Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/434923afc32a7bc7355ed9a5224b9273.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Freddy.2001
Vulnerability: Authentication Bypass Command Execution
Description: The
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/29bc048d58ab8038c7001ef0d5e69c9b_B.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Prexot.a
Vulnerability: Port Bounce Scan (MITM)
Description: The malware listens o
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/29bc048d58ab8038c7001ef0d5e69c9b.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Prexot.a
Vulnerability: Authentication Bypass
Description: The malware listens on ra
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/55822613e0d0f437f3ebe5c7f4155452.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Wdoor.11
Vulnerability: Unauthenticated Remote Command Execution
Description: Wdoor
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/3d4350282ae043177063de2ad4827b97.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.XRat.k
Vulnerability: Unauthenticated Remote Command Execution
Description: XRat ma
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/16fab35b51f9e6447f2a8c04db4ebe93.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Frauder.jt
Vulnerability: Insecure Permissions
Description: The malware writes an ex
*** Apologies for multiple copies ***
C a l l F o r P a p e r s
The 24th International Conference on Information and Communications
Security (ICICS 2022)
University of Kent, Canterbury, UK -- September 5-8,
Hi everyone,
I submittet to Facebook a DNS misconfiguration issue. Specifically, the
following URLs will be resoved as private IP addresses.
dev.facebook.com : A [10.110.151.5]
hr.facebook.com : A [10.110.199.9]
prof.facebook.com : A [10.18.4.109]
tps.facebook.com : A [10.110.159.18]
interim.fa
SEC Consult Vulnerability Lab Security Advisory < 20220209-0 >
===
title: Open Redirect in Login Page
product: SIEMENS-SINEMA Remote Connect
vulnerable version: V1.0 SP3 HF1
fixed version: V2.0
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2022-02-10-3 Safari 15.3
Safari 15.3 addresses the following issues.
Information about the security content is alsoavailable at
https://support.apple.com/HT213091.
WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2022-02-10-2 macOS Monterey 12.2.1
macOS Monterey 12.2.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213092.
WebKit
Available for: macOS Monterey
Impact: Processin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2022-02-10-1 iOS 15.3.1 and iPadOS 15.3.1
iOS 15.3.1 and iPadOS 15.3.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213093.
WebKit
Available for: iPhone 6s and late
title: Nokia Transport Module Authentication Bypass
case id: CM-2020-02
product: BTS TRS web console (FTM_W20_FP2_2019.08.16_0010)
vulnerability type: Authentication Bypass
severity: Critical
found: 2020-09-28
CVE: CVE-2021-
13 matches
Mail list logo