[FD] Backdoor.Win32.Prorat.ntz / Weak Hardcoded Password

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ab96d7f9e008a0774239be6be0c8e7bb_B.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.ntz Vulnerability: Weak Hardcoded Password Description: The malware runs an

[FD] Backdoor.Win32.Prorat.ntz / Port Bounce Scan

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ab96d7f9e008a0774239be6be0c8e7bb.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Prorat.ntz Vulnerability: Port Bounce Scan Description: The malware runs an FTP serv

[FD] Virus.Win32.Ipamor.c / Unauthenticated Remote System Reboot

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/b6bfdfe91c3e37865b6a269dc9ff9302.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Virus.Win32.Ipamor.c Vulnerability: Unauthenticated Remote System Reboot Description: The malware l

[FD] Backdoor.Win32.Antilam.14.o / Unauthenticated Remote Command Execution

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/2914f01e65d848655d4f1aac51ff04d1.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Antilam.14.o Vulnerability: Unauthenticated Remote Command Execution Description: Th

[FD] HEUR.Backdoor.Win32.Generic / Unauthenticated Open Proxy

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6a96fc226fbe9f0efbcc8a7b2e34b807.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: HEUR.Backdoor.Win32.Generic Vulnerability: Unauthenticated Open Proxy Description: The malware list

[FD] Backdoor.Win32.Mazben.es / Unauthenticated Open Proxy

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/fcd611ccbc756fab43761f4b18372b81.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Mazben.es Vulnerability: Unauthenticated Open Proxy Description: The malware listens

[FD] Backdoor.Win32.Hupigon.afjk / Authentication Bypass RCE

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/80b0fc8c0657c0ae7971f09af45c706b_C.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.afjk Vulnerability: Authentication Bypass RCE Description: The malware run

[FD] Backdoor.Win32.Hupigon.afjk / Port Bounce Scan

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/80b0fc8c0657c0ae7971f09af45c706b_B.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.afjk Vulnerability: Port Bounce Scan Description: The malware runs an FTP

[FD] Backdoor.Win32.Hupigon.afjk / Directory Traversal

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/80b0fc8c0657c0ae7971f09af45c706b.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.afjk Vulnerability: Directory Traversal Description: The malware deploys a W

[FD] Backdoor.Win32.Hupigon.acio / Unauthenticated Open Proxy

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/21f324a6a62d8125bc83b8d1865e17f9_B.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.acio Vulnerability: Unauthenticated Open Proxy Description: The malware li

[FD] Backdoor.Win32.Hupigon.acio / Insecure Service Path

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/21f324a6a62d8125bc83b8d1865e17f9.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.acio Vulnerability: Insecure Service Path Description: The malware creates a

[FD] Backdoor.Win32.Delf.arjo / Insecure Service Path

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/05177f77f075293ff7d58a7f2915c64f.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Delf.arjo Vulnerability: Insecure Service Path Description: The malware creates a se

[FD] Trojan.Win32.Akl.bc / Insecure Permissions

2021-10-29 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/0b2a0f61a209e24a7d7b2c2d5efb4d68.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Trojan.Win32.Akl.bc Vulnerability: Insecure Permissions Description: The malware creates an dir nam

[FD] Huge DOCSIS issue

2021-10-29 Thread Chris
I have tried about everything to get this looked at and nothing has worked. I am hoping you guys can go look at this and see if this is as bad as it looks. I am trying to be nice and trying to be a professional. Its not working. Every aspect of DOCSIS seems from 1990. The thread I link to we

[FD] SEC Consult SA-20211028-0 :: Denial of Service in CODESYS V2

2021-10-29 Thread Functional Account, SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory < 20211028-0 > === title: CODESYS V2 Denial of Service product: CODESYS Runtime Toolkit 32-bit, CODESYS PLCWinNT vulnerable version: https://www.codesys.com