ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-0184

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0184. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/edit_teacher.php of the component Add Enginer. The manipulation of the argument Firstname/Lastname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249442 is the identifier assigned to this vulnerability.

FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 1.7
#ExploitObserverAlert

CVE-2024-22922

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-22922. An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
#ExploitObserverAlert

PSS-176712

DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to PSS-176712. Red Hat Security Advisory 2024-0397-03. Red Hat Security Advisory 2024-0397-03 - An update for the squid:4 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include buffer over-read, denial of service, and null pointer vulnerabilities.
#ExploitObserverAlert

CVE-2024-21666

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-21666. The Customer Management Framework (CMF) for Pimcore adds functionality for customer data management, segmentation, personalization and marketing automation. An authenticated and unauthorized user can access the list of potential duplicate users and see their data. Permissions are enforced when reaching the `/admin/customermanagementframework/duplicates/list` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. Unauthorized user(s) can access PII data from customers. This vulnerability has been patched in version 4.0.6.

FIRST-EPSS: 0.000540000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2023-43997

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43997. An issue in Yoruichi hobby base mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert

CVE-2023-0792

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2023-0792. Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.

FIRST-EPSS: 0.000630000
NVD-IS: 2.5
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2023-33759

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33759. SpliceCom Maximiser Soft PBX v1.5 and before does not restrict excessive authentication attempts, allowing attackers to bypass authentication via a brute force attack.
#ExploitObserverAlert

CVE-2023-51702

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-51702. Since version 5.2.0, when using deferrable mode with the path of a Kubernetes configuration file for authentication, the Airflow worker serializes this configuration file as a dictionary and sends it to the triggerer by storing it in metadata without any encryption. Additionally, if used with an Airflow version between 2.3.0 and 2.6.0, the configuration dictionary will be logged as plain text in the triggerer service without masking. This allows anyone with access to the metadata or triggerer log to obtain the configuration file and use it to access the Kubernetes cluster. This behavior was changed in version 7.0.0, which stopped serializing the file contents and started providing the file path instead to read the contents into the trigger. Users are recommended to upgrade to version 7.0.0, which fixes this issue.
#ExploitObserverAlert

CVE-2024-0705

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2024-0705. The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 3.7.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

FIRST-EPSS: 0.000440000
#ExploitObserverAlert

CVE-2023-52038

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52038. An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows attackers to run arbitrary commands via the sub_415C80 function.
#ExploitObserverAlert

CVE-2024-0183

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2024-0183. A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/students.php of the component NIA Office. The manipulation leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249441 was assigned to this vulnerability.

FIRST-EPSS: 0.000510000
NVD-IS: 2.7
NVD-ES: 1.7
#ExploitObserverAlert

CVE-2023-0739

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-0739. Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.

FIRST-EPSS: 0.000560000
NVD-IS: 5.2
NVD-ES: 1.6
#ExploitObserverAlert

PSS-176711

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to PSS-176711. Red Hat Security Advisory 2024-0387-03. Red Hat Security Advisory 2024-0387-03 - An update for the php:8.1 module is now available for Red Hat Enterprise Linux 9. Issues addressed include a denial of service vulnerability.
#ExploitObserverAlert

CVE-2023-43989

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-43989. An issue in mokumoku chohu mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
#ExploitObserverAlert

PD/http/cves/2023/CVE-2023-47211

DESCRIPTION: Exploit Observer has 4 entries in 4 file formats related to PD/HTTP/CVES/2023/CVE-2023-47211. A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
#ExploitObserverAlert

CVE-2024-21319

DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2024-21319. Microsoft Identity Denial of service vulnerability

FIRST-EPSS: 0.000570000
NVD-IS: 4.0
NVD-ES: 2.3
#ExploitObserverAlert

CVE-2024-0305

DESCRIPTION: Exploit Observer has 6 entries in 3 file formats related to CVE-2024-0305. A vulnerability was found in Guangzhou Yingke Electronic Technology Ncast up to 2017 and classified as problematic. Affected by this issue is some unknown functionality of the file /manage/IPSetup.php of the component Guest Login. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249872.

FIRST-EPSS: 0.000640000
NVD-IS: 3.6
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2023-6147

DESCRIPTION: Exploit Observer has 5 entries in 2 file formats related to CVE-2023-6147. Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data

FIRST-EPSS: 0.000460000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2024-0188

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-0188. A vulnerability, which was classified as problematic, was found in RRJ Nueva Ecija Engineer Online Portal 1.0. This affects an unknown part of the file change_password_teacher.php. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-249501 was assigned to this vulnerability.

FIRST-EPSS: 0.000630000
NVD-IS: 5.9
NVD-ES: 2.2
#ExploitObserverAlert

CVE-2022-42905

DESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to CVE-2022-42905. In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)

FIRST-EPSS: 0.001410000
NVD-IS: 5.2
NVD-ES: 3.9
#ExploitObserverAlert

WLB-2024010074

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010074. GL.iNet Unauthenticated Remote Command Execution.