Quantcast
Channel: CISA All NCAS Products
Viewing all 2670 articles
Browse latest View live

NCSC Releases 2019 Annual Review

$
0
0
Original release date: October 24, 2019

The United Kingdom's (UK) National Cyber Security Centre (NCSC) has released its Annual Review for 2019, which reports their work and key accomplishments from September 1, 2018, to August 31, 2019. NCSC provides enhanced services to protect the UK against cybersecurity threats.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review NCSC’s 2019 Annual Review for more information.

 

This product is provided subject to this Notification and this Privacy & Use policy.


FBI Expands Election Security Resources

$
0
0
Original release date: October 24, 2019

The Federal Bureau of Investigation (FBI) has released additional election security resources as part of the Protected Voices initiative. Created in partnership with FBI, the Department of Homeland Security, and the Office of the Director of National Intelligence, Protected Voices is an effort to share resources, information, and tools to help mitigate the risk of cyber influence operations targeting U.S. elections.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages political campaigns and the American public to review FBI’s article on Protecting Every Voice, the Protected Voices suite of resources, and CISA’s Tip on Best Practices for Securing Elections Systems.

This product is provided subject to this Notification and this Privacy & Use policy.

Mozilla Releases Security Update for Thunderbird

$
0
0
Original release date: October 24, 2019

Mozilla has released a security update to address vulnerabilities in Thunderbird. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Mozilla Security Advisory for Thunderbird 68.2 and apply the necessary update.

This product is provided subject to this Notification and this Privacy & Use policy.

ACSC Releases Advisory on Emotet Malware Campaign

$
0
0
Original release date: October 25, 2019

The Australian Cyber Security Centre (ACSC) has released an advisory on an ongoing, widespread Emotet malware campaign. Emotet is a Trojan—commonly spread via malicious email attachments—that attempts to proliferate within a network by brute forcing user credentials and writing to shared drives. ACSC provides indicators of compromise (IOCs) and recommendations to help organizations defend against Emotet malware.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the ACSC advisory and CISA’s Alert on Emotet Malware for more information.

 
 

This product is provided subject to this Notification and this Privacy & Use policy.

Vulnerability Summary for the Week of October 21, 2019

$
0
0
Original release date: October 28, 2019

 

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
citrix -- application_delivery_controller_and_gateway
 
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway before 10.5 build 70.8, 11.x before 11.1 build 63.9, 12.0 before build 62.10, 12.1 before build 54.16, and 13.0 before build 41.28. An attacker with management-interface access can bypass authentication to obtain appliance administrative access. These products formerly used the NetScaler brand name.2019-10-217.5CVE-2019-18225
MISC
facebook -- whatsapp_for_android
 
A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service.2019-10-237.5CVE-2019-11933
CONFIRM
file -- file
 
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).2019-10-217.5CVE-2019-18218
MISC
MISC
MLIST
DEBIAN
fusionpbx -- fusionpbx
 
app/call_centers/cmd.php in the Call Center Queue Module in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated attackers (with at least the permission call_center_queue_add or call_center_queue_edit) to execute any commands on the host as www-data.2019-10-219CVE-2019-16964
MISC
MISC
fusionpbx -- fusionpbx
 
resources/cmd.php in FusionPBX up to 4.5.7 suffers from a command injection vulnerability due to a lack of input validation, which allows authenticated administrative attackers to execute any commands on the host as www-data.2019-10-219CVE-2019-16965
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\xml_cdr\xml_cdr_delete.php uses an unsanitized "rec" variable coming from the URL, which is base64 decoded and allows deletion of any file of the system.2019-10-218.5CVE-2019-16985
MISC
MISC
ibm -- db2_high_performance_unload
 
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 165481.2019-10-227.2CVE-2019-4523
XF
CONFIRM
libidn -- libidn2
 
idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.2019-10-217.5CVE-2019-18224
MISC
MISC
MISC
linux -- linux_kernelIn the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.2019-10-187.2CVE-2019-18198
MISC
MISC
MISC
MISC
UBUNTU
project_floodlight -- open_floodlight_sdn_controller_software
 
A vulnerability in version 0.90 of the Open Floodlight SDN controller software could allow an attacker with access to the OpenFlow control network to selectively disconnect individual switches from the SDN controller, causing degradation and eventually denial of network access to all devices connected to the targeted switch.2019-10-237.8CVE-2013-7333
MISC
slicer69 -- doas

