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert

CVE-2023-51812

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-51812. Tenda AX3 v16.03.12.11 was discovered to contain a remote code execution (RCE) vulnerability via the list parameter at /goform/SetNetControlList.
#ExploitObserverAlert

CVE-2020-10740

DESCRIPTION: Exploit Observer has 5 entries related to CVE-2020-10740. A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.

FIRST-EPSS: 0.003330000
NVD-IS: 5.9
NVD-ES: 1.6
#ExploitObserverAlert

CVE-2020-27131

DESCRIPTION: Exploit Observer has 7 entries related to CVE-2020-27131. Multiple vulnerabilities in the Java deserialization function that is used by Cisco Security Manager could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. These vulnerabilities are due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit these vulnerabilities by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary commands on the device with the privileges of NT AUTHORITY\SYSTEM on the Windows target host. Cisco has not released software updates that address these vulnerabilities.

FIRST-EPSS: 0.932440000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2020-14625

DESCRIPTION: Exploit Observer has 5 entries related to CVE-2020-14625. Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

FIRST-EPSS: 0.693400000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-52266

DESCRIPTION: Exploit Observer has 4 entries related to CVE-2023-52266. ehttp 1.0.6 before 17405b9 has an epoll_socket.cpp read_func use-after-free. An attacker can make many connections over a short time to trigger this.

FIRST-EPSS: 0.000500000
#ExploitObserverAlert

CVE-2017-3523

DESCRIPTION: Exploit Observer has 8 entries related to CVE-2017-3523. Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.40 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 8.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).

FIRST-EPSS: 0.001470000
NVD-IS: 6.0
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2020-12760

DESCRIPTION: Exploit Observer has 9 entries related to CVE-2020-12760. An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user regardless of its assigned permissions.

FIRST-EPSS: 0.003460000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2017-12633

DESCRIPTION: Exploit Observer has 10 entries related to CVE-2017-12633. The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.

FIRST-EPSS: 0.004330000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2015-8360

DESCRIPTION: Exploit Observer has 9 entries related to CVE-2015-8360. An unspecified resource in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 allows remote attackers to execute arbitrary Java code via serialized data to the JMS port.

FIRST-EPSS: 0.006510000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2015-1920

DESCRIPTION: Exploit Observer has 9 entries related to CVE-2015-1920. IBM WebSphere Application Server (WAS) 6.1 through 6.1.0.47, 7.0 before 7.0.0.39, 8.0 before 8.0.0.11, and 8.5 before 8.5.5.6 allows remote attackers to execute arbitrary code by sending crafted instructions in a management-port session.

FIRST-EPSS: 0.005950000
NVD-IS: 10.0
NVD-ES: 10.0
#ExploitObserverAlert

CVE-2023-6347

DESCRIPTION: Exploit Observer has 8 entries related to CVE-2023-6347. Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

FIRST-EPSS: 0.001750000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2021-46360

DESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-46360. Authenticated remote code execution (RCE) in Composr-CMS 10.0.39 and earlier allows remote attackers to execute arbitrary code via uploading a PHP shell through /adminzone/index.php?page=admin-commandr.

FIRST-EPSS: 0.010350000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2019-3948

DESCRIPTION: Exploit Observer has 10 entries related to CVE-2019-3948. The Amcrest IP2M-841B V2.520.AC00.18.R, Dahua IPC-XXBXX V2.622.0000000.9.R, Dahua IPC HX5X3X and HX4X3X V2.800.0000008.0.R, Dahua DH-IPC HX883X and DH-IPC-HX863X V2.622.0000000.7.R, Dahua DH-SD4XXXXX V2.623.0000000.7.R, Dahua DH-SD5XXXXX V2.623.0000000.1.R, Dahua DH-SD6XXXXX V2.640.0000000.2.R and V2.623.0000000.1.R, Dahua NVR5XX-4KS2 V3.216.0000006.0.R, Dahua NVR4XXX-4KS2 V3.216.0000006.0.R, and NVR2XXX-4KS2 do not require authentication to access the HTTP endpoint /videotalk. An unauthenticated, remote person can connect to this endpoint and potentionally listen to the audio of the capturing device.

FIRST-EPSS: 0.098840000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2022-3349

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-3349. A vulnerability was found in Sony PS4 and PS5. It has been classified as critical. This affects the function UVFAT_readupcasetable of the component exFAT Handler. The manipulation of the argument dataLength leads to heap-based buffer overflow. It is possible to launch the attack on the physical device. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-209679.

FIRST-EPSS: 0.000540000
NVD-IS: 5.9
NVD-ES: 0.9
#ExploitObserverAlert

CVE-2023-45152

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-45152. Engelsystem is a shift planning system for chaos events. A Blind SSRF in the "Import schedule" functionality makes it possible to perform a port scan against the local environment. This vulnerability has been fixed in commit ee7d30b33. If a patch cannot be deployed, operators should ensure that no HTTP(s) services listen on localhost and/or systems only reachable from the host running the engelsystem software. If such services are necessary, they should utilize additional authentication.

FIRST-EPSS: 0.000430000
NVD-IS: 1.4
NVD-ES: 0.8
#ExploitObserverAlert

CVE-2023-49285

DESCRIPTION: Exploit Observer has 8 entries related to CVE-2023-49285. Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.

FIRST-EPSS: 0.013880000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2022-23491

DESCRIPTION: Exploit Observer has 4 entries related to CVE-2022-23491. Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.

FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2024-22087

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2024-22087. route in main.c in Pico HTTP Server in C through f3b69a6 has an sprintf stack-based buffer overflow via a long URI, leading to remote code execution.
#ExploitObserverAlert

CVE-2015-0014

DESCRIPTION: Exploit Observer has 7 entries related to CVE-2015-0014. Buffer overflow in the Telnet service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows Telnet Service Buffer Overflow Vulnerability."

FIRST-EPSS: 0.875790000
NVD-IS: 10.0
NVD-ES: 10.0
#ExploitObserverAlert

CVE-2021-22968

DESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-22968. A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below.The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration.To fix this, a check for allowed file extensions was added before downloading files to a tmp directory.Concrete CMS Security Team gave this a CVSS v3.1 score of 5.4 AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:NThis fix is also in Concrete version 9.0.0

FIRST-EPSS: 0.009040000
NVD-IS: 5.9
NVD-ES: 1.2