ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2013-4477

DESCRIPTION: Exploit Observer has 9 entries in 2 file formats related to CVE-2013-4477. The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges.

FIRST-EPSS: 0.000420000
NVD-IS: 4.9
NVD-ES: 3.4
ARPS-EXPLOITABILITY: 0.5829541
#ExploitObserverAlert

CVE-2024-3273

DESCRIPTION: Exploit Observer has 46 entries in 8 file formats related to CVE-2024-3273. ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

FIRST-EPSS: 0.000630000
ARPS-EXPLOITABILITY: 0.7598383
#ExploitObserverAlert

CVE-2024-1625

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1625. An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary application version 0.3.0, allowing unauthorized deletion of any organization's project. The vulnerability is due to insufficient authorization checks in the project deletion endpoint, where the endpoint fails to verify if the project ID provided in the request belongs to the requesting user's organization. As a result, an attacker can delete projects belonging to any organization by sending a crafted DELETE request with the target project's ID. This issue affects the project deletion functionality implemented in the projects.delete route.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2023-6385

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-6385. The WordPress Ping Optimizer WordPress plugin through 2.35.1.3.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks such as clearing logs.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-30261

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-30261. Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2023-45363

DESCRIPTION: Exploit Observer has 10 entries in 2 file formats related to CVE-2023-45363. An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set.

FIRST-EPSS: 0.000470000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.5829541
#ExploitObserverAlert

CVE-2023-6478

DESCRIPTION: Exploit Observer has 31 entries in 2 file formats related to CVE-2023-6478. A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.

FIRST-EPSS: 0.001760000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.2108944
#ExploitObserverAlert

CVE-2023-27517

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-27517. Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5792645
#ExploitObserverAlert

CVE-2024-2731

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-2731. Users with low privileges (all permissions deselected in the administrator permissions settings) can view certain pages that expose sensitive information such as company names, users' names and surnames, stage names, and monitoring campaigns and their descriptions. In addition, unprivileged users can see and edit the descriptions of tags. At the time of publication of the CVE no patch is available.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-31309

DESCRIPTION: Exploit Observer has 21 entries in 6 file formats related to CVE-2024-31309. HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.7065795
#ExploitObserverAlert

CVE-2024-1599

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1599. lunary-ai/lunary version 0.3.0 is vulnerable to unauthorized project creation due to insufficient server-side validation of user account types during project creation. In the free account tier, users are limited to creating only two projects. However, this restriction is enforced only in the web UI and not on the server side, allowing users to bypass the limitation and create an unlimited number of projects without upgrading their account or incurring additional charges. This vulnerability is due to the lack of checks in the project creation endpoint.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2023-6152

DESCRIPTION: Exploit Observer has 8 entries in 2 file formats related to CVE-2023-6152. A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5804944
#ExploitObserverAlert

CVE-2023-50966

DESCRIPTION: Exploit Observer has 9 entries in 3 file formats related to CVE-2023-50966. erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.6065053
#ExploitObserverAlert

CVE-2024-3098

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3098. A vulnerability was identified in the `exec_utils` class of the `llama_index` package, specifically within the `safe_eval` function, allowing for prompt injection leading to arbitrary code execution. This issue arises due to insufficient validation of input, which can be exploited to bypass method restrictions and execute unauthorized code. The vulnerability is a bypass of the previously addressed CVE-2023-39662, demonstrated through a proof of concept that creates a file on the system by exploiting the flaw.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2024-2195

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-2195. A critical Remote Code Execution (RCE) vulnerability was identified in the aimhubio/aim project, specifically within the `/api/runs/search/run/` endpoint, affecting versions >= 3.0.0. The vulnerability resides in the `run_search_api` function of the `aim/web/api/runs/views.py` file, where improper restriction of user access to the `RunView` object allows for the execution of arbitrary code via the `query` parameter. This issue enables attackers to execute arbitrary commands on the server, potentially leading to full system compromise.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2023-30801

DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2023-30801. All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.

FIRST-EPSS: 0.001160000
NVD-IS: 5.9
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.5964737
#ExploitObserverAlert

CVE-2018-14636

DESCRIPTION: Exploit Observer has 8 entries in 2 file formats related to CVE-2018-14636. Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.

FIRST-EPSS: 0.001240000
NVD-IS: 3.6
NVD-ES: 1.6
ARPS-EXPLOITABILITY: 0.5817243
#ExploitObserverAlert

CVE-2023-50268

DESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2023-50268. jq is a command-line JSON processor. Version 1.7 is vulnerable to stack-based buffer overflow in builds using decNumber. Version 1.7.1 contains a patch for this issue.

FIRST-EPSS: 0.000420000
NVD-IS: 3.6
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5959611
#ExploitObserverAlert

CVE-2023-34969

DESCRIPTION: Exploit Observer has 15 entries in 4 file formats related to CVE-2023-34969. D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.

FIRST-EPSS: 0.000540000
NVD-IS: 3.6
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.6006409
#ExploitObserverAlert

CVE-2024-2196

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-2196. aimhubio/aim is vulnerable to Cross-Site Request Forgery (CSRF), allowing attackers to perform actions such as deleting runs, updating data, and stealing data like log records and notes without the user's consent. The vulnerability stems from the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986414
#ExploitObserverAlert

CVE-2024-1600

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-1600. A Local File Inclusion (LFI) vulnerability exists in the parisneo/lollms-webui application, specifically within the `/personalities` route. An attacker can exploit this vulnerability by crafting a URL that includes directory traversal sequences (`../../`) followed by the desired system file path, URL encoded. Successful exploitation allows the attacker to read any file on the filesystem accessible by the web server. This issue arises due to improper control of filename for include/require statement in the application.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347