ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-26138

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26138. The XWiki licensor application, which manages and enforce application licenses for paid extensions, includes the document `Licenses.Code.LicenseJSON` that provides information for admins regarding active licenses. This document is public and thus exposes this information publicly. The information includes the instance's id as well as first and last name and email of the license owner. This is a leak of information that isn't supposed to be public. The instance id allows associating data on the active installs data with the concrete XWiki instance. Active installs assures that "there's no way to find who's having a given UUID" (referring to the instance id). Further, the information who the license owner is and information about the obtained licenses can be used for targeted phishing attacks. Also, while user information is normally public, email addresses might only be displayed obfuscated, depending on the configuration. This has been fixed in Application Licensing 1.24.2. There are no known workarounds besides upgrading.
#ExploitObserverAlert

CVE-2023-6640

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-6640. Malformed S2 Nonce Get Command Class packets can be sent to crash PC Controller v5.54.0 and earlier.
#ExploitObserverAlert

CVE-2024-23346

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-23346. Pymatgen (Python Materials Genomics) is an open-source Python library for materials analysis. A critical security vulnerability exists in the `JonesFaithfulTransformation.from_transformation_str()` method within the `pymatgen` library prior to version 2024.2.20. This method insecurely utilizes `eval()` for processing input, enabling execution of arbitrary code when parsing untrusted input. Version 2024.2.20 fixes this issue.
#ExploitObserverAlert

CVE-2024-1704

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1704. A vulnerability was found in ZhongBangKeJi CRMEB 5.2.2. It has been declared as critical. This vulnerability affects the function save/delete of the file /adminapi/system/crud. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254392. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert

CVE-2023-50975

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-50975. The TD Bank TD Advanced Dashboard client through 3.0.3 for macOS allows arbitrary code execution because of the lack of electron::fuses::IsRunAsNodeEnabled (i.e., ELECTRON_RUN_AS_NODE can be used in production). This makes it easier for a compromised process to access banking information.
#ExploitObserverAlert

CVE-2024-25898

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25898. A XSS vulnerability was found in the ChurchCRM v.5.5.0 functionality, edit your event, where malicious JS or HTML code can be inserted in the Event Sermon field in EventEditor.php.
#ExploitObserverAlert

CVE-2023-24332

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-24332. A stack overflow vulnerability in Tenda AC6 with firmware version US_AC6V5.0re_V03.03.02.01_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/PowerSaveSet.
#ExploitObserverAlert

GHSA-rwxc-4cmw-7x75

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-rwxc-4cmw-7x75. Liferay Portal and Liferay DXP vulnerable to stored Cross-site Scripting
#ExploitObserverAlert

GHSA-p28x-4r5h-ph6j

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-p28x-4r5h-ph6j. Liferay Portal Message Board widget and Liferay DXP vulnerable to stored Cross-site Scripting
#ExploitObserverAlert

GHSA-v2xq-m22w-jmpr

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-v2xq-m22w-jmpr. Liferay Portal and Liferay DXP's Users Admin module vulnerable to stored Cross-site Scripting
#ExploitObserverAlert

CVE-2023-24331

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-24331. Command Injection vulnerability in D-Link Dir 816 with firmware version DIR-816_A2_v1.10CNB04 allows attackers to run arbitrary commands via the urlAdd parameter.
#ExploitObserverAlert

CVE-2024-1708

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1708. ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.
#ExploitObserverAlert

CVE-2024-25249

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25249. An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.
#ExploitObserverAlert

CVE-2024-25895

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25895. A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 5.5.0 allows remote attackers to inject arbitrary web script or HTML via the type parameter of /EventAttendance.php
#ExploitObserverAlert

CVE-2024-25381

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to CVE-2024-25381. There is a Stored XSS Vulnerability in Emlog Pro 2.2.8 Article Publishing, due to non-filtering of quoted content.
#ExploitObserverAlert

GHSA-468x-frcm-ghx6

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-468x-frcm-ghx6. Liferay Portal and Liferay DXP vulnerable to reflected Cross-site Scripting
#ExploitObserverAlert

CVE-2024-25461

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25461. Directory Traversal vulnerability in Terrasoft, Creatio Terrasoft CRM v.7.18.4.1532 allows a remote attacker to obtain sensitive information via a crafted request to the terrasoft.axd component.
#ExploitObserverAlert

CVE-2024-1705

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1705. A vulnerability was found in Shopwind up to 4.6. It has been rated as critical. This issue affects the function actionCreate of the file /public/install/controllers/DefaultController.php of the component Installation. The manipulation leads to code injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-254393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert

CVE-2024-26585

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26585. In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.
#ExploitObserverAlert

CVE-2024-25893

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25893. ChurchCRM 5.5.0 FRCertificates.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.
#ExploitObserverAlert

CVE-2024-25288

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25288. SLIMS (Senayan Library Management Systems) 9 Bulian v9.6.1 is vulnerable to SQL Injection via pop-scope-vocabolary.php.