 
An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. A setusercontext(3) call with flags to change the UID, primary GID, and secondary GIDs was replaced (on certain platforms: Linux and possibly NetBSD) with a single setuid(2) call. This resulted in neither changing the group id nor initializing secondary group ids.2019-10-189CVE-2019-15901
MISC
MISC
MISC
slicer69 -- doas
 
An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.2019-10-1810CVE-2019-15900
MISC
MISC
sonatype -- nexus_repository_manager
 
Sonatype Nexus Repository Manager 2.x before 2.14.15 and 3.x before 3.19, and IQ Server before 72, has remote code execution.2019-10-219CVE-2019-16530
MISC
CONFIRM
sourcecodester -- online_grading_system
 
Sourcecodester Online Grading System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the student, instructor, department, room, class, or user page (id or classid parameter).2019-10-237.5CVE-2019-18344
MISC
Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- experience_manager_forms
 
Adobe Experience Manager Forms versions 6.3-6.5 have a reflected cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-224.3CVE-2019-8089
CONFIRM
apache -- traffic_server
 
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.2019-10-225CVE-2019-10079
MISC
ether -- etherpad-lite
 
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.2019-10-194.3CVE-2019-18209
MISC
freepbx -- freepbx
 
An issue was discovered in Manager 13.x before 13.0.2.6 and 15.x before 15.0.6 before FreePBX 14.0.10.3. In the Manager module form (html\admin\modules\manager\views\form.php), an unsanitized managerdisplay variable coming from the URL is reflected in HTML, leading to XSS. It can be requested via GET request to /config.php?type=tool&display=manager.2019-10-214.3CVE-2019-16967
MISC
MISC
MISC
freepbx -- freepbx
 
An issue was discovered in Contactmanager 13.x before 13.0.45.3, 14.x before 14.0.5.12, and 15.x before 15.0.8.21 for FreePBX 14.0.10.3. In the Contactmanager class (html\admin\modules\contactmanager\Contactmanager.class.php), an unsanitized group variable coming from the URL is reflected in HTML on 2 occasions, leading to XSS. It can be requested via a GET request to /admin/ajax.php?module=contactmanager.2019-10-214.3CVE-2019-16966
MISC
MISC
MISC
fusionpbx -- fusionpbx

 
In FusionPBX up to v4.5.7, the file app\access_controls\access_control_nodes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16982
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\edit\filedelete.php uses an unsanitized "file" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16991
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\conferences_active\conference_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16989
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\basic_operator_panel\resources\content.php uses an unsanitized "eavesdrop_dest" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.2019-10-214.3CVE-2019-16988
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\contacts\contact_import.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16987
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\recordings\recording_play.php uses an unsanitized "filename" variable coming from the URL, which is base64 decoded and reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16984
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file resources\paging.php has a paging function (called by several pages of the interface), which uses an unsanitized "param" variable constructed partially from the URL args and reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16983
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app/music_on_hold/music_on_hold.php uses an unsanitized "file" variable coming from the URL, which takes any pathname (base64 encoded) and allows a download of it.2019-10-214CVE-2019-16990
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\conference_profiles\conference_profile_params.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.2019-10-214.3CVE-2019-16981
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-224.3CVE-2019-16973
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\devices\device_settings.php uses an unsanitized "id" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.2019-10-214.3CVE-2019-16978
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\contacts\contact_notes.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-234.3CVE-2019-16975
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\contacts\contact_times.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16974
MISC
MISC
fusionpbx -- fusionpbx
 
An issue was discovered in FusionPBX up to 4.5.7. In the file app\conference_controls\conference_control_details.php, an unsanitized id variable coming from the URL is reflected in HTML on 2 occasions, leading to XSS.2019-10-214.3CVE-2019-16968
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16969
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\sip_status\sip_status.php uses an unsanitized "savemsg" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16970
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.2019-10-224.3CVE-2019-16971
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\contacts\contact_urls.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-214.3CVE-2019-16979
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-224.3CVE-2019-16972
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file app\call_broadcast\call_broadcast_edit.php uses an unsanitized "id" variable coming from the URL in an unparameterized SQL query, leading to SQL injection.2019-10-216.5CVE-2019-16980
MISC
MISC
fusionpbx -- fusionpbx
 
