Full Disclosure: by date

54 messages starting Apr 01 22 and ending Apr 27 22
Date index | Thread index | Author index


Friday, 01 April

CVE-2022-26233: Barco Control Room Management Suite File Path Traversal Vulnerability Murat Aydemir

Thursday, 07 April

Multiple Vulnerabilities in Reprise License Manager 14.2 Gionathan Reale via Fulldisclosure
Backdoor.Win32.Wollf.h / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.Jokerdoor / Weak Hardcoded Credentials malvuln
Backdoor.Win32.Delf.ps / Information Disclosure malvuln
Backdoor.Win32.Wollf.h / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.Tiny.a / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.Easyserv.11.c / Insecure Transit malvuln
Backdoor.Win32.Bifrose.uw / Insecure Permissions malvuln
Backdoor.Win32.Wisell / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.Ptakks.XP.a / Insecure Credential Storage malvuln
Backdoor.Win32.Verify.h / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.FTP.Lana.01.d / Weak Hardcoded Credentials malvuln
Backdoor.Win32.FTP.Lana.01.d / Port Bounce Scan malvuln
Backdoor.Win32.Wisell / Stack Buffer Overflow (SEH) malvuln
Backdoor.Win32.Xingdoor / Denial of Service malvuln
Backdoor.Win32.XLog.21 / Authentication Bypass Race Condition malvuln

Thursday, 14 April

AST-2022-001: res_stir_shaken: resource exhaustion with large files Asterisk Security Team
AST-2022-002: res_stir_shaken: SSRF vulnerability with Identity header Asterisk Security Team
AST-2022-003: func_odbc: Possible SQL Injection Asterisk Security Team
SEC Consult SA-20220413 :: Missing Authentication at File Download & Denial of Service in Siemens A8000 PLC SEC Consult Vulnerability Lab, Research via Fulldisclosure
Backdoor.Win32.MotivFTP.12 / Authentication Bypass malvuln
Backdoor.Win32.Prorat.cwx / Insecure Permissions malvuln
Backdoor.Win32.Psychward.03.a / Weak Hardcoded Password malvuln
HackTool.Win32.IpcScan.c / Local Stack Buffer Overflow malvuln
Backdoor.Win32.NetCat32.10 / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.NetSpy.10 / Unauthenticated Remote Command Execution malvuln
Backdoor.Win32.NinjaSpy.c / Authentication Bypass malvuln
Backdoor.Win32.Kilo.016 / Denial of Service (UDP Datagram) malvuln
Email-Worm.Win32.Pluto.b / Insecure Permissions malvuln
Adversary3 v1.0 / Malware vulnerability intel tool for third-party attackers / updated malvuln

Monday, 18 April

HackTool.Win32.Delf.vs / Insecure Credential Storage malvuln
Backdoor.Win32.Loselove / Denial of Service malvuln
Trojan.Win32.TScash.c / Insecure Permissions malvuln
Backdoor.Win32.Hupigon.haqj / Insecure Service Path malvuln
Backdoor.Win32.Psychward.03.a / Weak Hardcoded Password malvuln
Backdoor.Win32.Delf.zn / Insecure Credential Storage malvuln
Backdoor.Win32.GateHell.21 / Authentication Bypass malvuln
Backdoor.Win32.GateHell.21 / Port Bounce Scan malvuln

Friday, 22 April

CVE-2021-40680: Artica Proxy VMWare Appliance 4.30.000000 <=[SP273] Rev.1 Heiko Feldhusen via Fulldisclosure
[AIT-SA-20220208-01] SexyPolling SQL Injection sec-advisory

Wednesday, 27 April

Trovent Security Advisory 2108-02 / Zepp: User account enumeration in password reset function Stefan Pietsch
SEC Consult SA-20220427-0 :: Privilege Escalation in Miele Benchmark Programming Tool SEC Consult Vulnerability Lab, Research via Fulldisclosure
Trojan-Banker.Win32.Banker.heq / Insecure Permissions malvuln
Backdoor.Win32.Jokerdoor / Remote Stack Buffer Overflow malvuln
Net-Worm.Win32.Kibuv.c / Authentication Bypass malvuln
Email-Worm.Win32.Sidex / Unauthenticated Remote Command Execution malvuln
Virus.Win32.Qvod.b / Insecure Permissions malvuln
Backdoor.Win32.GF.j / Unauthenticated Remote Command Execution malvuln
Trojan-Downloader.Win32.Small.ahlq / Insecure Permissions malvuln
Backdoor.Win32.Cafeini.b / Weak Hardcoded Credentials malvuln
Backdoor.Win32.Cafeini.b / Port Bounce Scan malvuln
Trojan-Downloader.Win32.Agent / Insecure Permissions malvuln
Backdoor.Win32.Agent.aegg / Weak Hardcoded Credentials malvuln