Posts
161
Following
Hidden
Followers
32
AttackerKB bot (Unofficial)
New assessment for topic: CVE-2024-22729

Topic description: "NETIS SYSTEMS MW5360 V1.0.1.3031 was discovered to contain a command injection vulnerability via the password parameter on the login page. ..."

"[metadata only] ..."

Link: https://attackerkb.com/assessments/1671c0a1-d996-4224-8034-3782acdb3bad
0
1
0
New assessment for topic: CVE-2019-1068

Topic description: "A remote code execution vulnerability exists in Microsoft SQL Server when it incorrectly handles processing of internal functions, aka 'Microsoft SQL Server Remote Code Execution Vulnerability'. ..."

"[metadata only] ..."

Link: https://attackerkb.com/assessments/46f2ab9e-5758-48a6-8c91-50f57afef149
0
0
0
New assessment for topic: CVE-2024-22026

Topic description: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem ..."

"CVE-2024-22026 is a local privilege escalation vulnerability in Ivanti EPMM (formerly MobileIron) server versions prior to 12.1.0.0, 12.0.0.0, and 11.12.0.1 ..."

Link: https://attackerkb.com/assessments/7f7b046e-eae8-4ef0-940e-eb49334c203e
0
1
1
New assessment for topic: CVE-2023-50386

Topic description: "Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. ..."

"Rapid7 pen testers have noted they have encountered vulnerable versions of this software on engagements ..."

Link: https://attackerkb.com/assessments/4a8895bf-6532-45bf-bdbb-fea7a9705d34
0
0
0
New assessment for topic: CVE-2024-21793

Topic description: " ..."

"An unauthenticated attacker can exploit this vulnerability to execute malicious SQL statements through the BIG-IP NEXT Central Manager API (URI). ..."

Link: https://attackerkb.com/assessments/90432b58-a844-4901-94ba-16109b65f110
0
0
0
New assessment for topic: CVE-2024-26026

Topic description: " ..."

"BIG-IP Next is “a completely new incarnation” of F5’s BIG-IP devices/modules, which are used for managing and inspecting network and application traffic ..."

Link: https://attackerkb.com/assessments/a5768ee9-8573-4b48-8ad0-b0a97df0458c
0
0
0
New assessment for topic: CVE-2024-4215

Topic description: "pgAdmin <= 8.5 is affected by a multi-factor authentication bypass vulnerability ..."

"pgAdmin is vulnerable to a multi-factor authentication bypass ([CWE-287](https://cwe.mitre.org/data/definitions/287.html)) whereby an attacker with knowledge of an account’s credentials can manage files and make SQL queries regardless of whether or not the account has been configured with MFA ..."

Link: https://attackerkb.com/assessments/40f2eb9e-ea23-4efe-8af8-87efff9250d7
0
1
0
New assessment for topic: CVE-2024-2044

Topic description: "pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing users’ sessions in the session handling code ..."

"pgAdmin versions <=8.3 are vulnerable to a path traversal vulnerability in the session handling logic ..."

Link: https://attackerkb.com/assessments/010cd2a6-6916-4678-a313-7fe079646dfc
0
1
1
It seems the www. subdomain of AttackerKB is gone, changed the script to generate links accordingly.

Sorry for the inconvenience!
0
1
1
New assessment for topic: CVE-2024-4040

Topic description: "A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server. ..."

"CVE-2024-4040 was discovered by Simon Garrelou, of Airbus CERT, and it's a server-side template injection vulnerability for the CrushFTP managed file transfer suite ..."

Link: https://www.attackerkb.com/assessments/3e0e1e02-fd8f-4036-a085-1348c36a62f8
0
0
0
New Rapid7 Analysis on AttackerKB topic: CVE-2024-4040

"On Friday, April 19, 2024, managed file transfer vendor CrushFTP [released information](https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/) to a private mailing list on a new zero-day vulnerability affecting CrushFTP versions below 10.7.1 and 11.1.0 (as well as legacy 9.x versions) across all platforms ..."

Link: https://www.attackerkb.com/topics/46707820-42d9-44a3-a84a-7f8465055536
0
0
0
New assessment for topic: CVE-2023-38511

Topic description: "iTop is an IT service management platform ..."

"[php_filter_chains_oracle_exploit](https://github.com/synacktiv/php_filter_chains_oracle_exploit) makes it easy to wayponize. ..."

Link: https://www.attackerkb.com/assessments/fb17e697-4923-4bf1-8e60-b77a7bb4072a
0
0
0
New assessment for topic: CVE-2024-3400

Topic description: "A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. ..."

"CVE-2024-3400, which is technically a chain of two vulnerabilities, is an unauthenticated remote code execution exploit for software with a broad public attack surface ..."

Link: https://www.attackerkb.com/assessments/50f9099c-6b92-4ce1-bb60-a30de187735b
0
0
0
New Rapid7 Analysis on AttackerKB topic: CVE-2024-3400

"On April 12, 2024, Palo Alto Networks published an advisory for a critical unauthenticated command injection vulnerability affecting several recent versions of [PAN-OS](https://docs.paloaltonetworks.com/pan-os), the software that runs on most modern Palo Alto Networks firewall appliances ..."

Link: https://www.attackerkb.com/topics/2fff9e98-f7c9-4c36-9bae-05942516e954
0
0
0
New assessment for topic: CVE-2024-3400

Topic description: "A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. ..."

"An OS command injection vulnerability exists within Palo Alto Global Protect effecting the following versions with an overall rating of 10/10: ..."

Link: https://www.attackerkb.com/assessments/01172dad-2c49-4d1f-b25a-e9a090b0d9ca
0
0
0
New assessment for topic: CVE-2023-48788

Topic description: "A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets. ..."

"An SQLi injection vulnerability exists in FortiNet FortiClient EMS (Endpoint Management Server) ..."

Link: https://www.attackerkb.com/assessments/580f324d-6255-4062-b508-2d0ffa1bf44c
0
0
0
New assessment for topic: CVE-2023-50386

Topic description: "Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. ..."

"Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1 is affected by an Unrestricted Upload of File with Dangerous Type vulnerability which can result in remote code execution in the context of the user running Apache Solr. ..."

Link: https://www.attackerkb.com/assessments/2e43413d-7cc0-46aa-a975-0609302e8815
0
0
0
New assessment for topic: CVE-2024-3094

Topic description: "Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0 ..."

"On the one hand, it's backdoored software, so "exploitation" could arguably have already occurred (in the form of an already executed supply chain attack) ..."

Link: https://www.attackerkb.com/assessments/c9511426-7250-4e5f-bd18-d42861f3ccae
0
0
0
New assessment for topic: CVE-2024-3094

Topic description: "Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0 ..."

"xz backdoor leads to authentication bypass on OpenSSH ..."

Link: https://www.attackerkb.com/assessments/12d28505-ef0b-42d3-ab4b-4854d443b6dc
0
0
0
New assessment for topic: CVE-2024-3094

Topic description: "Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0 ..."

"This one has gained significant attention over the past few days ..."

Link: https://www.attackerkb.com/assessments/05a530d9-2cbb-4405-baec-c6ed4a9472a8
0
0
0
Show older