Posted by malvuln on Aug 08
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/857999d2306f257b80d1b8f6a51ae8b0.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Guptachar.20
Vulnerability: Insecure Credential Storage
Description: The malware runs a web server on TCP port 2015 (default) and
uses BASIC authentication. The credentials “hacker01:imchampgr8” get stored
in a…
More Stories
jupyterlab-4.4.0-1.fc43 python-notebook-7.4.0-1.fc43
FEDORA-2025-7472c8fb5c Packages in this update: jupyterlab-4.4.0-1.fc43 python-notebook-7.4.0-1.fc43 Update description: New jupyterlab and notebook Read More
Windows CLFS Driver Elevation of Privilege
What is the Vulnerability?A zero-day vulnerability has recently been identified in the Common Log File System (CLFS) kernel driver. CLFS...
USN-7432-1: libsoup vulnerabilities
It was discovered that libsoup could be made to read out of bounds. An attacker could possibly use this issue...
chromium-135.0.7049.84-1.fc40
FEDORA-2025-4ad8f5e805 Packages in this update: chromium-135.0.7049.84-1.fc40 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.el10_1
FEDORA-EPEL-2025-d2ac333cd9 Packages in this update: chromium-135.0.7049.84-1.el10_1 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.el9
FEDORA-EPEL-2025-6930d627d4 Packages in this update: chromium-135.0.7049.84-1.el9 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...