ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2023-4357

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-4357. Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)

FIRST-EPSS: 0.001100000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2020-14386

DESCRIPTION: Exploit Observer has 30 entries related to CVE-2020-14386. A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.

FIRST-EPSS: 0.000450000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2015-3145

DESCRIPTION: Exploit Observer has 23 entries related to CVE-2015-3145. The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.

FIRST-EPSS: 0.897800000
NVD-IS: 6.4
NVD-ES: 10.0
#ExploitObserverAlert

CVE-2019-0567

DESCRIPTION: Exploit Observer has 8 entries related to CVE-2019-0567. A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0568.

FIRST-EPSS: 0.960540000
NVD-IS: 5.9
NVD-ES: 1.6
#ExploitObserverAlert

CVE-2023-46604

DESCRIPTION: Exploit Observer has 22 entries related to CVE-2023-46604. The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the OpenWire
protocol to cause either the client or the broker (respectively) to
instantiate any class on the classpath.

Users are recommended to upgrade
both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3
which fixes this issue.

FIRST-EPSS: 0.965740000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

GHSA-r6cc-7wj7-gfx2

DESCRIPTION: Exploit Observer has 1 entries related to GHSA-R6CC-7WJ7-GFX2. Kubernetes is vulnerable to privilege escalation when a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.

GHSS: 8.8
#ExploitObserverAlert

GHSA-m7pr-fh39-xc2c

DESCRIPTION: Exploit Observer has 1 entries related to GHSA-M7PR-FH39-XC2C. The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject passive HTML.

GHSS: 3.1
#ExploitObserverAlert

GHSA-mjq6-pv9c-qppq

DESCRIPTION: Exploit Observer has 1 entries related to GHSA-MJQ6-PV9C-QPPQ. The vulnerability affects the endpoint /v2/pkgs/tools/installed and the way it handles plugin names supplied as user input.
A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP DELETE request.
Further details are available in the references.

GHSS: 6.1
#ExploitObserverAlert

GHSA-pv7f-h3w8-w3jh

DESCRIPTION: Exploit Observer has 5 entries related to GHSA-PV7F-H3W8-W3JH. Velneo vClient on its 28.1.3 version, does not correctly check the certificate of authenticity by default. This could allow an attacker that has access to the network to perform a MITM attack in order to obtain the user´s credentials.

GHSS: 5.9
#ExploitObserverAlert

EDB-51747

DESCRIPTION: Exploit Observer has 5 entries related to EDB-51747. Splunk 9.0.5 - admin account take over
#ExploitObserverAlert

EDB-51746

DESCRIPTION: Exploit Observer has 1 entries related to EDB-51746. OpenPLC WebServer 3 - Denial of Service
#ExploitObserverAlert

CVE-2023-5375

DESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-5375. Open Redirect in GitHub repository mosparo/mosparo prior to 1.0.2.

FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2014-9690

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2014-9690. Huawei home gateways WS318 with software V100R001C01B022 and earlier versions are affected by the PIN offline brute force cracking vulnerability of the WPS protocol because the random number generator (RNG) used in the supplier's solution is not random enough. As a result, brute force cracking the PIN code is easier. After an attacker cracks the PIN, the attacker can access the Internet via the cracked device.

FIRST-EPSS: 0.001680000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-4357

DESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-4357. Insufficient validation of untrusted input in XML in Google Chrome prior to 116.0.5845.96 allowed a remote attacker to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)

FIRST-EPSS: 0.001280000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2021-41773

DESCRIPTION: Exploit Observer has 338 entries related to CVE-2021-41773. A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.

FIRST-EPSS: 0.974240000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-4034

DESCRIPTION: Exploit Observer has 532 entries related to CVE-2021-4034. A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

FIRST-EPSS: 0.000460000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2023-46604

DESCRIPTION: Exploit Observer has 23 entries related to CVE-2023-46604. The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

FIRST-EPSS: 0.965740000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

GHSA-w9cp-3x79-2p8p

DESCRIPTION: Exploit Observer has 1 entries related to GHSA-W9CP-3X79-2P8P. Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attackers to execute arbitrary Python code.

GHSS: 9.8
#ExploitObserverAlert

GHSA-jwfv-vj48-p3xq

DESCRIPTION: Exploit Observer has 1 entries related to GHSA-JWFV-VJ48-P3XQ. Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.

GHSS: 5.5
#ExploitObserverAlert

GHSA-mf3w-j4fp-pv84

DESCRIPTION: Exploit Observer has 2 entries related to GHSA-MF3W-J4FP-PV84. In MtpPropertyValue of MtpProperty.h, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

GHSS: 7.8
#ExploitObserverAlert

GHSA-pfvh-chxv-ccfm

DESCRIPTION: Exploit Observer has 15 entries related to GHSA-PFVH-CHXV-CCFM. In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.