Backdoor.Win32.Cafeini.b Hardcoded Credential
Backdoor.Win32.Cafeini.b malware suffers from a hardcoded credential vulnerability.
Backdoor.Win32.Cafeini.b malware suffers from a hardcoded credential vulnerability.
Backdoor.Win32.Cafeini.b malware suffers from a man-in-the-middle vulnerability.
Backdoor.Win32.GF.j malware suffers from a remote command execution vulnerability.
Trojan-Downloader.Win32.Agent malware suffers from an insecure permissions vulnerability.
Backdoor.Win32.Agent.aegg malware suffers from a hardcoded credential vulnerability.
Miele Benchmark Programming Tool versions 1.1.49 and 1.2.71 suffer from a privilege escalation vulnerability.
Zepp version 6.1.4-play suffers from a user account enumeration flaw in the password reset function.
This Metasploit module exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The vulnerability was introduced by Debian and Ubuntu Redis packages that insufficiently sanitized the Lua environment. The maintainers failed to disable the package interface, allowing attackers to load arbitrary libraries. On a typical redis deployment (not docker), this module achieves execution as the redis user. […]
This Metasploit module exploits CVE-2022-0543, a Lua-based Redis sandbox escape. The vulnerability was introduced by Debian and Ubuntu Redis packages that insufficiently sanitized the Lua environment. The maintainers failed to disable the package interface, allowing attackers to load arbitrary libraries. On a typical redis deployment (not docker), this module achieves execution as the redis user. […]
http://www.ssk3.go.th/zz.html notified by xNot_RespondinGx
Tags: defacement