ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

BDU:2024-02589

DESCRIPTION: Exploit Observer has 16 entries in 3 file formats related to BDU:2024-02589. Vulnerability in the set of software tools and libraries for working with OpenSC smart cards is related to incorrect authentication, allowing an attacker to gain unauthorized access, carry out arbitrary actions, or compromise the system. The vulnerability in the set of software tools and libraries for working with OpenSC smart cards is due to the fact that authentication of the token/card by one process can perform cryptographic operations in other processes when passing an empty PIN code of zero length. Exploiting the vulnerability can allow an attacker to gain unauthorized access, carry out arbitrary actions, or compromise the system.
#ExploitObserverAlert

PD/http/cves/2022/CVE-2022-29013

DESCRIPTION: Exploit Observer has 11 entries in 6 file formats related to PD/http/cves/2022/CVE-2022-29013. A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
#ExploitObserverAlert

BDU:2024-02597

DESCRIPTION: Exploit Observer has 16 entries in 4 file formats related to BDU:2024-02597. "The vulnerability in the monitoring and observability platform Grafana related to cross-site request forgery, allows an attacker to escalate their privileges. The vulnerability in the Grafana monitoring and observability platform is associated with conducting attacks from various sources against authenticated users of Grafana with high privileges. Exploiting this vulnerability could enable a remote attacker to escalate their privileges."
#ExploitObserverAlert

PD/http/cves/2018/CVE-2018-10738

DESCRIPTION: Exploit Observer has 13 entries in 6 file formats related to PD/http/cves/2018/CVE-2018-10738. A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.
#ExploitObserverAlert

BDU:2024-02610

DESCRIPTION: Exploit Observer has 26 entries in 9 file formats related to BDU:2024-02610. Vulnerability in the Node.js follow-redirects module, associated with insufficient protection of sensitive data, allows an attacker to gain unauthorized access to protected information. The vulnerability in the Node.js follow-redirects module is related to inadequate protection of sensitive data. Exploiting the vulnerability could allow a remote attacker to gain unauthorized access to protected information.
#ExploitObserverAlert

BDU:2024-02621

DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to BDU:2024-02621. The vulnerability of the Grafana monitoring and observation platform, related to incorrect cryptographic signature verification, allows an attacker to install malicious software on a vulnerable device. The vulnerability in the Grafana monitoring and observation platform is related to bypassing plugin signature verification. Exploiting the vulnerability can allow a remote attacker to install malicious software on a vulnerable device.
#ExploitObserverAlert

BDU:2024-02598

DESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to BDU:2024-02598. Vulnerability of the Grafana monitoring and observability platform is related to URL redirection to an untrusted site, allowing an attacker to redirect a user to an arbitrary website. The vulnerability in the Grafana monitoring and observability platform is associated with bypassing security configurations if a malicious data source is operating on an authorized host. Exploiting the vulnerability could allow a remote attacker to redirect a user to an arbitrary site.
#ExploitObserverAlert

BDU:2024-02613

DESCRIPTION: Exploit Observer has 12 entries in 3 file formats related to BDU:2024-02613. Vulnerability in the adodb_addslashes() function of the adodb library allows an attacker to bypass the authentication process. The vulnerability in the adodb library's adodb_addslashes() function is related to improper authentication. Exploiting this vulnerability may enable a remote attacker to bypass the authentication process.
#ExploitObserverAlert

BDU:2024-02608

DESCRIPTION: Exploit Observer has 27 entries in 5 file formats related to BDU:2024-02608. The vulnerability of the Apache Tomcat application server, associated with inadequate input data validation, allows an attacker to cause a denial of service. The vulnerability of the Apache Tomcat application server is linked to insufficient input data validation. Exploiting this vulnerability may enable a remote attacker to cause a denial of service using specially crafted HTTP/2 requests.
#ExploitObserverAlert

PSS-177936

DESCRIPTION: Exploit Observer has 12 entries in 3 file formats related to PSS-177936. Ubuntu Security Notice USN-6710-2. Ubuntu Security Notice 6710-2 - USN-6710-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Manfred Paul discovered that Firefox did not properly perform bounds checking during range analysis, leading to an out-of-bounds write vulnerability. A attacker could use this to cause a denial of service, or execute arbitrary code. Manfred Paul discovered that Firefox incorrectly handled MessageManager listeners under certain circumstances. An attacker who was able to inject an event handler into a privileged object may have been able to execute arbitrary code.
#ExploitObserverAlert

BDU:2024-02580

DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-02580. Vulnerability of the modular interface between Rack web servers and web applications, related to uncontrolled resource consumption, allowing an attacker to cause a denial of service. The vulnerability of the modular interface between Rack web servers and web applications is associated with the creation of input data that can cause analysis of the Content-Disposition header in Rack to take an unexpected amount of time. Exploiting the vulnerability can allow a remote attacker to cause a denial of service.
#ExploitObserverAlert

