ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

PD/http/cves/2023/CVE-2023-6895

DESCRIPTION: Exploit Observer has 14 entries in 6 file formats related to PD/http/cves/2023/CVE-2023-6895. Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE (HIK) version has an operating system command injection vulnerability. The vulnerability originates from the parameter jsondata[ip] in the file /php/ping.php, which can cause operating system command injection.
#ExploitObserverAlert

BDU:2024-01665

DESCRIPTION: Exploit Observer has 7 entries in 5 file formats related to BDU:2024-01665. Vulnerability of the Ultimate Member plugin in the content management system of the WordPress website, allowing an attacker to execute arbitrary SQL queries to the database. The vulnerability of the Ultimate Member plugin in the content management system of the WordPress website is related to the lack of measures to protect the SQL query structure. Exploiting the vulnerability may allow a remote attacker to execute arbitrary SQL queries to the database.
#ExploitObserverAlert

MSF/exploit_multi/http/cve_2023_38836_boidcms

DESCRIPTION: Exploit Observer has 8 entries in 6 file formats related to MSF/exploit_multi/http/cve_2023_38836_boidcms. This module leverages CVE-2023-38836, an improper sanitization bug in BoidCMS version 2.0.0 and below. BoidCMS allows the authenticated upload of a php file as media if the file has the GIF header, even if the file is a php file.
#CyberNewsAlert

The Cyber Security Research and Development (CSRD) Group at Ministry of Electronics & Information Technology (MEITY) of India invites R&D proposals in Cybersecurity with focus on innovation & indigenous technology development leading to productization.

https://www.meity.gov.in/content/call-project-proposals-rd-cyber-security/
#ExploitObserverAlert

CVE-2024-27199

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-27198

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-22252

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22252. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
#ExploitObserverAlert

CVE-2024-23296

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23296. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
#ExploitObserverAlert

GHSA-9vg9-x38g-9hfx

DESCRIPTION: Exploit Observer has 8 entries in 4 file formats related to GHSA-9vg9-x38g-9hfx. Jenkins allows attackers to determine whether a user exists
#ExploitObserverAlert

CVE-2024-22253

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22253. VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
#ExploitObserverAlert

EDB-51858

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51858. Neontext Wordpress Plugin - Stored XSS
#ExploitObserverAlert

CVE-2024-22254

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22254. VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.
#ExploitObserverAlert

CVE-2024-22255

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-22255. VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
#ExploitObserverAlert

EDB-51857

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51857. Solar-Log 200 PM+ 3.6.0 Build 99 - 15.10.2019 - Stored XSS
#ExploitObserverAlert

GHSA-jw44-4f3j-q396

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to GHSA-jw44-4f3j-q396. Helm shows secrets in clear text
#ExploitObserverAlert

CVE-2024-23225

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-23225. A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4. An attacker with arbitrary kernel read and write capability may be able to bypass kernel memory protections. Apple is aware of a report that this issue may have been exploited.
#ExploitObserverAlert

CVE-2024-24783

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-24783. Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-27198

DESCRIPTION: Exploit Observer has 69 entries in 7 file formats related to PD/http/cves/2024/CVE-2024-27198. In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-27199

DESCRIPTION: Exploit Observer has 9 entries in 6 file formats related to PD/http/cves/2024/CVE-2024-27199. In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
#ExploitObserverAlert

CVE-2023-45290

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-45290. When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

CVE-2023-45289

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-45289. When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

FIRST-EPSS: 0.000450000