Category Archives: Advisories

Open-Xchange Security Advisory 2022-03-21

Read Time:22 Second

Posted by Martin Heiland via Fulldisclosure on Mar 21

Dear subscribers,

we’re sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those
vulnerabilities. Feel free to join our bug bounty programs for OX AppSuite, Dovecot and PowerDNS at HackerOne.

Yours sincerely,
Martin Heiland, Open-Xchange GmbH

Product: OX App Suite
Vendor: OX Software GmbH

Internal reference: OXUIB-1092
Vulnerability type: Cross-Site Scripting (CWE-80)
Vulnerable…

Read More

CVE-2020-24772

Read Time:19 Second

In Dreamacro 1.1.0, an attacker could embed a malicious iframe in a website with a crafted URL that would launch the Clash Windows client and force it to open a remote SMB share. Windows will perform NTLM authentication when opening the SMB share and that request can be relayed (using a tool like responder) for code execution (or captured for hash cracking).

Read More

xen-4.16.0-5.fc36

Read Time:10 Second

FEDORA-2022-cf87a9b146

Packages in this update:

xen-4.16.0-5.fc36

Update description:

fix build of xen.efi file and package it in /usr/lib/efi

Multiple speculative security issues [XSA-398]

Read More

[CFP-ESORICS 2022]: 27th European Symposium on Research in Computer Security (ESORICS) 2022

Read Time:16 Second

Posted by CFP – ESORICS 2022 on Mar 20

[Apologies for cross-posting]

————————————————————————–
C a l l F o r P a p e r s

27th European Symposium on Research in Computer Security (ESORICS) 2022
26-30 September 2022, Copenhagen, Denmark
URL: https://esorics2022.compute.dtu.dk/#
————————————————————————–

===================
CONFERENCE OUTLINE:
===================

We are looking…

Read More

BuilderRevengeRAT – (Revenge-RAT v0.3) / XML External Entity Injection

Read Time:21 Second

Posted by malvuln on Mar 20

Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/531d8b4ac8f7eb827d62424169321b2b.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: BuilderRevengeRAT – (Revenge-RAT v0.3)
Vulnerability: XML External Entity Injection
Description: The malware listens on TCP port 333. There is a Config.xml
file used by the RAT builder to specify port, notification, webcam etc. The
XML parser used…

Read More