ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

WLB-2024020034

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020034. Newgen Technologies SQL Injection Vulnerability.
#ExploitObserverAlert

PSS-177050

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177050. Red Hat Security Advisory 2024-0746-03. Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.
#ExploitObserverAlert

ZDI-24-104

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-104. Allegra saveFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22548.
#ExploitObserverAlert

PSS-177069

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to PSS-177069. IBM i Access Client Solutions Remote Credential Theft. IBM i Access Client Solutions (ACS) versions 1.1.2 through 1.1.4 and 1.1.4.3 through 1.1.9.4 suffer from a remote credential theft vulnerability.
#ExploitObserverAlert

PSS-177052

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177052. Advanced Page Visit Counter 1.0 Cross Site Scripting. Advanced Page Visit Counter version 1.0 suffers from a persistent cross site scripting vulnerability.
#ExploitObserverAlert

WLB-2024020037

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020037. Cacti pollers.php SQL Injection / Remote Code Execution.
#ExploitObserverAlert

PSS-177070

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177070. Faraday 5.1.0. Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
#ExploitObserverAlert

PSS-177053

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177053. Red Hat Security Advisory 2024-0749-03. Red Hat Security Advisory 2024-0749-03 - An update for unbound is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include an integer overflow vulnerability.
#ExploitObserverAlert

WLB-2024020038

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020038. chenarkhayyam SQL Injection.
#ExploitObserverAlert

CVE-2024-24213

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24213. Supabase PostgreSQL v15.1 was discovered to contain a SQL injection vulnerability via the component /pg_meta/default/query.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

CVE-2024-23749

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-23749. KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

ZDI-24-116

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-116. Centreon updateLCARelation SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23116.
#ExploitObserverAlert

ZDI-24-098

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to ZDI-24-098. Schneider Electric Easergy Studio InitializeChannel Deserialization of Untrusted Data Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Schneider Electric Easergy Studio. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-7032.
#ExploitObserverAlert

ZDI-24-105

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-105. Allegra loadFieldMatch Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22506.
#ExploitObserverAlert

ZDI-24-112

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-112. Allegra downloadAttachmentGlobal Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-22507.
#ExploitObserverAlert

CVE-2024-22795

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-22795. Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 allows a local attacker to escalate privileges via the Recheck Compliance Status component.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

PSS-177057

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177057. Red Hat Security Advisory 2024-0753-03. Red Hat Security Advisory 2024-0753-03 - An update for linux-firmware is now available for Red Hat Enterprise Linux 7.
#ExploitObserverAlert

WLB-2024020039

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020039. SKC Infotech Admin Bypass & SQL Injection Vulnerability.
#ExploitObserverAlert

CVE-2024-23452

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-23452. Request smuggling vulnerability in HTTP server in Apache bRPC 0.9.5~1.7.0 on all platforms allows attacker to smuggle request. Vulnerability Cause Description: The http_parser does not comply with the RFC-7230 HTTP 1.1 specification. Attack scenario: If a message is received with both a Transfer-Encoding and a Content-Length header field, such a message might indicate an attempt to perform request smuggling or response splitting. One particular attack scenario is that a bRPC made http server on the backend receiving requests in one persistent connection from frontend server that uses TE to parse request with the logic that 'chunk' is contained in the TE field. in that case an attacker can smuggle a request into the connection to the backend server.  Solution: You can choose one solution from below: 1. Upgrade bRPC to version 1.8.0, which fixes this issue. Download link: https://github.com/apache/brpc/releases/tag/1.8.0 2. Apply this patch:  https://github.com/apache/brpc/pull/2518

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

CVE-2024-25450

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25450. imlib2 v1.9.1 was discovered to mishandle memory allocation in the function init_imlib_fonts().

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-24828

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-24828. pkg is tool design to bundle Node.js projects into an executables. Any native code packages built by `pkg` are written to a hardcoded directory. On unix systems, this is `/tmp/pkg/*` which is a shared directory for all users on the same local system. There is no uniqueness to the package names within this directory, they are predictable. An attacker who has access to the same local system has the ability to replace the genuine executables in the shared directory with malicious executables of the same name. A user may then run the malicious executable without realising it has been modified. This package is deprecated. Therefore, there will not be a patch provided for this vulnerability. To check if your executable build by pkg depends on native code and is vulnerable, run the executable and check if `/tmp/pkg/` was created. Users should transition to actively maintained alternatives. We would recommend investigating Node.js 21’s support for single executable applications. Given the decision to deprecate the pkg package, there are no official workarounds or remediations provided by our team. Users should prioritize migrating to other packages that offer similar functionality with enhanced security.

FIRST-EPSS: 0.000430000