[FD] Loki RAT (Relapse) / SQL Injection

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/aabb54951546132e70a8e9f02bf8b5ba_B.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Loki RAT (Relapse) Vulnerability: SQL Injection Description: The LokiRAT WebUI panel for LokiRAT_

[FD] Loki RAT (Relapse) / Directory Traversal - Arbitrary File Delete

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/aabb54951546132e70a8e9f02bf8b5ba.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Loki RAT (Relapse) Vulnerability: Directory Traversal - Arbitrary File Delete Description: The Lok

[FD] Backdoor.Win32.DirectConnection.103 (1.0 RAT-Tool) / Weak Hardcoded Password

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/6a6ce3e7f24bf000d9a011a8f1905da8.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.DirectConnection.103 (1.0 RAT-Tool) Vulnerability: Weak Hardcoded Password Descripti

[FD] Backdoor.Win32.RemoteNC.beta4 / Unauthenticated Remote Command Execution

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/2862de561d91eedb265df4ae9b0fc872.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.RemoteNC.beta4 Vulnerability: Unauthenticated Remote Command Execution Description:

[FD] Backdoor.Win32.BluanWeb / Unauthenticated Remote Command Execution

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/30903ccbc6747c0da5a2775884b78def_C.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.BluanWeb Vulnerability: Unauthenticated Remote Command Execution Description: The

[FD] Backdoor.Win32.BluanWeb / Information Disclosure

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/30903ccbc6747c0da5a2775884b78def_B.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.BluanWeb Vulnerability: Information Disclosure Description: The malware "BlueAngel

[FD] Backdoor.Win32.BluanWeb / Unauthenticated Remote Code Execution

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/30903ccbc6747c0da5a2775884b78def.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.BluanWeb Vulnerability: Unauthenticated Remote Code Execution Description: The malwa

[FD] Backdoor.Win32.FTP.Nuclear.10 / Hardcoded Credentials

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/9c23dad9ba11305fecf38bed46b0cec2.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.FTP.Nuclear.10 Vulnerability: Hardcoded Credentials Description: The malware builds

[FD] Backdoor.Win32.BNLite / Remote Stack Buffer Overflow

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/0d1f873f6816debd244e1e77509f6ba7.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.BNLite Vulnerability: Remote Stack Buffer Overflow Description: BioNet Lite Server 4

[FD] Backdoor.Win32.Augudor.a / Unauthenticated Remote File Write - RCE

2022-03-09 Thread malvuln
Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/bf1b1a2f4be78d6b62ed7c316c77a9a1.txt Contact: malvul...@gmail.com Media: twitter.com/malvuln Threat: Backdoor.Win32.Augudor.a Vulnerability: Unauthenticated Remote File Write - RCE Description: Augudo

[FD] New Release: UFONet v1.8 - "DarK-PhAnT0m!"...

2022-03-09 Thread psy
Hi Community, I am glad to present a new release of this tool: - https://ufonet.03c8.net - "UFONet is a free software, P2P and cryptographic -disruptive toolkit- that allows to perform DoS and DDoS attacks; on the Layer 7 (APP/HTTP) through the exploitation of Open Redirect vectors o

[FD] Mr. Post - Outlook Add-in - Data Theft Risk

2022-03-09 Thread Jonathan Gregson via Fulldisclosure
Mr. Post is an Outlook add-in used for inspecting emails for threats. Its tagline states "One click to visualize email. Unveil scam, phishing, ransom and BEC (Business Email Compromise)." The add-in is featured prominently in the Outlook Add-in store, including those on iOS and Android. It’s pos