Category Archives: Advisories

Stored XSS in “Menu Editor” – htmlyv2.9.9

Read Time:24 Second

Posted by Andrey Stoykov on Sep 18

# Exploit Title: Stored XSS in “Menu Editor” – htmlyv2.9.9
# Date: 9/2024
# Exploit Author: Andrey Stoykov
# Version: 2.9.9
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2024/09/friday-fun-pentest-series-10-stored-xss.html

Stored XSS #1:

Steps to Reproduce:

1. Login as admin
2. Browse to “Menu Editor”
3. In “Name” field add payload “><img src=x onerror=alert(1)>
4. In…

Read More

Backdoor.Win32.BlackAngel.13 / Unauthenticated Remote Command Execution

Read Time:20 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/d1523df44da5fd40df92602b8ded59c8.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.BlackAngel.13
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 1850. Third party
adversaries who can reach an infected host can issue commands made
available by the backdoor….

Read More

Backdoor.Win32.CCInvader.10 / Authentication Bypass

Read Time:20 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/cb86af8daa35f6977c80814ec6e40d63.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.CCInvader.10
Vulnerability: Authentication Bypass
Description: The malware runs an FTP server. Third-party adversarys
who can reach infected systems can logon using any username/password
combination. Intruders may then upload…

Read More

Backdoor.Win32.Delf.yj / Information Disclosure

Read Time:21 Second

Posted by malvuln on Sep 18

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/f991c25f1f601cc8d14dca4737415238.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: Backdoor.Win32.Delf.yj
Vulnerability: Information Disclosure
Description: The malware listens on TCP port 8080. Third-party
adversaries who can reach an infected system, can download screen
captures of a victims machine by making a simple…

Read More

USN-7022-1: Linux kernel vulnerabilities

Read Time:24 Second

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– GPU drivers;
– Modular ISDN driver;
– MMC subsystem;
– SCSI drivers;
– F2FS file system;
– GFS2 file system;
– Netfilter;
– RxRPC session sockets;
– Integrity Measurement Architecture(IMA) framework;
(CVE-2021-47188, CVE-2024-27012, CVE-2024-42228, CVE-2022-48791,
CVE-2024-39494, CVE-2022-48863, CVE-2024-26787, CVE-2024-42160,
CVE-2024-38570, CVE-2024-26677)

Read More

chromium-129.0.6668.58-1.fc39

Read Time:22 Second

FEDORA-2024-3d29b1647b

Packages in this update:

chromium-129.0.6668.58-1.fc39

Update description:

update to 129.0.6668.58

* High CVE-2024-8904: Type Confusion in V8
* Medium CVE-2024-8905: Inappropriate implementation in V8
* Medium CVE-2024-8906: Incorrect security UI in Downloads
* Medium CVE-2024-8907: Insufficient data validation in Omnibox
* Low CVE-2024-8908: Inappropriate implementation in Autofill
* Low CVE-2024-8909: Inappropriate implementation in UI

Read More

chromium-129.0.6668.58-1.el9

Read Time:22 Second

FEDORA-EPEL-2024-034e4b1091

Packages in this update:

chromium-129.0.6668.58-1.el9

Update description:

update to 129.0.6668.58

* High CVE-2024-8904: Type Confusion in V8
* Medium CVE-2024-8905: Inappropriate implementation in V8
* Medium CVE-2024-8906: Incorrect security UI in Downloads
* Medium CVE-2024-8907: Insufficient data validation in Omnibox
* Low CVE-2024-8908: Inappropriate implementation in Autofill
* Low CVE-2024-8909: Inappropriate implementation in UI

Read More

chromium-129.0.6668.58-1.fc40

Read Time:22 Second

FEDORA-2024-d273b23c67

Packages in this update:

chromium-129.0.6668.58-1.fc40

Update description:

update to 129.0.6668.58

* High CVE-2024-8904: Type Confusion in V8
* Medium CVE-2024-8905: Inappropriate implementation in V8
* Medium CVE-2024-8906: Incorrect security UI in Downloads
* Medium CVE-2024-8907: Insufficient data validation in Omnibox
* Low CVE-2024-8908: Inappropriate implementation in Autofill
* Low CVE-2024-8909: Inappropriate implementation in UI

Read More