Subscribe via feed.
Archive for April, 2022

Backdoor.Win32.Cafeini.b Hardcoded Credential

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Cafeini.b malware suffers from a hardcoded credential vulnerability.

Backdoor.Win32.Cafeini.b Man-In-The-Middle

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Cafeini.b malware suffers from a man-in-the-middle vulnerability.

Backdoor.Win32.GF.j Remote Command Execution

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.GF.j malware suffers from a remote command execution vulnerability.

Trojan-Downloader.Win32.Agent Insecure Permissions

Posted by deepcore under exploit (No Respond)

Trojan-Downloader.Win32.Agent malware suffers from an insecure permissions vulnerability.

Backdoor.Win32.Agent.aegg Hardcoded Credential

Posted by deepcore under exploit (No Respond)

Backdoor.Win32.Agent.aegg malware suffers from a hardcoded credential vulnerability.

Miele Benchmark Programming Tool 1.1.49 / 1.2.71 Privilege Escalation

Posted by deepcore under exploit (No Respond)

Miele Benchmark Programming Tool versions 1.1.49 and 1.2.71 suffer from a privilege escalation vulnerability.

Zepp 6.1.4-play User Account Enumeration

Posted by deepcore under exploit (No Respond)

Zepp version 6.1.4-play suffers from a user account enumeration flaw in the password reset function.

Redis Lua Sandbox Escape

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The vulnerability was introduced by Debian and Ubuntu Redis packages that insufficiently sanitized the Lua environment. The maintainers failed to disable the package interface, allowing attackers to load arbitrary libraries. On a typical redis deployment (not docker), this module achieves execution as the redis user. […]

Redis Lua Sandbox Escape

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The vulnerability was introduced by Debian and Ubuntu Redis packages that insufficiently sanitized the Lua environment. The maintainers failed to disable the package interface, allowing attackers to load arbitrary libraries. On a typical redis deployment (not docker), this module achieves execution as the redis user. […]

http://www.ssk3.go.th/zz.html

Posted by deepcore under defacement (No Respond)

http://www.ssk3.go.th/zz.html notified by xNot_RespondinGx

Tags: