intel.intruder.io
Open in
urlscan Pro
2606:4700:10::6816:2c6e
Public Scan
Submitted URL: http://intel.intruder.io/
Effective URL: https://intel.intruder.io/
Submission: On December 05 via manual from CH — Scanned from CH
Effective URL: https://intel.intruder.io/
Submission: On December 05 via manual from CH — Scanned from CH
Form analysis
0 forms found in the DOMText Content
Top CVE Trends & Expert Vulnerability Insights | Intel Trends Search...⌘K CVE TRENDS Beta Updated 44 minutes ago Feeds AT A GLANCE HYPEMETER 90100 Current score Not much chatter TOP 5 TRENDS TODAY TRENDING Top 10 CVEs trending on social media within the last 24 hours. Trending Hype score Published Description Last 24 hours 1. show more detail 1 CVE-2024-42448 9 Not available in NVD 2. show more detail 2 CVE-2024-10905 critical 10.0 4 Dec 2, 2024 IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p8, and all prior versions allows HTTP access to static content in the IdentityIQ application directory that should be protected. 3. show more detail 3 CVE-2024-42327 critical 9.9 4 Nov 27, 2024 A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access. 4. show more detail 4 CVE-2024-38193 high 7.8 Exploit known 4 Aug 13, 2024 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability 5. show more detail 5 CVE-2024-53844 medium 6.3 4 Nov 26, 2024 E.D.D.I (Enhanced Dialog Driven Interface) is a middleware to connect and manage LLM API bots. A path traversal vulnerability exists in the backup export functionality of EDDI, as implemented in `RestExportService.java`. This vulnerability allows an attacker to access sensitive files on the server by manipulating the `botFilename` parameter in requests. The application fails to sanitize user input, enabling malicious inputs such as `..%2f..%2fetc%2fpasswd` to access arbitrary files. However, the **severity of this vulnerability is significantly limited** because EDDI typically runs within a **Docker container**, which provides additional layers of isolation and restricted permissions. As a result, while this vulnerability exposes files within the container, it does not inherently threaten the underlying host system or other containers. A patch is required to sanitize and validate the botFilename input parameter. Users should ensure they are using version 5.4 which contains this patdch. For temporary mitigation, access to the vulnerable endpoint should be restricted through firewall rules or authentication mechanisms. 6. show more detail 6 CVE-2024-12053 high 8.8 1 Dec 3, 2024 Type Confusion in V8 in Google Chrome prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) 7. show more detail 7 CVE-2024-53375 high 8.0 1 Dec 2, 2024 Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality. 8. show more detail 8 CVE-2024-42449 high 7.1 1 Dec 4, 2024 From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to remove arbitrary files on the VSPC server machine. 9. show more detail 9 CVE-2024-49039 high 8.8 Exploit known 1 Nov 12, 2024 Windows Task Scheduler Elevation of Privilege Vulnerability 10. show more detail 10 CVE-2024-8672 critical 9.9 1 Nov 28, 2024 The Widget Options – The #1 WordPress Widget & Block Control Plugin plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.0.7 via the display logic functionality that extends several page builders. This is due to the plugin allowing users to supply input that will be passed through eval() without any filtering or capability checks. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. Special note: We suggested the vendor implement an allowlist of functions and limit the ability to execute commands to just administrators, however, they did not take our advice. We are considering this patched, however, we believe it could still be further hardened and there may be residual risk with how the issue is currently patched. TRENDING Top 10 CVEs trending on social media within the last 24 hours. 1. show more detail 1 · CVE-2024-42448 Hype score 9 2. show more detail 2 · CVE-2024-10905 Hype score 4 · critical 10.0 3. show more detail 3 · CVE-2024-42327 Hype score 4 · critical 9.9 4. show more detail 4 · CVE-2024-38193 Hype score 4 · high 7.8 Exploit known 5. show more detail 5 · CVE-2024-53844 Hype score 4 · medium 6.3 6. show more detail 6 · CVE-2024-12053 Hype score 1 · high 8.8 7. show more detail 7 · CVE-2024-53375 Hype score 1 · high 8.0 8. show more detail 8 · CVE-2024-42449 Hype score 1 · high 7.1 9. show more detail 9 · CVE-2024-49039 Hype score 1 · high 8.8 Exploit known 10. show more detail 10 · CVE-2024-8672 Hype score 1 · critical 9.9 This website uses cookies from Intruder to deliver its services and to analyse traffic. Learn more OK, got it!Learn more TRY INTRUDER © 2024 Intruder Systems Ltd. AboutPrivacySitemapFeeds