Mail Index
Thread Index
[FD] SEC Consult SA-20210601-0 :: Multiple critical vulnerabilities in Korenix Technology JetNet Series
From
: SEC Consult Vulnerability Lab
[FD] Trovent Security Advisory 2104-01 / HealthForYou & Sanitas HealthCoach: User enumeration through API
From
: Stefan Pietsch
[FD] Trovent Security Advisory 2104-02 / HealthForYou & Sanitas HealthCoach: Account takeover with only email address possible
From
: Stefan Pietsch
[FD] Trojan.Win32.Scar.dulk / Insecure Permissions
From
: malvuln
[FD] Backdoor.Win32.NerTe.772 / Authentication Bypass RCE
From
: malvuln
[FD] Backdoor.Win32.NerTe.772 / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.Netbus.12 / Unauthenticated Information Disclosure
From
: malvuln
[FD] Backdoor.Win32.NetControl2.293 / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.Whirlpool.a / Remote Buffer Overflow - UDP Datagram
From
: malvuln
[FD] Backdoor.Win32.WinShell.a / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.Wisell / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.NetSpy.10 / Heap Corruption
From
: malvuln
[FD] Backdoor.Win32.Delf.acz / Remote Stack Buffer Overflow (SEH)
From
: malvuln
[FD] Backdoor.Win32.Androm.df / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.Neakse.bit / Insecure Permissions
From
: malvuln
[FD] Backdoor.Win32.Wollf.12 / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Trojan-Dropper.Win32.Googite.a / Unauthenticated Open Proxy
From
: malvuln
[FD] secuvera-SA-2021-01: Privilege Escalation in NetSetMan Pro 4.7.2
From
: Simon Bieber
[FD] Backdoor.Win32.Wuca.nz / Insecure Permissions
From
: malvuln
[FD] Backdoor.Win32.XRat.d / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.Zombam.gen / Cross Site Scripting (XSS)
From
: malvuln
[FD] Backdoor.Win32.Zombam.gen / Unauthenticated URL Command Injection
From
: malvuln
[FD] Backdoor.Win32.Zombam.gen / Remote Stack Buffer Overflow
From
: malvuln
[FD] popo:: linux kernel vulns of it.
From
: KJ Jung
[FD] Backdoor.Win32.Pazus.18 / Authentication Bypass RCE
From
: malvuln
[FD] Onapsis Security Advisory 2021-0005: SAP Solution Manager Open Redirect from Trace Analysis
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0006: [CVE-2020-26811] - SAP Hybris eCommerce - SSRF in acceleratorservices module
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0007: Exposure of Sensitive Information to an Unauthorized Actor
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0008: OS Command Injection in CA Introscope Enterprise Manager
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0009: Hard-coded Credentials in CA Introscope Enterprise Manager
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0010: File exfiltration and DoS in SolMan End-User Experience Monitoring
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0011 Missing authorization check in SolMan End-User Experience Monitoring
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0012: SAP Manufacturing Integration and Intelligence lack of server side validations leads to RCE
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0013: [CVE-2020-26829] - Missing Authentication Check In SAP NetWeaver AS JAVA P2P Cluster communication
From
: Onapsis Research via Fulldisclosure
[FD] Onapsis Security Advisory 2021-0014: Missing authorization check in SAP Solution Manager LM-SERVICE Component SP 11 PL 2
From
: Onapsis Research via Fulldisclosure
[FD] popo2, kernel/tun driver bufferoverflow.
From
: KJ Jung
[FD] Backdoor.Win32.VB.pld / Insecure Transit
From
: malvuln
[FD] Backdoor.Win32.VB.pld / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Backdoor.Win32.Zombam.gen / Information Disclosure
From
: malvuln
[FD] [SYSS-2021-007]: Protectimus SLIM NFC - External Control of System or Configuration Setting (CWE-15) (CVE-2021-32033)
From
: Matthias Deeg
Re: [FD] popo/popo2 linux kernel vulns
From
: RaziREKT via Fulldisclosure
Re: [FD] popo2, kernel/tun driver bufferoverflow.
From
: Robert Święcki
[FD] Email-Worm.Win32.Kipis.a / Unauthenticated Remote Code Execution
From
: malvuln
[FD] Trojan.Win32.Alien.erf / Remote Denial of Service
From
: malvuln
[FD] Trojan.Win32.Alien.erf / Remote Stack Buffer Overflow
From
: malvuln
[FD] Trovent Security Advisory 2105-01 / CVE-2021-32612: VeryFitPro unencrypted cleartext transmission of sensitive information
From
: Stefan Pietsch
[FD] Trojan.Win32.Alien.erf / Directory Traversal
From
: malvuln
[FD] Trojan-Dropper.Win32.Googite.b / Unauthenticated Remote Command Execution
From
: malvuln
[FD] SYSS-2021-032 Admin Columns WordPress Plug-In - Persistent Cross-Site Scripting
From
: Johannes Lauinger
[FD] Backdoor.Win32.Hupigon.aaio / Remote Stack Buffer Overflow
From
: malvuln
[FD] Using the Android USB Driver to Extract Data as USB Mass Storage Device
From
: Roman Fiedler
[FD] Backdoor.Win32.ReverseTrojan.200 / Authentication Bypass Empty Password
From
: malvuln
[FD] Trojan.Win32.SecondThought.ak / Insecure Permissions
From
: malvuln
[FD] Trojan.Win32.Banpak.kh / Insecure Permissions
From
: malvuln
[FD] Trojan-Dropper.Win32.Juntador.a / Weak Hardcoded Password
From
: malvuln
[FD] Trojan-Dropper.Win32.Krepper.a / Unauthenticated Remote Command Execution
From
: malvuln
[FD] Email-Worm.Win32.Trance.a / Insecure Permissions
From
: malvuln
[FD] Trojan-Dropper.Win32.Scrop.dyi / Insecure Permissions
From
: malvuln
[FD] Constructor.Win32.Bifrose.asc / Local Stack Buffer Overflow (Heap Corruption)
From
: malvuln
[FD] CVE-2021-35523: Local Privilege Escalation in Securepoint SSL VPN Client 2.0.30
From
: Florian Bogner via Fulldisclosure
Mail converted by
MHonArc