SEC Consult Vulnerability Lab Security Advisory < 20220215-0 >
===
title: Multiple Critical Vulnerabilities
product: Multiple Zyxel devices
vulnerable version: For affected products see "Solution"
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/fe0dacbc953d4301232b386fcb3afc23.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Trojan-Spy.Win32.Zbot.aawo.Zeus-Builder
Vulnerability: Insecure Permissions
Description: ZeuS
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/8201ba6b542fc91c004110b2fc5395aa.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Prosti.b
Vulnerability: Insecure Permissions
Description: The malware writes a
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/1c255ef6fd44877700867f94a59875d2.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Email-Worm.Win32.Lama
Vulnerability: Insecure Permissions
Description: The malware writes a ".BAT"
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/65a53a37843db2b86a67a9e23277c1bf.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Prorat.lkt
Vulnerability: Weak Hardcoded Password
Description: The malware listens
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/1e3665a67201209609ae493a2a590bee_C.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Zombam.b
Vulnerability: Cross Site Scripting (XSS)
Description: z0mbie's HTTP RAT
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/1e3665a67201209609ae493a2a590bee_B.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Zombam.b
Vulnerability: Unauthenticated Information Disclosure
Description:
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/1e3665a67201209609ae493a2a590bee.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Zombam.b
Vulnerability: Remote Stack Buffer Overflow
Description: z0mbie's HTTP RAT
Exploit Title: Algorithmia MSOL - Remote Code Execution
Date: 9/28/2021
Vendor Homepage: https://algorithmia.com/
Software Link: https://algorithmia.com/product
Version: Affects all versions of the product up to the date of this submission
Tested on: The issue affects all versions of the product
Exploit Title: Zepl Notebook - Sandbox Escape
Date: 9/28/2021
Vendor Homepage: https://zepl.com/
Software Link: https://app.zepl.com/
Version: Affects all versions of the product up to the date of this submission
Tested on: The issue affects all versions of the product up to the date of this
Exploit Title: Zepl Notebook - Remote Code Execution
Date: 9/28/2021
Vendor Homepage: https://zepl.com/
Software Link: https://app.zepl.com/
Version: All previous versions of product to the date of this submission
Tested on: The issue affects all versions of the product up to the date of this
11 matches
Mail list logo