ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-1343

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1343. A weak permission was found in the backup directory in LaborOfficeFree affecting version 19.10. This vulnerability allows any authenticated user to read backup files in the directory '%programfiles(x86)% LaborOfficeFree BackUp'.
#ExploitObserverAlert

CVE-2024-25625

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25625. Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. A potential security vulnerability has been discovered in `pimcore/admin-ui-classic-bundle` prior to version 1.3.4. The vulnerability involves a Host Header Injection in the `invitationLinkAction` function of the UserController, specifically in the way `$loginUrl` trusts user input. The host header from incoming HTTP requests is used unsafely when generating URLs. An attacker can manipulate the HTTP host header in requests to the /admin/user/invitationlink endpoint, resulting in the generation of URLs with the attacker's domain. In fact, if a host header is injected in the POST request, the $loginURL parameter is constructed with this unvalidated host header. It is then used to send an invitation email to the provided user. This vulnerability can be used to perform phishing attacks by making the URLs in the invitation links emails point to an attacker-controlled domain. Version 1.3.4 contains a patch for the vulnerability. The maintainers recommend validating the host header and ensuring it matches the application's domain. It would also be beneficial to use a default trusted host or hostname if the incoming host header is not recognized or is absent.
#ExploitObserverAlert

CVE-2024-1345

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1345. Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to perform a brute force attack and easily discover the root password.
#ExploitObserverAlert

EDB-51803

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51803. Employee Management System v1 - 'email' SQL Injection
#ExploitObserverAlert

CVE-2024-25982

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25982. The link to update all installed language packs did not include the necessary token to prevent a CSRF risk.
#ExploitObserverAlert

PSS-177208

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177208. Ubuntu Security Notice USN-6641-1. Ubuntu Security Notice 6641-1 - Harry Sintonen discovered that curl incorrectly handled mixed case cookie domains. A remote attacker could possibly use this issue to set cookies that get sent to different and unrelated sites and domains.
#ExploitObserverAlert

PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-algo-supported. SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.
#ExploitObserverAlert

PSS-177216

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177216. Ubuntu Security Notice USN-6643-1. Ubuntu Security Notice 6643-1 - Emre Durmaz discovered that NPM IP package incorrectly distinguished between private and public IP addresses. A remote attacker could possibly use this issue to perform Server-Side Request Forgery attacks.
#ExploitObserverAlert

PSS-177207

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177207. Red Hat Security Advisory 2024-0903-03. Red Hat Security Advisory 2024-0903-03 - Red Hat AMQ Broker 7.10.6 is now available from the Red Hat Customer Portal. Issues addressed include a bypass vulnerability.
#ExploitObserverAlert

PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PD/javascript/misconfiguration/ssh/ssh-weak-mac-algo. The system's SSH configuration poses a security risk by allowing weak Message Authentication Code (MAC) algorithms, potentially exposing it to vulnerabilities and unauthorized access. It is crucial to update and strengthen the MAC algorithms for enhanced security.
#ExploitObserverAlert

CVE-2023-5190

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-5190. Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.

FIRST-EPSS: 0.000610000
#ExploitObserverAlert

CVE-2023-44308

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-44308. Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.

FIRST-EPSS: 0.000610000
#ExploitObserverAlert

CVE-2024-21892

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-21892. On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

PSS-177204

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177204. Red Hat Security Advisory 2024-0893-03. Red Hat Security Advisory 2024-0893-03 - An update for python-pillow is now available for Red Hat Enterprise Linux 8. Issues addressed include a code execution vulnerability.
#ExploitObserverAlert

PSS-177215

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177215. Ubuntu Security Notice USN-6625-3. Ubuntu Security Notice 6625-3 - Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could possibly use this to cause a denial of service. Zheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver in the Linux kernel during device removal. A privileged attacker could use this to cause a denial of service.
#ExploitObserverAlert

PSS-177209

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177209. Tourism Management System 2.0 Shell Upload. Tourism Management System version 2.0 suffers from a remote shell upload vulnerability.
#ExploitObserverAlert

CVE-2024-25604

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25604. Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel.
#ExploitObserverAlert

PSS-177210

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177210. Petrol Pump Management Software 1.0 Shell Upload. Petrol Pump Management Software version 1.0 suffers from a remote shell upload vulnerability.
#ExploitObserverAlert

PSS-177200

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177200. Red Hat Security Advisory 2024-0881-03. Red Hat Security Advisory 2024-0881-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include null pointer, out of bounds access, out of bounds read, out of bounds write, and use-after-free vulnerabilities.
#ExploitObserverAlert

PSS-177213

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to PSS-177213. Ubuntu Security Notice USN-6642-1. Ubuntu Security Notice 6642-1 - Shoham Danino, Anat Bremler-Barr, Yehuda Afek, and Yuval Shavitt discovered that Bind incorrectly handled parsing large DNS messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner discovered that Bind incorrectly handled validating DNSSEC messages. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service.
#ExploitObserverAlert

CVE-2024-1608

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1608. In OPPO Usercenter Credit SDK, there's a possible escalation of privilege due to loose permission check, This could lead to application internal information leak w/o user interaction.