BDU:2024-02637

DESCRIPTION: Exploit Observer has 12 entries in 2 file formats related to BDU:2024-02637. Vulnerability in Mozilla Firefox, Firefox ESR, and the Thunderbird email client for Mac OS operating systems allows an attacker to execute arbitrary code. The vulnerability in Mozilla Firefox, Firefox ESR, and the Thunderbird email client for Mac OS operating systems is related to access control flaws. Exploiting this vulnerability could allow a remote attacker to execute arbitrary code when loading files with the .inetloc extension.
#ExploitObserverAlert

BDU:2024-02587

DESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to BDU:2024-02587. Vulnerability in the MyEID driver of the software toolkit and libraries for working with smart cards OpenSC, allowing a potential attacker to gain unauthorized access to confidential data. The vulnerability in the MyEID driver of the software toolkit and libraries for working with smart cards OpenSC is related to reading beyond the boundaries of the buffer in memory during symmetric key encryption processing. Exploiting the vulnerability could potentially allow an attacker to gain unauthorized access to confidential data.
#ExploitObserverAlert

PSS-177922

DESCRIPTION: Exploit Observer has 157 entries in 17 file formats related to PSS-177922. Red Hat Security Advisory 2024-1614-03. Red Hat Security Advisory 2024-1614-03 - An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Issues addressed include code execution, null pointer, privilege escalation, and use-after-free vulnerabilities.
#ExploitObserverAlert

BDU:2024-02611

DESCRIPTION: Exploit Observer has 10 entries in 2 file formats related to BDU:2024-02611. Vulnerability in the software for creating, monitoring, and orchestrating Apache Airflow data processing scenarios is related to access control flaws, which allow an attacker to gain unauthorized access to resources. The software vulnerability in creating, monitoring, and orchestrating Apache Airflow data processing scenarios is linked to access control deficiencies. Exploiting this vulnerability can enable a remote attacker to gain unauthorized access to resources.
#ExploitObserverAlert

BDU:2024-02628

DESCRIPTION: Exploit Observer has 13 entries in 2 file formats related to BDU:2024-02628. Vulnerability in the software tool for implementing the MediaWiki hypertext environment is related to improper input sanitization during web page creation, allowing an attacker to carry out cross-site scripting attacks. The vulnerability in the software tool for implementing the MediaWiki hypertext environment is associated with the ability to use XSS in the partial block function. Exploiting the vulnerability can allow a remote attacker to execute cross-site scripting attacks.
#ExploitObserverAlert

PD/http/cves/2024/CVE-2024-28255

DESCRIPTION: Exploit Observer has 10 entries in 4 file formats related to PD/http/cves/2024/CVE-2024-28255. OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.
#ExploitObserverAlert

BDU:2024-02638

DESCRIPTION: Exploit Observer has 9 entries in 2 file formats related to BDU:2024-02638. Vulnerability in the Mozilla Firefox browser, associated with incorrect restriction of visualized layers of the user interface, allows an attacker to conduct spoofing attacks. The vulnerability in the Mozilla Firefox browser is related to the incorrect restriction of visualized layers of the user interface. Exploiting this vulnerability may allow a remote attacker to conduct spoofing attacks.
#ExploitObserverAlert

BDU:2024-02623

DESCRIPTION: Exploit Observer has 16 entries in 3 file formats related to BDU:2024-02623. There is a vulnerability in the _libcap_strdup() function of the Libcap package that allows an attacker to execute arbitrary PHP files on the server. This vulnerability in the _libcap_strdup() function of the Libcap package is related to buffer overflow if the input string is close to 4 GiB. Exploiting this vulnerability could allow an attacker to execute arbitrary PHP files on the server.
#ExploitObserverAlert

BDU:2024-02622

DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to BDU:2024-02622. Vulnerability of the Grafana monitoring and observation platform is associated with authentication bypass through spoofing, allowing an attacker to gain unauthorized access to information and compromise its integrity and availability. The platform's vulnerability is linked to administrator-to-administrator server escalation when using an authentication proxy server. Exploiting the vulnerability may enable a remote attacker to gain unauthorized access to information and compromise its integrity and availability.
#ExploitObserverAlert

BDU:2024-02614

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to BDU:2024-02614. The vulnerability in the Grafana monitoring and observation platform is related to improper input sanitization during the creation of web pages, which allows an attacker to inject entered URL addresses. The vulnerability in the Grafana monitoring and observation platform is linked to creating a snapshot and arbitrarily selecting the "originalUrl" parameter, by editing the request through a web proxy. Exploiting the vulnerability may enable a remote attacker to inject entered URL addresses.