[STX]
Subject: [Update]: Dahua Authentication bypass (CVE-2021-33044, CVE-2021-33045)
Attack vector: Remote
Authentication: Anonymous (no credentials needed)
Researcher: bashis (2021)
Limited Disclosure: September 6, 2021
Full Disclosure: October 6, 2021
PoC:
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b_B.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Prorat.lkt
Vulnerability: Port Bounce Scan (MITM)
Description: The ProSpy Server
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/dec8f9042986d64e29d62effb482290b.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Prorat.lkt
Vulnerability: Weak Hardcoded Password
Description: The ProSpy Server
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/e60606d19a36789662ba97b4bb5c4ccf.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: HackTool.Win32.Agent.gi
Vulnerability: Local Stack Buffer Overflow (SEH)
Description: The Hack
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/0e4fbfeb6f7a98e437a497013b285ffc.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Trojan-PSW.Win32.PdPinch.gen
Vulnerability: Remote Denial of Service
Description: The malware
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/be74cbb86c007309d8004d910f5270f7.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Hupigon.gy
Vulnerability: Unauthenticated Open Proxy
Description: The malware
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/d6aff119c03ff378d386b30b36b07a69.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Bifrose.ahyg
Vulnerability: Insecure Permissions
Description: The malware creates
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/2e4b6c5bd907995f6fd40c5eeab5c6e9.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: HEUR.Trojan.Win32.Generic
Vulnerability: Insecure Service Path
Description: The malware creates a
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/bf2417bf23a3b7ae2e44676882b4b9dd.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Yoddos.an
Vulnerability: Insecure Service Path
Description: The malware creates a
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/56a93a2a0a4c6a09e2761f2e0351b020.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.LolBot.gen
Vulnerability: Insecure Permissions
Description: The malware creates an
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/001fc372acc853aa1cf92588a43a7deb.txt
Contact: malvul...@gmail.com
Media: twitter.com/malvuln
Threat: Virus.Win32.Renamer.a
Vulnerability: Insecure Permissions
Description: The malware creates an dir
SEC Consult Vulnerability Lab Security Advisory < 20211004-0 >
===
title: Multiple Critical Vulnerabilities
product: High Infinity Technology HiKam S6
vulnerable version: <=1.3.26
fixed version:
DATA Anti-Virus: Abusing OpenSSL to get local admin
Metadata
===
Release Date: 05-Oct-2021
Author: Florian Bogner @ https://bee-itsecurity.at
Affected product: G Data’s Security Client “EndpointProtection Enterprise”
Fixed in: all versions after
13 matches
Mail list logo