Posted by malvuln on Apr 07
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/2906b5dc5132dd1319827415e837168f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.XLog.21
Vulnerability: Authentication Bypass Race Condition
Description: The malware listens on TCP port 5553. Third-party attackers
who can reach the system before a password has been set can logon using
default credentials of…
More Stories
USN-7417-1: libdbd-mysql-perl vulnerabilities
It was discovered that libdbd-mysql-perl did not correctly handle certain SQL queries. An attacker could possibly use this issue to...
USN-7416-1: Kamailio vulnerabilities
Stelios Tsampas discovered that Kamailio did not correctly handle certain memory operations, which could lead to a buffer overflow. A...
podman-tui-1.5.0-1.fc42
FEDORA-2025-8a7d23116e Packages in this update: podman-tui-1.5.0-1.fc42 Update description: release 1.5.0 Read More
podman-tui-1.5.0-1.el10_1
FEDORA-EPEL-2025-6618927fc5 Packages in this update: podman-tui-1.5.0-1.el10_1 Update description: release 1.5.0 Read More
podman-tui-1.5.0-1.fc41
FEDORA-2025-f1d2ae375e Packages in this update: podman-tui-1.5.0-1.fc41 Update description: release 1.5.0 Read More
rust-below-0.9.0-1.el8
FEDORA-EPEL-2025-ae12e02519 Packages in this update: rust-below-0.9.0-1.el8 Update description: A privilege escalation vulnerability existed in the Below service prior to v0.9.0...