ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

GHSA-8r3f-844c-mc37

DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to GHSA-8r3f-844c-mc37. Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON
#ExploitObserverAlert

CVE-2024-1234

DESCRIPTION: Exploit Observer has 7 entries in 2 file formats related to CVE-2024-1234. The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via data attribute in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

SSVID-99817

DESCRIPTION: Exploit Observer has 15 entries in 2 file formats related to SSVID-99817. SolarWinds Security Event Manager AMF deserialization RCE (CVE-2024-0692)
#ExploitObserverAlert

CVE-2024-1071

DESCRIPTION: Exploit Observer has 12 entries in 7 file formats related to CVE-2024-1071. The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

FIRST-EPSS: 0.000630000
#ExploitObserverAlert

WLB-2024030026

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030026. OSGi 3.18 Remote Code Execution.
#ExploitObserverAlert

MSF/exploit_multi/http/jetbrains_teamcity_rce_cve_2024_27198

DESCRIPTION: Exploit Observer has 207 entries in 10 file formats related to MSF/exploit_multi/http/jetbrains_teamcity_rce_cve_2024_27198. This module exploits an authentication bypass vulnerability in JetBrains TeamCity. An unauthenticated attacker can leverage this to access the REST API and create a new administrator access token. This token can be used to upload a plugin which contains a Metasploit payload, allowing the attacker to achieve unauthenticated RCE on the target TeamCity server. On older versions of TeamCity, access tokens do not exist so the exploit will instead create a new administrator account before uploading a plugin. Older version of TeamCity have a debug endpoint (/app/rest/debug/process) that allows for arbitrary commands to be executed, however recent version of TeamCity no longer ship this endpoint, hence why a plugin is leveraged for code execution instead, as this is supported on all versions tested.
#ExploitObserverAlert

WLB-2024030027

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030027. MSMS-PHP (by: oretnom23 ) v1.0 File Upload - RCE browser using.
#ExploitObserverAlert

WLB-2024030029

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030029. Human Resource Management System 1.0 SQL Injection.
#ExploitObserverAlert

WLB-2024030030

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030030. SnipeIT 6.2.1 Stored Cross Site Scripting.
#ExploitObserverAlert

WLB-2024030028

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to WLB-2024030028. MSMS-PHP (by: oretnom23 - 2024) v1.0 Multiple-SQLi.
#ExploitObserverAlert

CVE-2024-20327

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-20327. A vulnerability in the PPP over Ethernet (PPPoE) termination feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to crash the ppp_ma process, resulting in a denial of service (DoS) condition. This vulnerability is due to the improper handling of malformed PPPoE packets that are received on a router that is running Broadband Network Gateway (BNG) functionality with PPPoE termination on a Lightspeed-based or Lightspeed-Plus-based line card. An attacker could exploit this vulnerability by sending a crafted PPPoE packet to an affected line card interface that does not terminate PPPoE. A successful exploit could allow the attacker to crash the ppp_ma process, resulting in a DoS condition for PPPoE traffic across the router.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-25228

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-25228. Vinchin Backup and Recovery 7.2 and Earlier is vulnerable to Authenticated Remote Code Execution (RCE) via the getVerifydiyResult function in ManoeuvreHandler.class.php.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

EDB-51884

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51884. JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE)
#ExploitObserverAlert

EDB-51892

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51892. KiTTY 0.76.1.13 - Command Injection
#ExploitObserverAlert

EDB-51890

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51890. KiTTY 0.76.1.13 - 'Start Duplicated Session Hostname' Buffer Overflow
#ExploitObserverAlert

EDB-51887

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51887. Viessmann Vitogate 300 2.1.3.0 - Remote Code Execution (RCE)
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-1698

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to PD/http/cves/2024/CVE-2024-1698. The NotificationX - Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
#ExploitObserverAlert

EDB-51888

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51888. Ruijie Switch PSG-5124 26293 - Remote Code Execution (RCE)
#ExploitObserverAlert

EDB-51886

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51886. SolarView Compact 6.00 - Command Injection
#ExploitObserverAlert

EDB-51891

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51891. KiTTY 0.76.1.13 - 'Start Duplicated Session Username' Buffer Overflow
#ExploitObserverAlert

GHSA-gvpg-vgmx-xg6w

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to GHSA-gvpg-vgmx-xg6w. Denial of Service in Connect2id Nimbus JOSE+JWT