[FD] [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)

2021-10-05 Thread bashis
[STX] Subject: [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045) Attack vector: Remote Authentication: Anonymous (no credentials needed) Researcher: bashis (2021) Limited Disclosure: September 6, 2021 Full Disclosure: October 6, 2021 PoC:

[FD] Backdoor.Win32.Prorat.lkt / Port Bounce Scan (MITM)

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b_B.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.lkt Vulnerability: Port Bounce Scan (MITM) Description: The ProSpy Server

[FD] Backdoor.Win32.Prorat.lkt / Weak Hardcoded Password

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.lkt Vulnerability: Weak Hardcoded Password Description: The ProSpy Server

[FD] HackTool.Win32.Agent.gi / Local Stack Buffer Overflow (SEH)

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/e60606d19a36789662ba97b4bb5c4ccf.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: HackTool.Win32.Agent.gi Vulnerability: Local Stack Buffer Overflow (SEH) Description: The Hack

[FD] Trojan-PSW.Win32.PdPinch.gen / Remote Denial of Service

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/0e4fbfeb6f7a98e437a497013b285ffc.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Trojan-PSW.Win32.PdPinch.gen Vulnerability: Remote Denial of Service Description: The malware

[FD] Backdoor.Win32.Hupigon.gy / Unauthenticated Open Proxy

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be74cbb86c007309d8004d910f5270f7.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.gy Vulnerability: Unauthenticated Open Proxy Description: The malware

[FD] Backdoor.Win32.Bifrose.ahyg / Insecure Permissions

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/d6aff119c03ff378d386b30b36b07a69.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bifrose.ahyg Vulnerability: Insecure Permissions Description: The malware creates

[FD] HEUR.Trojan.Win32.Generic / Insecure Service Path

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/2e4b6c5bd907995f6fd40c5eeab5c6e9.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: HEUR.Trojan.Win32.Generic Vulnerability: Insecure Service Path Description: The malware creates a

[FD] Backdoor.Win32.Yoddos.an / Insecure Service Path

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/bf2417bf23a3b7ae2e44676882b4b9dd.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Yoddos.an Vulnerability: Insecure Service Path Description: The malware creates a

[FD] Backdoor.Win32.LolBot.gen / Insecure Permissions

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/56a93a2a0a4c6a09e2761f2e0351b020.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.LolBot.gen Vulnerability: Insecure Permissions Description: The malware creates an

[FD] Virus.Win32.Renamer.a / Insecure Permissions

2021-10-05 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/001fc372acc853aa1cf92588a43a7deb.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Virus.Win32.Renamer.a Vulnerability: Insecure Permissions Description: The malware creates an dir

[FD] SEC Consult SA-20211004-0 :: Critical vulnerabilities in HiKam S6

2021-10-05 Thread Functional Account, SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory < 20211004-0 > === title: Multiple Critical Vulnerabilities product: High Infinity Technology HiKam S6 vulnerable version: <=1.3.26 fixed version:

[FD] Local Privilege Escalation in G Data’s Security Client “EndpointProtection Enterprise” prior to 17.08.2021

2021-10-05 Thread Florian Bogner via Fulldisclosure
DATA Anti-Virus: Abusing OpenSSL to get local admin Metadata === Release Date: 05-Oct-2021 Author: Florian Bogner @ https://bee-itsecurity.at Affected product: G Data’s Security Client “EndpointProtection Enterprise” Fixed in: all versions after