ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

GHSA-w3w6-26f2-p474

DESCRIPTION: Exploit Observer has 4 entries in 4 file formats related to GHSA-w3w6-26f2-p474. Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated
#ExploitObserverAlert

GHSA-ff2w-wm48-jhqj

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-ff2w-wm48-jhqj. Arbitrary File Read Vulnerability in Apache Dolphinscheduler
#ExploitObserverAlert

GHSA-cp68-qrhr-g9h8

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to GHSA-cp68-qrhr-g9h8. MeshCentral cross-site websocket hijacking (CSWSH) vulnerability
#ExploitObserverAlert

GHSA-qwxx-xww6-8q8m

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-qwxx-xww6-8q8m. Remote Code Execution in Apache Dolphinscheduler
#ExploitObserverAlert

GHSA-c9vv-fhgv-cjc3

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-c9vv-fhgv-cjc3. agent-js: Insecure Key Generation in `Ed25519KeyIdentity.generate`
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-1209

DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to PD/http/cves/2024/CVE-2024-1209. The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads.
#ExploitObserverAlert

GHSA-vjqc-g788-f378

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-vjqc-g788-f378. Session Fixation Apache DolphinScheduler
#ExploitObserverAlert

GHSA-p3rv-qj56-2fqx

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-p3rv-qj56-2fqx. Cross-site Scripting in Pyhtml2pdf
#ExploitObserverAlert

GHSA-5rwm-2xw8-hh9p

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-5rwm-2xw8-hh9p. Deserialization of Untrusted Data in Torrentpier
#ExploitObserverAlert

GHSA-3jcv-5f9p-2f2p

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to GHSA-3jcv-5f9p-2f2p. Cross-site Scripting in electron-pdf
#ExploitObserverAlert

GHSA-m43p-55rf-8c2j

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-m43p-55rf-8c2j. Deserialization of Untrusted Data in Apache Camel CassandraQL
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-1210

DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to PD/http/cves/2024/CVE-2024-1210. The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via API. This makes it possible for unauthenticated attackers to obtain access to quizzes.
#ExploitObserverAlert

GHSA-x5pm-h33q-cjrw

DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to GHSA-x5pm-h33q-cjrw. Improper Certificate Validation in apache airflow mongo hook
#ExploitObserverAlert

GHSA-37gx-jqx9-fwmg

DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to GHSA-37gx-jqx9-fwmg. Improper Certificate Validation in Apache DolphinScheduler
#ExploitObserverAlert

GHSA-375g-39jq-vq7m

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-375g-39jq-vq7m. Potential buffer overflow in CBOR2 decoder
#ExploitObserverAlert

GHSA-7rw2-3hhp-rc46

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-7rw2-3hhp-rc46. Cross-site Scripting Vulnerability in Statement Browser
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-1208

DESCRIPTION: Exploit Observer has 8 entries in 5 file formats related to PD/http/cves/2024/CVE-2024-1208. The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.2 via API. This makes it possible for unauthenticated attackers to obtain access to quiz questions.
#ExploitObserverAlert

GHSA-36xr-4x2f-cfj9

DESCRIPTION: Exploit Observer has 4 entries in 3 file formats related to GHSA-36xr-4x2f-cfj9. Deserialization of Untrusted Data in Apache Camel SQL
#ExploitObserverAlert

GHSA-2557-x9mg-76w8

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to GHSA-2557-x9mg-76w8. ASA-2024-002: Default `PrepareProposalHandler` may produce invalid proposals when used with default `SenderNonceMempool`
#ExploitObserverAlert

GHSA-4j93-fm92-rp4m

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to GHSA-4j93-fm92-rp4m. ASA-2024-003: Missing `BlockedAddressed` Validation in Vesting Module
#ExploitObserverAlert

CVE-2023-42855

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-42855. This issue was addressed with improved state management. This issue is fixed in iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to silently persist an Apple ID on an erased device.

FIRST-EPSS: 0.000430000