ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

GHSA-pxvc-5jrx-h52p

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-pxvc-5jrx-h52p. A vulnerability has been found in Beijing Baichuo Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert

GHSA-m7gj-wmp7-fwfx

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m7gj-wmp7-fwfx. A vulnerability was found in TRENDnet TEW-800MB 1.0.1.0 and classified as critical. Affected by this issue is some unknown functionality of the component POST Request Handler. The manipulation of the argument DeviceURL leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert

GHSA-jhhh-mxj4-r289

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-jhhh-mxj4-r289. Integer overflow vulnerability in FFmpeg before n6.1, allows remote attackers to execute arbitrary code via the jpegxl_anim_read_packet component in the JPEG XL Animation decoder.
#ExploitObserverAlert

GHSA-vhw4-mjfv-p3gg

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-vhw4-mjfv-p3gg. Improper input validation vulnerability in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.7, Ver.3.0.x series versions prior to Ver.3.0.29, Ver.2.11.x series versions prior to Ver.2.11.58, Ver.2.10.x series versions prior to Ver.2.10.50, and Ver.2.9.0 and earlier allows a remote authenticated attacker to execute arbitrary code by uploading a specially crafted SVG file.
#ExploitObserverAlert

WLB-2024010081

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010081. Yahweh Touch - Blind Sql Injection.
#ExploitObserverAlert

GHSA-m295-r33q-79rg

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-m295-r33q-79rg. An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
#ExploitObserverAlert

WLB-2024010087

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024010087. PHPJ-Callback-Widget-1.0-XSS-Reflected-admin-Hijacking.
#ExploitObserverAlert

GHSA-x4j2-fh47-r6r6

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-x4j2-fh47-r6r6. Alinto SOGo 5.8.0 is vulnerable to HTML Injection.
#ExploitObserverAlert

GHSA-gxg7-pxwf-9r28

DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to GHSA-gxg7-pxwf-9r28. An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
#ExploitObserverAlert

WLB-2024020035

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020035. Laravel Env file Access Open Directory.
#ExploitObserverAlert

ZDI-24-097

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-097. Wazuh Log Collector Integer Underflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wazuh. Log Injection is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.4. The following CVEs are assigned: CVE-2023-42463.
#ExploitObserverAlert

CVE-2024-22318

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-22318. IBM i Access Client Solutions (ACS) 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 is vulnerable to NT LAN Manager (NTLM) hash disclosure by an attacker modifying UNC capable paths within ACS configuration files to point to a hostile server. If NTLM is enabled, the Windows operating system will try to authenticate using the current user's session. The hostile server could capture the NTLM hash information to obtain the user's credentials. IBM X-Force ID: 279091.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

ZDI-24-117

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-117. Centreon updateGroups SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23115.
#ExploitObserverAlert

EDB-51786

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51786. Zyxel zysh - Format string
#ExploitObserverAlert

PSS-177059

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177059. Red Hat Security Advisory 2024-0754-03. Red Hat Security Advisory 2024-0754-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a code execution vulnerability.
#ExploitObserverAlert

PSS-177063

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177063. Red Hat Security Advisory 2024-0758-03. Red Hat Security Advisory 2024-0758-03 - An update for the container-tools:2.0 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.
#ExploitObserverAlert

CVE-2024-25448

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25448. An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2023-47020

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2023-47020. Multiple Cross-Site Request Forgery (CSRF) chaining in NCR Terminal Handler v.1.5.1 allows privileges to be escalated by an attacker through a crafted request involving user account creation and adding the user to an administrator group. This is exploited by an undisclosed function in the WSDL that lacks security controls and can accept custom content types.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

EDB-51788

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51788. Wordpress Augmented-Reality - Remote Code Execution Unauthenticated
#ExploitObserverAlert

ZDI-24-107

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-107. Allegra extarctZippedFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22504.
#ExploitObserverAlert

PSS-177064

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177064. Ubuntu Security Notice USN-6625-2. Ubuntu Security Notice 6625-2 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.