Trojan.Win32.Agentb.iofv Insecure Permissions
Trojan.Win32.Agentb.iofv malware suffers from an insecure permissions vulnerability.
View ArticleTrojan.Win32.NanoBot.onh Insecure Permissions
Trojan.Win32.NanoBot.onh malware suffers from an insecure permissions vulnerability.
View ArticleTrojan-Dropper.Win32.Agent.bjtzcp Insecure Permissions
Trojan-Dropper.Win32.Agent.bjtzcp malware suffers from an insecure permissions vulnerability.
View ArticleRed Hat Security Advisory 2021-1243-01
Red Hat Security Advisory 2021-1243-01 - Red Hat Directory Server is an LDAPv3-compliant directory server. The suite of packages includes the Lightweight Directory Access Protocol server, as well as...
View ArticleRed Hat Security Advisory 2021-1241-01
Red Hat Security Advisory 2021-1241-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include a code execution vulnerability.
View ArticleTrojan.Win32.Bayrob.dtrg Insecure Permissions
Trojan.Win32.Bayrob.dtrg malware suffers from an insecure permissions vulnerability.
View ArticleRed Hat Security Advisory 2021-1242-01
Red Hat Security Advisory 2021-1242-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include a code execution vulnerability.
View ArticleRed Hat Security Advisory 2021-1239-01
Red Hat Security Advisory 2021-1239-01 - The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space.
View ArticleWordPress Photo Gallery 1.5.69 Cross Site Scripting
WordPress Photo Gallery plugin versions 1.5.69 and below suffer from multiple reflective cross site scripting vulnerabilities.
View ArticleRed Hat Security Advisory 2021-1240-01
Red Hat Security Advisory 2021-1240-01 - MariaDB is a multi-user, multi-threaded SQL database server that is binary compatible with MySQL. Issues addressed include a code execution vulnerability.
View Articlexscreensaver Raw Socket Leak
xscreensaver suffers from a raw socket leak vulnerability. Proof of concept exploit demonstrates running tcpdump via this issue.
View ArticleFaraday 3.14.4
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the...
View ArticleOpenSSH 8.6p1
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs...
View ArticleNagios XI 5.7.3 Remote Code Execution
This Metasploit module exploits CVE-2020-5791, an OS command injection vulnerability on Nagios XI versions 5.6.0 through 5.7.3 in admin/mibs.php that enables an authenticated user with admin privileges...
View ArticleTrojan.Win32.Agent.hsm Insecure Permissions
Trojan.Win32.Agent.hsm malware suffers from an insecure permissions vulnerability.
View ArticleRed Hat Security Advisory 2021-1245-01
Red Hat Security Advisory 2021-1245-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle...
View ArticleRed Hat Security Advisory 2021-1246-01
Red Hat Security Advisory 2021-1246-01 - The gnutls packages provide the GNU Transport Layer Security library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle...
View ArticleRed Hat Security Advisory 2021-1258-01
Red Hat Security Advisory 2021-1258-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line...
View ArticlePlantronics HUB 3.21 Privilege Escalation
Plantronics HUB versions 3.21 and below are affected by a privilege escalation vulnerability allowing any local unprivileged user to acquire elevated access rights and take full control of the system.
View Article
More Pages to Explore .....