ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

ZDI-24-114

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-114. Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23118.
#ExploitObserverAlert

ZDI-24-102

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-102. Allegra SiteConfigAction Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22512.
#ExploitObserverAlert

CVE-2024-25447

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25447. An issue in the imlib_load_image_with_error_return function of imlib2 v1.9.1 allows attackers to cause a heap buffer overflow via parsing a crafted image.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2023-48974

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2023-48974. Cross Site Scripting vulnerability in Axigen WebMail v.10.5.7 and before allows a remote attacker to escalate privileges via a crafted script to the serverName_input parameter.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

WLB-2024020036

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020036. GYM MS 1.0 Cross Site Scripting.
#ExploitObserverAlert

PSS-177068

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177068. Ubuntu Security Notice USN-6628-1. Ubuntu Security Notice 6628-1 - Quentin Minster discovered that a race condition existed in the KSMBD implementation in the Linux kernel when handling sessions operations. A remote attacker could use this to cause a denial of service or possibly execute arbitrary code. Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service.
#ExploitObserverAlert

PSS-177054

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177054. Red Hat Security Advisory 2024-0750-03. Red Hat Security Advisory 2024-0750-03 - An update for libmaxminddb is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
#ExploitObserverAlert

ZDI-24-103

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-103. Allegra uploadFile Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-22510.
#ExploitObserverAlert

CVE-2024-25679

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25679. In PQUIC before 5bde5bb, retention of unused initial encryption keys allows attackers to disrupt a connection with a PSK configuration by sending a CONNECTION_CLOSE frame that is encrypted via the initial key computed. Network traffic sniffing is needed as part of exploitation.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

CVE-2024-25003

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25003. KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

PSS-177062

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177062. Red Hat Security Advisory 2024-0757-03. Red Hat Security Advisory 2024-0757-03 - An update for the container-tools:4.0 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
#ExploitObserverAlert

PSS-177055

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177055. Red Hat Security Advisory 2024-0751-03. Red Hat Security Advisory 2024-0751-03 - An update for libmaxminddb is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
#ExploitObserverAlert

ZDI-24-106

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-106. Allegra renderFieldMatch Deserialization of Unstrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Although authentication is required to exploit this vulnerability, product implements a registration mechanism that can be used to create a user with a sufficient privilege level. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2024-22505.
#ExploitObserverAlert

CVE-2024-24321

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24321. An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary code via the wizardstep4_ssid_2 parameter in the sub_42DA54 function.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

ZDI-24-115

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-115. Centreon updateContactServiceCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.2. The following CVEs are assigned: CVE-2024-23117.
#ExploitObserverAlert

ZDI-24-113

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to ZDI-24-113. Centreon insertGraphTemplate SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-23119.
#ExploitObserverAlert

PSS-177049

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177049. Red Hat Security Advisory 2024-0745-03. Red Hat Security Advisory 2024-0745-03 - An update is now available for Red Hat Ceph Storage 5.3 in the Red Hat Ecosystem Catalog.
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-22024

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to PD/http/cves/2024/CVE-2024-22024. Ivanti Connect Secure is vulnerable to XXE (XML External Entity) injection.
#ExploitObserverAlert

EDB-51785

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51785. Advanced Page Visit Counter 1.0 - Admin+ Stored Cross-Site Scripting (XSS) (Authenticated)
#ExploitObserverAlert

EDB-51790

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51790. Rail Pass Management System 1.0 - Time-Based SQL Injection
#ExploitObserverAlert

ZDI-24-120

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to ZDI-24-120. X.Org Server XISendDeviceHierarchyEvent Heap-based Buffer Overflow Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-21885.