Mail Thread Index
- [FD] Three vulnerabilities found in MikroTik's RouterOS,
Q C
- [FD] IoT/ICS Armageddon: hacking devices like there’s no tomorrow (part 1),
Red Timmy Security
- [FD] Backdoor.Win32.NerTe.781 / Authentication Bypass RCE,
malvuln
- [FD] Backdoor.Win32.NerTe.781 / Unauthenticated Remote Command Execution,
malvuln
- [FD] Trojan-Dropper.Win32.SVB.cz / Authentication Bypass RCE,
malvuln
- [FD] Trojan-Dropper.Win32.SVB.cz / Port Bounce Scan (MITM),
malvuln
- [FD] Trojan-Spy.Win32.Xspyout.a / Unauthenticated Open Proxy,
malvuln
- [FD] Trojan-Proxy.Win32.Ranky.ag / Unauthenticated Open Proxy,
malvuln
- [FD] Backdoor.Win32.Hupigon.aiss / Unauthenticated Open Proxy,
malvuln
- [FD] Backdoor.Win32.Hupigon.gsy / Unauthenticated Open Proxy,
malvuln
- [FD] Trojan.Win32.VB.bcng / Insecure Permissions,
malvuln
- [FD] Trojan-Dropper.Win32.Agent.wxl / Insecure Permissions,
malvuln
- [FD] HEUR.Trojan.Win32.Generic / Insecure Permissions,
malvuln
- [FD] Trojan.Win32.Inject.adwas / Insecure Permissions,
malvuln
- [FD] Backdoor.Win32.Zombam.l / Remote Stack Buffer Overflow,
malvuln
- [FD] Backdoor.Win32.Zombam.l / Unauthenticated URL Command Injection,
malvuln
- [FD] Backdoor.Win32.WinShell.40 / Authentication Bypass Command Execution,
malvuln
- [FD] Virus.Win32.Shodi.e / Insecure Transit,
malvuln
- [FD] Virus.Win32.Shodi.e / Unauthenticated Remote Command Execution,
malvuln
- [FD] Virus.Win32.Shodi.e / Heap Corruption,
malvuln
- [FD] Novus Managment System Vulnerabilities (CVE-2021-34820, CVE-2021-38421),
Dariusz G
- [FD] HEUR.Backdoor.Win32.Agent.gen / Insecure Permissions,
malvuln
- [FD] Backdoor.IRC.Ataka.a / Insecure Permissions,
malvuln
- [FD] Trojan-Proxy.Win32.Ranky.gen / Unauthenticated Open Proxy,
malvuln
- [FD] Backdoor.Win32.NerTe.a / Authentication Bypass RCE,
malvuln
- [FD] Backdoor.Win32.NerTe.a / Unauthenticated Remote Command Execution,
malvuln
- [FD] Trojan.Win32.RASFlooder.b / Hardcoded Plaintext Password,
malvuln
- [FD] Backdoor.Win32.Surila.j / Port Bounce Scan,
malvuln
- [FD] Backdoor.Win32.Surila.j / Authentication Bypass,
malvuln
- [FD] Backdoor.Win32.Surila.j / Remote Denial of Service,
malvuln
- [FD] VirTool.Win32.Afix / Local Stack Buffer Overflow,
malvuln
- [FD] SEC Consult SA-20210714-0 :: Critical vulnerabilities in Schneider Electric EVlink Charging Stations,
SEC Consult Vulnerability Lab
- [FD] Open-Xchange Security Advisory 2021-07-15,
Martin Heiland via Fulldisclosure
- [FD] New Release: UFONet v1.7 - "KRäK!eN"...,
psy
- [FD] VMware ThinApp DLL hijacking vulnerability,
houjingyi
- [FD] [KIS-2021-05] Concrete5 <= 8.5.5 (Logging Settings) Phar Deserialization Vulnerability,
Egidio Romano
- [FD] Open-Xchange Security Advisory 2021-07-19,
Martin Heiland via Fulldisclosure
- [FD] Multiple vulnerabilities in Dell OpenManage Enterprise,
Pierre Kim
- [FD] HEUR.Backdoor.Win32.Generic / Unauthenticated Open Proxy,
malvuln
- [FD] Backdoor.Win32.IRCBot.gen / Weak Hardcoded Password,
malvuln
- [FD] Backdoor.Win32.Agent.bjev / Insecure Permissions,
malvuln
- [FD] Trojan-Spy.Win32.SpyEyes.abdb / Insecure Permissions,
malvuln
- [FD] Trojan-Spy.Win32.SpyEyes.hqd / Insecure Permissions,
malvuln
- [FD] Backdoor.Win32.IRCBot.gen / Unauthenticated Remote Command Execution,
malvuln
- [FD] AST-2021-007: Remote Crash Vulnerability in PJSIP channel driver,
Asterisk Security Team
- [FD] AST-2021-008: Remote crash when using IAX2 channel driver,
Asterisk Security Team
- [FD] AST-2021-009: pjproject/pjsip: crash when SSL socket destroyed during handshake,
Asterisk Security Team
- [FD] CFP for Hardwear.io Netherlands 2021,
Andrea Simonca
- [FD] Cross-site Scripting vulnerability in Ampache 4.4.2,
Daniel Bishtawi via Fulldisclosure
- [FD] ipython3 may execute code from the current working directory,
Georgi Guninski
- [FD] APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7,
Apple Product Security via Fulldisclosure
- [FD] APPLE-SA-2021-07-21-2 macOS Big Sur 11.5,
Apple Product Security via Fulldisclosure
- [FD] APPLE-SA-2021-07-21-3 Security Update 2021-004 Catalina,
Apple Product Security via Fulldisclosure
- [FD] APPLE-SA-2021-07-21-4 Security Update 2021-005 Mojave,
Apple Product Security via Fulldisclosure
- [FD] APPLE-SA-2021-07-21-5 watchOS 7.6,
Apple Product Security via Fulldisclosure
- [FD] APPLE-SA-2021-07-21-6 tvOS 14.7,
Apple Product Security via Fulldisclosure
- [FD] APPLE-SA-2021-07-21-7 Safari 14.1.2,
Apple Product Security via Fulldisclosure
- [FD] Potential symlink attack in python3 __pycache__,
Georgi Guninski
- [FD] ATLASSIAN - CVE-2020-36239 - Jira Data Center and Jira Service Management Data Center,
Atlassian
- [FD] Backdoor.Win32.Hupigon.aaur / Unauthenticated Open Proxy,
malvuln
- [FD] Backdoor.Win32.Mazben.me / Unauthenticated Open Proxy,
malvuln
- [FD] Backdoor.Win32.Agent.cu / Authentication Bypass RCE,
malvuln
- [FD] Backdoor.Win32.Agent.cu / Port Bounce Scan (MITM),
malvuln
- [FD] Backdoor.Win32.Agent.cu / Unauthenticated Remote Command Execution,
malvuln
- [FD] Backdoor.Win32.PsyRat.b / Unauthenticated Remote Command Execution,
malvuln
- [FD] Backdoor.Win32.PsyRat.b / Remote Denial of Service,
malvuln
- [FD] Backdoor.Win32.Bifrose.acci / Local Stack Buffer Overflow,
malvuln
- [FD] Backdoor.Win32.Nbdd.bgz / Remote Stack Buffer Overflow,
malvuln
Mail converted by MHonArc