Hudson (aka org.jvnet.hudson.main:hudson-core) before 3.3.2 allows XXE attacks.
Category Archives: Advisories
Re: AnyDesk Public Exploit Disclosure – Arbitrary file write by symbolic link attack lead to denial-of-service attack on local machine
Posted by chan chan on Jul 18
Hi FullDisclosure,
May I know if there is any update?
Please note that Mitre has assigned and reserved a CVE number
“CVE-2022-32450” for this vulnerability.
Regards,
Erwin
chan chan <siuchunc.03 () gmail com> 於 2022年6月22日週三 下午5:42寫道:
[CFP] 2nd International Workshop on Cyber Forensics and Threat Investigations Challenges CFTIC 2022 (Virtual)
Posted by Andrew Zayine on Jul 18
2nd International Workshop on Cyber Forensics and Threat
Investigations Challenges
October 10-11, 2022, Taking Place Virtually from the UK
https://easychair.org/cfp/CFTIC2022
Cyber forensics and threat investigations has rapidly emerged as a new
field of research to provide the key elements for maintaining
security, reliability, and trustworthiness of the next generation of
emerging technologies such as the internet of things, cyber-physical…
Builder XtremeRAT v3.7 / Insecure Crypto Bypass
Posted by malvuln on Jul 18
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/7f314e798c150aedd9ce41ed39318f65_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Builder XtremeRAT v3.7
Vulnerability: Insecure Crypto Bypass
Description: The malware builds backdoors and requires authentication to
access the GUI using credentials stored in the “user.info” config file.
XtremeRAT…
Builder XtremeRAT v3.7 / Insecure Permissions
Posted by malvuln on Jul 18
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/7f314e798c150aedd9ce41ed39318f65.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Builder XtremeRAT v3.7
Vulnerability: Insecure Permissions
Description: The malware builds and writes a PE file to c drive granting
change (C) permissions to the authenticated user group. Standard users can
rename the executable…
Backdoor.Win32.HoneyPot.a / Weak Hardcoded Password
Posted by malvuln on Jul 18
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/e3bb503f9b02cf57341695f30e31128f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.HoneyPot.a
Vulnerability: Weak Hardcoded Password
Description: The malware listens on various TCP ports of which one can be
port 21 when enabled. Authentication is required, however the credentials…
SCHUTZWERK-SA-2022-003: Remote Command Execution in Spryker Commerce OS
Posted by David Brown via Fulldisclosure on Jul 18
Title
=====
SCHUTZWERK-SA-2022-003: Remote Command Execution in Spryker Commerce OS
Status
======
PUBLISHED
Version
=======
1.0
CVE reference
=============
CVE-2022-28888
Link
====
https://www.schutzwerk.com/en/43/advisories/schutzwerk-sa-2022-003/
Text-only version:
https://www.schutzwerk.com/advisories/SCHUTZWERK-SA-2022-003.txt
Affected products/vendor
========================
Spryker Commerce OS by Spryker Systems GmbH, with…
moodle-3.11.8-1.fc36
FEDORA-2022-81ce74b2dd
Packages in this update:
moodle-3.11.8-1.fc36
Update description:
Multiple security fixes.
moodle-3.11.8-1.fc35
FEDORA-2022-7e7ce7df2e
Packages in this update:
moodle-3.11.8-1.fc35
Update description:
Multiple security fixes.
CVE-2016-15003
A vulnerability has been found in FileZilla Client 3.17.0.0 and classified as problematic. This vulnerability affects unknown code of the file C:Program FilesFileZilla FTP Clientuninstall.exe of the component Installer. The manipulation leads to unquoted search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.