ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-3101

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3101. In mintplex-labs/anything-llm, an improper input validation vulnerability allows attackers to escalate privileges by deactivating 'Multi-User Mode'. By sending a specially crafted curl request with the 'multi_user_mode' parameter set to false, an attacker can deactivate 'Multi-User Mode'. This action permits the creation of a new admin user without requiring a password, leading to unauthorized administrative access.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5780347
#ExploitObserverAlert

CVE-2023-49463

DESCRIPTION: Exploit Observer has 8 entries in 3 file formats related to CVE-2023-49463. libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc.

FIRST-EPSS: 0.000940000
NVD-IS: 5.9
NVD-ES: 2.8
ARPS-EXPLOITABILITY: 0.5905308
#ExploitObserverAlert

CVE-2023-51713

DESCRIPTION: Exploit Observer has 7 entries in 3 file formats related to CVE-2023-51713. make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics.

FIRST-EPSS: 0.000530000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.5963488
#ExploitObserverAlert

CVE-2022-2806

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2022-2806. It was found that the ovirt-log-collector/sosreport collects the RHV admin password unfiltered. Fixed in: sos-4.2-20.el8_6, ovirt-log-collector-4.4.7-2.el8ev

FIRST-EPSS: 0.000440000
NVD-IS: 3.6
NVD-ES: 1.8
ARPS-EXPLOITABILITY: 0.5941964
#ExploitObserverAlert

CVE-2024-29834

DESCRIPTION: Exploit Observer has 13 entries in 4 file formats related to CVE-2024-29834. This vulnerability allows authenticated users with produce or consume permissions to perform unauthorized operations on partitioned topics, such as unloading topics and triggering compaction. These management operations should be restricted to users with the tenant admin role or superuser role. An authenticated user with produce permission can create subscriptions and update subscription properties on partitioned topics, even though this should be limited to users with consume permissions. This impact analysis assumes that Pulsar has been configured with the default authorization provider. For custom authorization providers, the impact could be slightly different. Additionally, the vulnerability allows an authenticated user to read, create, modify, and delete namespace properties in any namespace in any tenant. In Pulsar, namespace properties are reserved for user provided metadata about the namespace. This issue affects Apache Pulsar versions from 2.7.1 to 2.10.6, from 2.11.0 to 2.11.4, from 3.0.0 to 3.0.3, from 3.1.0 to 3.1.3, and from 3.2.0 to 3.2.1. 3.0 Apache Pulsar users should upgrade to at least 3.0.4. 3.1 and 3.2 Apache Pulsar users should upgrade to at least 3.2.2. Users operating versions prior to those listed above should upgrade to the aforementioned patched versions or newer versions.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.715534
#ExploitObserverAlert

CVE-2024-31864

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-31864. Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin. The attacker can inject sensitive configuration or malicious code when connecting MySQL database via JDBC driver. This issue affects Apache Zeppelin: before 0.11.1. Users are recommended to upgrade to version 0.11.1, which fixes the issue.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.5747126
#ExploitObserverAlert

CVE-2024-27992

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27992. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Whisper Link Whisper Free allows Reflected XSS.This issue affects Link Whisper Free: from n/a through 0.6.8.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2023-5824

DESCRIPTION: Exploit Observer has 19 entries in 4 file formats related to CVE-2023-5824. Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.

FIRST-EPSS: 0.009670000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.6359197
#ExploitObserverAlert

CVE-2024-21508

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-21508. Versions of the package mysql2 before 3.9.4 are vulnerable to Remote Code Execution (RCE) via the readCodeFor function due to improper validation of the supportBigNumbers and bigNumberStrings values.

FIRST-EPSS: 0.000440000
ARPS-EXPLOITABILITY: 0.6373563
#ExploitObserverAlert

CVE-2024-23192

DESCRIPTION: Exploit Observer has 4 entries in 1 file formats related to CVE-2024-23192. RSS feeds that contain malicious data- attributes could be abused to inject script code to a users browser session when reading compromised RSS feeds or successfully luring users to compromised accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Potentially malicious attributes now get removed from external RSS content. No publicly available exploits are known.

FIRST-EPSS: 0.000450000
ARPS-EXPLOITABILITY: 0.7373563
#ExploitObserverAlert

CVE-2024-27969

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27969. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Enhanced Free Downloads WooCommerce allows Stored XSS.This issue affects Free Downloads WooCommerce: from n/a through 3.5.8.2.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2024-27991

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27991. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SupportCandy allows Stored XSS.This issue affects SupportCandy: from n/a through 3.2.3.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2023-4408

DESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to CVE-2023-4408. The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.

FIRST-EPSS: 0.000810000
NVD-IS: 3.6
NVD-ES: 3.9
ARPS-EXPLOITABILITY: 0.6482605
#ExploitObserverAlert

CVE-2024-27967

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-27967. Cross-Site Request Forgery (CSRF) vulnerability in Michael Leithold DSGVO All in one for WP.This issue affects DSGVO All in one for WP: from n/a through 4.3.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2024-25922

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-25922. Missing Authorization vulnerability in Peach Payments Peach Payments Gateway.This issue affects Peach Payments Gateway: from n/a through 3.1.9.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2024-25376

DESCRIPTION: Exploit Observer has 5 entries in 3 file formats related to CVE-2024-25376. An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based installers before 5.68.0 allows a local attacker to execute arbitrary code via the msiexec.exe repair mode.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.6369742
#ExploitObserverAlert

CVE-2024-24850

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2024-24850. Missing Authorization vulnerability in Mark Stockton Quicksand Post Filter jQuery Plugin.This issue affects Quicksand Post Filter jQuery Plugin: from n/a through 3.1.1.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2023-51672

DESCRIPTION: Exploit Observer has 6 entries in 2 file formats related to CVE-2023-51672. Missing Authorization vulnerability in FunnelKit FunnelKit Checkout.This issue affects FunnelKit Checkout: from n/a through 3.10.3.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5986263
#ExploitObserverAlert

CVE-2023-29483

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-29483. eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.

FIRST-EPSS: 0.000440000
ARPS-EXPLOITABILITY: 0.6373563
#ExploitObserverAlert

CVE-2024-29019

DESCRIPTION: Exploit Observer has 4 entries in 2 file formats related to CVE-2024-29019. ESPHome is a system to control microcontrollers remotely through Home Automation systems. API endpoints in dashboard component of ESPHome version 2023.12.9 (command line installation) are vulnerable to Cross-Site Request Forgery (CSRF) allowing remote attackers to carry out attacks against a logged user of the dashboard to perform operations on configuration files (create, edit, delete). It is possible for a malicious actor to create a specifically crafted web page that triggers a cross site request against ESPHome, this allows bypassing the authentication for API calls on the platform. This vulnerability allows bypassing authentication on API calls accessing configuration file operations on the behalf of a logged user. In order to trigger the vulnerability, the victim must visit a weaponized page. In addition to this, it is possible to chain this vulnerability with GHSA-9p43-hj5j-96h5/ CVE-2024-27287 to obtain a complete takeover of the user account. Version 2024.3.0 contains a patch for this issue.

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.6145687
#ExploitObserverAlert

CVE-2023-6257

DESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2023-6257. The Inline Related Posts WordPress plugin before 3.6.0 does not ensure that post content displayed via an AJAX action are accessible to the user, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts

FIRST-EPSS: 0.000430000
ARPS-EXPLOITABILITY: 0.5747126