Skip to content

Commit

Permalink
Update Mon Apr 15 18:04:45 UTC 2024
Browse files Browse the repository at this point in the history
  • Loading branch information
trickest-workflows committed Apr 15, 2024
1 parent 28e2d6d commit 0a76cc4
Show file tree
Hide file tree
Showing 7 changed files with 29 additions and 1 deletion.
1 change: 1 addition & 0 deletions 2016/CVE-2016-10717.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ A vulnerability in the encryption and permission implementation of Malwarebytes
- https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/
- https://github.com/mspaling/mbam-exclusions-poc-
- https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt
- https://www.youtube.com/watch?v=LF5ic5nOoUY

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2021/CVE-2021-28485.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Ericsson Mobile Switching Center Server (MSC-S) before IS 3.1 CP22, the SIS w
### POC

#### Reference
- https://www.ericsson.com/en/about-us/security/psirt
- https://www.gruppotim.it/it/footer/red-team.html

#### Github
Expand Down
2 changes: 2 additions & 0 deletions 2021/CVE-2021-28488.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ Ericsson Network Manager (ENM) before 21.2 has incorrect access-control behavior
### POC

#### Reference
- https://www.ericsson.com
- https://www.ericsson.com/en/about-us/enterprise-security/psirt
- https://www.gruppotim.it/it/footer/red-team.html

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2021/CVE-2021-32570.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ In Ericsson Network Manager (ENM) releases before 21.2, users belonging to the s
### POC

#### Reference
- https://www.ericsson.com
- https://www.gruppotim.it/it/footer/red-team.html

#### Github
Expand Down
17 changes: 17 additions & 0 deletions 2024/CVE-2024-25007.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2024-25007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25007)
![](https://img.shields.io/static/v1?label=Product&message=Ericsson%20Network%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%2023.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File&color=brighgreen)

### Description

Ericsson Network Manager (ENM), versions prior to 23.1, contains a vulnerability in the export function of application log where Improper Neutralization of Formula Elements in a CSV File can lead to code execution or information disclosure. There is limited impact to integrity and availability. The attacker on the adjacent network with administration access can exploit the vulnerability.

### POC

#### Reference
- https://www.ericsson.com/en/about-us/security/psirt/security-bulletin--ericsson-network-manager-march-2024

#### Github
No PoCs found on GitHub currently.

2 changes: 1 addition & 1 deletion 2024/CVE-2024-3764.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

### Description

A vulnerability classified as problematic has been found in Tuya Camera 3.2.9. Affected is an unknown function of the component MQTT Packet Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260604.
** DISPUTED ** ** DISPUTED ** A vulnerability classified as problematic has been found in Tuya Camera 3.2.9. Affected is an unknown function of the component MQTT Packet Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-260604. NOTE: The vendor explains that a malicious actor would have to crack TLS first or use a legitimate login to initiate the attack.

### POC

Expand Down
6 changes: 6 additions & 0 deletions references.txt
Original file line number Diff line number Diff line change
Expand Up @@ -36764,6 +36764,7 @@ CVE-2016-10716 - https://packetstormsecurity.com/files/137649/JIRA-Mail.ru-Calen
CVE-2016-10717 - https://forums.malwarebytes.com/topic/158251-malwarebytes-hall-of-fame/
CVE-2016-10717 - https://github.com/mspaling/mbam-exclusions-poc-
CVE-2016-10717 - https://github.com/mspaling/mbam-exclusions-poc-/blob/master/mbam-whitelist-poc.txt
CVE-2016-10717 - https://www.youtube.com/watch?v=LF5ic5nOoUY
CVE-2016-10718 - https://github.com/brave/browser-laptop/issues/5006
CVE-2016-10718 - https://github.com/brave/browser-laptop/issues/5007
CVE-2016-10718 - https://www.exploit-db.com/exploits/44475/
Expand Down Expand Up @@ -73042,7 +73043,10 @@ CVE-2021-28429 - https://git.ffmpeg.org/gitweb/ffmpeg.git/commitdiff/c94875471e3
CVE-2021-28459 - http://packetstormsecurity.com/files/162190/Microsoft-Azure-DevOps-Server-2020.0.1-Cross-Site-Scripting.html
CVE-2021-28459 - http://seclists.org/fulldisclosure/2021/Apr/25
CVE-2021-28476 - http://packetstormsecurity.com/files/163497/Microsoft-Hyper-V-vmswitch.sys-Proof-Of-Concept.html
CVE-2021-28485 - https://www.ericsson.com/en/about-us/security/psirt
CVE-2021-28485 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2021-28488 - https://www.ericsson.com
CVE-2021-28488 - https://www.ericsson.com/en/about-us/enterprise-security/psirt
CVE-2021-28488 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2021-28653 - https://www.westerndigital.com/support/productsecurity/wdc-21003-armorLock-insecure-key-storage-vulnerability
CVE-2021-28657 - https://www.oracle.com/security-alerts/cpuapr2022.html
Expand Down Expand Up @@ -73885,6 +73889,7 @@ CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/1
CVE-2021-32563 - http://www.openwall.com/lists/oss-security/2023/01/05/2
CVE-2021-32568 - https://huntr.dev/bounties/04fc04b3-2dc1-4cad-a090-e403cd66b5ad
CVE-2021-32569 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html
CVE-2021-32570 - https://www.ericsson.com
CVE-2021-32570 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2021-32571 - https://www.gruppotim.it/it/innovazione/servizi-digitali/cybersecurity/red-team.html
CVE-2021-32604 - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=29000
Expand Down Expand Up @@ -93362,6 +93367,7 @@ CVE-2024-25004 - http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Com
CVE-2024-25004 - http://packetstormsecurity.com/files/177032/KiTTY-0.76.1.13-Buffer-Overflows.html
CVE-2024-25004 - http://seclists.org/fulldisclosure/2024/Feb/14
CVE-2024-25004 - https://blog.defcesco.io/CVE-2024-25003-CVE-2024-25004
CVE-2024-25007 - https://www.ericsson.com/en/about-us/security/psirt/security-bulletin--ericsson-network-manager-march-2024
CVE-2024-2509 - https://research.cleantalk.org/cve-2024-2509/
CVE-2024-2509 - https://wpscan.com/vulnerability/dec4a632-e04b-4fdd-86e4-48304b892a4f/
CVE-2024-25106 - https://github.com/openobserve/openobserve/security/advisories/GHSA-3m5f-9m66-xgp7
Expand Down

0 comments on commit 0a76cc4

Please sign in to comment.