ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-29050

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-29050. Windows Cryptographic Services Remote Code Execution Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 2.5
#ExploitObserverAlert

CVE-2023-49912

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-49912. A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x4224b0` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115.

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert

CVE-2024-0899

DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-0899. The s2Member – Best Membership Plugin for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 230815 via the API. This makes it possible for unauthenticated attackers to see the contents of those posts and pages.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2023-49074

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-49074. A denial of service vulnerability exists in the TDDP functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of network requests can lead to reset to factory settings. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.

FIRST-EPSS: 0.000430000
NVD-IS: 5.2
NVD-ES: 2.2
#ExploitObserverAlert

CVE-2024-26218

DESCRIPTION: Exploit Observer has 3 entries in 2 file formats related to CVE-2024-26218. Windows Kernel Elevation of Privilege Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2024-29063

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-29063. Azure AI Search Information Disclosure Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 5.5
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2024-26213

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-26213. Microsoft Brokering File System Elevation of Privilege Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.0
#ExploitObserverAlert

CVE-2024-3093

DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-3093. The Font Farsi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including 1.6.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-2223

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-2223. An Incorrect Regular Expression vulnerability in Bitdefender GravityZone Update Server allows an attacker to cause a Server Side Request Forgery and reconfigure the relay. This issue affects the following products that include the vulnerable component:  Bitdefender Endpoint Security for Linux version 7.0.5.200089 Bitdefender Endpoint Security for  Windows version 7.9.9.380 GravityZone Control Center (On Premises) version 6.36.1

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-1960

DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-1960. The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Special Offer Day Widget Banner Link in all versions up to, and including, 2.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

FIRST-EPSS: 0.000450000
#ExploitObserverAlert

CVE-2023-47541

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-47541. An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.2 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 and 2.3.0 through 2.3.3 and 2.2.0 through 2.2.2 and 2.1.0 through 2.1.3 and 2.0.0 through 2.0.3 allows attacker to execute unauthorized code or commands via CLI.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-21756

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21756. A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted requests..

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-23671

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-23671. A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.3 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2023-49908

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-49908. A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.2
#ExploitObserverAlert

CVE-2024-28917

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-28917. Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 4.0
NVD-ES: 1.7
#ExploitObserverAlert

CVE-2024-1904

DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-1904. The MasterStudy LMS plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the search_posts function in all versions up to, and including, 3.2.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to expose draft post titles and excerpts.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2023-6317

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-6317. A prompt bypass exists in the secondscreen.gateway service running on webOS version 4 through 7. An attacker can create a privileged account without asking the user for the security PIN.  Full versions and TV models affected: webOS 4.9.7 - 5.30.40 running on LG43UM7000PLA webOS 5.5.0 - 04.50.51 running on OLED55CXPUA webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB   webOS 7.3.1-43 (mullet-mebin) - 03.33.85 running on OLED55A23LA

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-21447

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-21447. Windows Authentication Elevation of Privilege Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.8
#ExploitObserverAlert

CVE-2023-47542

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-47542. A improper neutralization of special elements used in a template engine [CWE-1336] in FortiManager versions 7.4.1 and below, versions 7.2.4 and below, and 7.0.10 and below allows attacker to execute unauthorized code or commands via specially crafted templates.

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2023-6320

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2023-6320. A command injection vulnerability exists in the com.webos.service.connectionmanager/tv/setVlanStaticAddress endpoint on webOS versions 5 and 6. A series of specially crafted requests can lead to command execution as the dbus user. An attacker can make authenticated requests to trigger this vulnerability. Full versions and TV models affected: * webOS 5.5.0 - 04.50.51 running on OLED55CXPUA  * webOS 6.3.3-442 (kisscurl-kinglake) - 03.36.50 running on OLED48C1PUB

FIRST-EPSS: 0.000430000
#ExploitObserverAlert

CVE-2024-26236

DESCRIPTION: Exploit Observer has 2 entries in 1 file formats related to CVE-2024-26236. Windows Update Stack Elevation of Privilege Vulnerability

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.0