ARPSyndicate - Cyber & Open Source Intelligence
462 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

WLB-2024020094

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020094. Ficus Global - Blind Sql Injection.
#ExploitObserverAlert

WLB-2024020092

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020092. WordPress WP Fastest Cache 1.2.2 SQL Injection.
#ExploitObserverAlert

WLB-2024020095

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020095. Agencia NUBA- Sql Injection.
#ExploitObserverAlert

PD/http/cves/2015/CVE-2015-1635

DESCRIPTION: Exploit Observer has 64 entries in 15 file formats related to PD/http/cves/2015/CVE-2015-1635. HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
#ExploitObserverAlert

WLB-2024020093

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020093. Blood Bank 1.0 SQL Injection.
#ExploitObserverAlert

WLB-2024020099

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020099. Backdoor.Win32.Agent.amt / Authentication Bypass.
#ExploitObserverAlert

WLB-2024020102

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020102. Moodle 4.3 Insecure Direct Object Reference.
#ExploitObserverAlert

WLB-2024020098

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020098. Backdoor.Win32.Agent.amt MVID-2024-0673 Authentication Bypass / Code Execution.
#ExploitObserverAlert

WLB-2024020096

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020096. WordPress IDonate Blood Request Management System 1.8.1 Cross Site Scripting.
#ExploitObserverAlert

WLB-2024020097

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020097. Backdoor.Win32.Jeemp.c / Cleartext Hardcoded Credentials.
#ExploitObserverAlert

WLB-2024020100

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020100. Source Guardian Cross Site Scripting.
#ExploitObserverAlert

WLB-2024020101

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020101. Saflok System 6000 Key Derivation.
#ExploitObserverAlert

WLB-2024020103

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024020103. WP Fastest Cache 1.2.2 Unauthenticated SQL Injection.
#ExploitObserverAlert

PD/http/cves/2023/CVE-2023-6895

DESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.
#ExploitObserverAlert

BDU:2024-01665

DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to BDU:2024-01665. Vulnerability of the Ultimate Member plugin in the content management system of the WordPress website, allowing an attacker to execute arbitrary SQL queries to the database. The vulnerability of the Ultimate Member plugin in the content management system of the WordPress website is related to the lack of measures to protect the SQL query structure. Exploiting the vulnerability may allow a remote attacker to execute arbitrary SQL queries to the database.
#ExploitObserverAlert

MSF/exploit_multi/http/cve_2023_38836_boidcms

DESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.
#CyberNewsAlert

The Cyber Security Research and Development (CSRD) Group at Ministry of Electronics & Information Technology (MEITY) of India invites R&D proposals in Cybersecurity with focus on innovation & indigenous technology development leading to productization.

https://www.meity.gov.in/content/call-project-proposals-rd-cyber-security/
#ExploitObserverAlert

CVE-2024-27199

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-27198

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-22252

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22252. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
#ExploitObserverAlert

CVE-2024-23296

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23296. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.