ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

PSS-176783

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176783. Ubuntu Security Notice USN-6606-1. Ubuntu Security Notice 6606-1 - It was discovered that a race condition existed in the Bluetooth subsystem of the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that the CIFS network file system implementation in the Linux kernel did not properly validate the server frame size in certain situation, leading to an out-of-bounds read vulnerability. An attacker could use this to construct a malicious CIFS image that, when operated on, could cause a denial of service or possibly expose sensitive information.
#ExploitObserverAlert

CVE-2021-36162

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-36162. Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2

FIRST-EPSS: 0.001650000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2021-40369

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2021-40369. A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.

FIRST-EPSS: 0.003050000
NVD-IS: 2.7
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2023-42004

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-42004. IBM Security Guardium 11.3, 11.4, and 11.5 is potentially vulnerable to CSV injection. A remote attacker could execute malicious commands due to improper validation of csv file contents. IBM X-Force ID: 265262.

FIRST-EPSS: 0.000700000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

PSS-176777

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176777. Ubuntu Security Notice USN-6600-1. Ubuntu Security Notice 6600-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.39 in Ubuntu 20.04 LTS, 10.6.16 in Ubuntu 22.04 LTS and 10.11.6 in Ubuntu 23.10. CVE-2022-47015 only affected the MariaDB packages in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
#ExploitObserverAlert

CVE-2022-28731

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-28731. A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.

FIRST-EPSS: 0.000630000
NVD-IS: 3.6
NVD-ES: 2.8
#ExploitObserverAlert

CVE-2022-33140

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2022-33140. The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.

FIRST-EPSS: 0.001660000
NVD-IS: 5.9
NVD-ES: 2.8
#ExploitObserverAlert

GHSA-f7x7-cw3q-5rm9

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to GHSA-f7x7-cw3q-5rm9. Use after free in Passwords in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
#ExploitObserverAlert

CVE-2021-43297

DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-43297. A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.

FIRST-EPSS: 0.011420000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

GHSA-xj6f-mr2f-7c6m

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-xj6f-mr2f-7c6m. Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.
#ExploitObserverAlert

PSS-176797

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-176797. Apple Security Advisory 01-22-2024-2. Apple Security Advisory 01-22-2024-2 - iOS 17.3 and iPadOS 17.3 addresses bypass and code execution vulnerabilities.
#ExploitObserverAlert

GHSA-phrf-fj83-fcfv

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-phrf-fj83-fcfv. An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
#ExploitObserverAlert

WLB-2024010076

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010076. PHPJ-Callback-Widget-1.0-XSS-Stored-admin-Hijacking.
#ExploitObserverAlert

WLB-2024010079

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010079. CloudLinux CageFS 7.0.8-2 Insufficiently Restricted Proxy Command.
#ExploitObserverAlert

CVE-2024-22233

DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2024-22233. In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2021-20202

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-20202. A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.

FIRST-EPSS: 0.000440000
NVD-IS: 5.5
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2022-22970

DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to CVE-2022-22970. In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.

FIRST-EPSS: 0.001570000
NVD-IS: 3.6
NVD-ES: 1.6
#ExploitObserverAlert

CVE-2021-37579

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2021-37579. The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.

FIRST-EPSS: 0.600670000
NVD-IS: 5.9
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-31412

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to CVE-2021-31412. Improper sanitization of path in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for NotFoundException is provided.

FIRST-EPSS: 0.000770000
NVD-IS: 1.4
NVD-ES: 3.9
#ExploitObserverAlert

CVE-2021-3629

DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to CVE-2021-3629. A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Final.

FIRST-EPSS: 0.000910000
NVD-IS: 3.6
NVD-ES: 2.2
#ExploitObserverAlert

CVE-2022-1245

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2022-1245. A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.

FIRST-EPSS: 0.002320000
NVD-IS: 5.9
NVD-ES: 3.9