ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2023-51704

DESCRIPTION: Exploit Observer has 8 entries in 2 file formats related to CVE-2023-51704. An issue was discovered in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. In includes/logging/RightsLogFormatter.php, group-*-member messages can result in XSS on Special:log/rights.

FIRST-EPSS: 0.000460000
NVD-IS: 2.7
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.5804944
#ExploitObserverAlert

CVE-2024-3448

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3448. Users with low privileges can perform certain AJAX actions. In this vulnerability instance, improper access to ajax?action=plugin:focus:checkIframeAvailability leads to a Server-Side Request Forgery by analyzing the error messages returned from the back-end. Allowing an attacker to perform a port scan in the back-end. At the time of publication of the CVE no patch is available.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-24758

DESCRIPTION: Exploit Observer has 8 entries in 1 file formats related to CVE-2024-24758. Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-2029

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-2029. A command injection vulnerability exists in the `TranscriptEndpoint` of mudler/localai, specifically within the `audioToWav` function used for converting audio files to WAV format for transcription. The vulnerability arises due to the lack of sanitization of user-supplied filenames before passing them to ffmpeg via a shell command, allowing an attacker to execute arbitrary commands on the host system. Successful exploitation could lead to unauthorized access, data breaches, or other detrimental impacts, depending on the privileges of the process executing the code.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2023-49555

DESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2023-49555. An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component.

FIRST-EPSS: 0.000680000
NVD-IS: 3.6
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5963488
#ExploitObserverAlert

CVE-2024-1740

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1740. In lunary-ai/lunary version 1.0.1, a vulnerability exists where a user removed from an organization can still read, create, modify, and delete logs by re-using an old authorization token. The lunary web application communicates with the server using an 'Authorization' token in the browser, which does not properly invalidate upon the user's removal from the organization. This allows the removed user to perform unauthorized actions on logs and access project and external user details without valid permissions.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-2730

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-2730. Mautic uses predictable page indices for unpublished landing pages, their content can be accessed by unauthenticated users under public preview URLs which could expose sensitive data. At the time of publication of the CVE no patch is available

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2017-7266

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2017-7266. Netflix Security Monkey before 0.8.0 has an Open Redirect. The logout functionality accepted the "next" parameter which then redirects to any domain irrespective of the Host header.

FIRST-EPSS: 0.001550000
NVD-IS: 2.7
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.5941964
#ExploitObserverAlert

CVE-2023-49462

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-49462. libheif v1.17.5 was discovered to contain a segmentation violation via the component /libheif/exif.cc.

FIRST-EPSS: 0.000940000
NVD-IS: 5.9
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.5905308
#ExploitObserverAlert

CVE-2024-22019

DESCRIPTION: Exploit Observer has 13 entries in 2 file formats related to CVE-2024-22019. A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5817243
#ExploitObserverAlert

CVE-2023-46871

DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2023-46871. GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box contains a memory leak in NewSFDouble scenegraph/vrml_tools.c:300. This vulnerability may lead to a denial of service.

FIRST-EPSS: 0.000460000
NVD-IS: 1.4
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.5959611
#ExploitObserverAlert

CVE-2023-21665

DESCRIPTION: Exploit Observer has 10 entries in 2 file formats related to CVE-2023-21665. Memory corruption in Graphics while importing a file.

FIRST-EPSS: 0.000430000
NVD-IS: 5.9
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.6476879
#ExploitObserverAlert

CVE-2024-21506

DESCRIPTION: Exploit Observer has 5 entries in 2 file formats related to CVE-2024-21506. Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.6581785
#ExploitObserverAlert

CVE-2023-49464

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-49464. libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci.

FIRST-EPSS: 0.000940000
NVD-IS: 5.9
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.5905308
#ExploitObserverAlert

CVE-2023-49460

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-49460. libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::decode_uncompressed_image.

FIRST-EPSS: 0.000870000
NVD-IS: 5.9
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.5905308
#ExploitObserverAlert

CVE-2023-49556

DESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2023-49556. Buffer Overflow vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expr_delete_term function in the libyasm/expr.c component.

FIRST-EPSS: 0.000680000
NVD-IS: 3.6
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5963488
#ExploitObserverAlert

CVE-2023-48011

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-48011. GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.

FIRST-EPSS: 0.000530000
NVD-IS: 5.9
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5935014
#ExploitObserverAlert

CVE-2024-3568

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3568. The huggingface/transformers library is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_repo_checkpoint()` function of the `TFPreTrainedModel()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-21507

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-21507. Versions of the package mysql2 before 3.9.3 are vulnerable to Improper Input Validation through the keyFromFields function, resulting in cache poisoning. An attacker can inject a colon (:) character within a value of the attacker-crafted key.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-1728

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1728. gradio-app/gradio is vulnerable to a local file inclusion vulnerability due to improper validation of user-supplied input in the UploadButton component. Attackers can exploit this vulnerability to read arbitrary files on the filesystem, such as private SSH keys, by manipulating the file path in the request to the `/queue/join` endpoint. This issue could potentially lead to remote code execution. The vulnerability is present in the handling of file upload paths, allowing attackers to redirect file uploads to unintended locations on the server.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-25415

DESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2024-25415. A remote code execution (RCE) vulnerability in /admin/define_language.php of CE Phoenix v1.0.8.20 allows attackers to execute arbitrary PHP code via injecting a crafted payload into the file english.php.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.6035537