ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-26582

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26582. In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.
#ExploitObserverAlert

GHSA-54pv-r62j-9qqc

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-54pv-r62j-9qqc. Liferay Portal and Liferay DXP vulnerable to reflected Cross-site Scripting
#ExploitObserverAlert

CVE-2023-50955

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-50955. IBM InfoSphere Information Server 11.7 could allow an authenticated privileged user to obtain the absolute path of the web server installation which could aid in further attacks against the system. IBM X-Force ID: 275777.
#ExploitObserverAlert

CVE-2024-1703

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1703. A vulnerability was found in ZhongBangKeJi CRMEB 5.2.2. It has been classified as problematic. This affects the function openfile of the file /adminapi/system/file/openfile. The manipulation leads to absolute path traversal. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert

GHSA-xpjg-7hx7-wgcx

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-xpjg-7hx7-wgcx. Liferay Portal and Liferay DXP vulnerable to Cross-site Scripting
#ExploitObserverAlert

CVE-2023-24333

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-24333. A stack overflow vulnerability in Tenda AC21 with firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/openSchedWifi.
#ExploitObserverAlert

CVE-2024-25891

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25891. ChurchCRM 5.5.0 FRBidSheets.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.
#ExploitObserverAlert

CVE-2022-45177

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2022-45177. An issue was discovered in LIVEBOX Collaboration vDesk through v031. An Observable Response Discrepancy can occur under the /api/v1/vdeskintegration/user/isenableuser endpoint, the /api/v1/sharedsearch?search={NAME]+{SURNAME] endpoint, and the /login endpoint. The web application provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.
#ExploitObserverAlert

CVE-2024-25896

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25896. ChurchCRM 5.5.0 EventEditor.php is vulnerable to Blind SQL Injection (Time-based) via the EID POST parameter.
#ExploitObserverAlert

CVE-2024-25892

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25892. ChurchCRM 5.5.0 ConfirmReport.php is vulnerable to Blind SQL Injection (Time-based) via the familyId GET parameter.
#ExploitObserverAlert

CVE-2024-22220

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-22220. An issue was discovered in Terminalfour 7.4 through 7.4.0004 QP3 and 8 through 8.3.19, and Formbank through 2.1.10-FINAL. Unauthenticated Stored Cross-Site Scripting can occur, with resultant Admin Session Hijacking. The attack vectors are Form Builder and Form Preview.
#ExploitObserverAlert

GHSA-cr36-3vqf-x5w5

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-cr36-3vqf-x5w5. Liferay Portal Expando module and Liferay DXP vulnerable to stored Cross-site Scripting
#ExploitObserverAlert

CVE-2023-37177

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-37177. SQL Injection vulnerability in PMB Services PMB v.7.4.7 and before allows a remote unauthenticated attacker to execute arbitrary code via the query parameter in the /admin/convert/export_z3950.php endpoint.
#ExploitObserverAlert

GHSA-44jg-jgjx-3xg5

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-44jg-jgjx-3xg5. Liferay Portal's Dynamic Data Mapping module's DDMForm and Liferay DXP vulnerable to stored Cross-site Scripting
#ExploitObserverAlert

CVE-2024-26130

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26130. cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Starting in version 38.0.0 and prior to version 42.0.4, if `pkcs12.serialize_key_and_certificates` is called with both a certificate whose public key did not match the provided private key and an `encryption_algorithm` with `hmac_hash` set (via `PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL pointer dereference would occur, crashing the Python process. This has been resolved in version 42.0.4, the first version in which a `ValueError` is properly raised.
#ExploitObserverAlert

CVE-2024-26310

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26310. Archer Platform 6.8 before 6.14 P2 (6.14.0.2) contains an improper access control vulnerability. A remote authenticated malicious user could potentially exploit this to gain access to API information that should only be accessible with extra privileges.
#ExploitObserverAlert

CVE-2023-52153

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52153. A SQL Injection vulnerability in /pmb/opac_css/includes/sessions.inc.php in PMB 7.4.7 and earlier allows remote unauthenticated attackers to inject arbitrary SQL commands via the PmbOpac-LOGIN cookie value.
#ExploitObserverAlert

GHSA-q2cv-7j58-rfmj

DESCRIPTION: Exploit Observer has 2 entries in 2 file formats related to GHSA-q2cv-7j58-rfmj. Liferay Portal Document and Media widget and Liferay DXP vulnerable to stored Cross-site Scripting
#ExploitObserverAlert

CVE-2023-33843

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-33843. IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 256544.
#ExploitObserverAlert

CVE-2024-26583

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26583. In the Linux kernel, the following vulnerability has been resolved: tls: fix race between async notify and socket close The submitting thread (one which called recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete() so any code past that point risks touching already freed data. Try to avoid the locking and extra flags altogether. Have the main thread hold an extra reference, this way we can depend solely on the atomic ref counter for synchronization. Don't futz with reiniting the completion, either, we are now tightly controlling when completion fires.
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-1021

DESCRIPTION: Exploit Observer has 6 entries in 5 file formats related to PD/http/cves/2024/CVE-2024-1021. There is a security vulnerability in Rebuild 3.5.5, which is due to a server-side request forgery vulnerability in the URL parameter of the readRawText function of the HTTP Request Handler component.