In FusionPBX up to v4.5.7, the file resources\download.php uses an unsanitized "f" variable coming from the URL, which takes any pathname and allows a download of it. (resources\secure_download.php is also affected.)2019-10-214CVE-2019-16986
MISC
MISC
MISC
gnome -- libxslt
 
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.2019-10-186.8CVE-2019-18197
MISC
MISC
MISC
MISC
MLIST
UBUNTU
haproxy -- haproxy
 
A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).2019-10-234.3CVE-2019-18277
MISC
MISC
MISC
horner_automation -- cscape
 
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.2019-10-186.8CVE-2019-13541
MISC
MISC
horner_automation -- cscape
 
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.2019-10-186.8CVE-2019-13545
MISC
MISC
jenkins -- jenkins
 
Jenkins Sonar Gerrit Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.2019-10-234CVE-2019-10467
MLIST
CONFIRM
jenkins -- jenkins
 
An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.2019-10-235.5CVE-2019-10466
MLIST
CONFIRM
jenkins -- jenkins
 
A cross-site request forgery vulnerability in Jenkins Libvirt Slaves Plugin allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-10-236.8CVE-2019-10471
MLIST
CONFIRM
jenkins -- jenkins
 
A reflected cross-site scripting vulnerability in Jenkins build-metrics Plugin allows attackers to inject arbitrary HTML and JavaScript into web pages provided by this plugin.2019-10-234.3CVE-2019-10475
MLIST
CONFIRM
jenkins -- jenkins
 
A cross-site request forgery vulnerability in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-10-236.8CVE-2019-10468
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins Mattermost Notification Plugin 2.7.0 and earlier stored webhook URLs containing a secret token unencrypted in its global configuration file and job config.xml files on the Jenkins master where they could be viewed by users with Extended Read permission, or access to the master file system.2019-10-234CVE-2019-10459
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins Dynatrace Application Monitoring Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.2019-10-234CVE-2019-10463
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins Deploy WebLogic Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system.2019-10-234CVE-2019-10465
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-10-234CVE-2019-10469
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.2019-10-234CVE-2019-10470
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins Libvirt Slaves Plugin allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.2019-10-234CVE-2019-10472
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins Libvirt Slaves Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.2019-10-234CVE-2019-10473
MLIST
CONFIRM
jenkins -- jenkins
 
A missing permission check in Jenkins Global Post Script Plugin in allowed users with Overall/Read access to list the scripts available to the plugin stored on the Jenkins master file system.2019-10-234CVE-2019-10474
MLIST
CONFIRM
jenkins -- jenkins
 
A cross-site request forgery vulnerability in Jenkins Deploy WebLogic Plugin allows attackers to connect to an attacker-specified URL using attacker-specified credentials, or determine whether a file or directory with an attacker-specified path exists on the Jenkins master file system.2019-10-236.8CVE-2019-10464
MLIST
CONFIRM
jenkins -- jenkins
 
A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.2019-10-236.8CVE-2019-10462
MLIST
CONFIRM
libssh2_project -- libssh2
 
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.2019-10-215.8CVE-2019-17498
MISC
MISC
MISC
MISC
micro_focus -- self_service_password_reset
 
Man-in-the-middle vulnerability in Micro Focus Self Service Password Reset, affecting all versions prior to 4.4.0.4. The vulnerability could exploit invalid certificate validation and may result in a man-in-the-middle attack.2019-10-224.3CVE-2019-11674
MISC
mooltipass -- moolticute
 
Stephan Mooltipass Moolticute through 0.42.1 (and possibly earlier versions) has Incorrect Access Control.2019-10-224.3CVE-2019-12967
MISC
MISC
openemr_foundation -- openemr
 
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.2019-10-216.5CVE-2019-16404
MISC
openemr_foundation -- openemr
 
Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.2019-10-214.3CVE-2019-16862
MISC
MISC
openemr_foundation -- openemr
 
Reflected XSS exists in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 ia the id parameter.2019-10-214.3CVE-2019-17409
MISC
MISC
openwrt_project -- openwrt
 
OpenWRT firmware version 18.06.4 is vulnerable to CSRF via wireless/radio0.network1, wireless/radio1.network1, firewall, firewall/zones, firewall/forwards, firewall/rules, network/wan, network/wan6, or network/lan under /cgi-bin/luci/admin/network/.2019-10-186.8CVE-2019-17367
CONFIRM
proftpd_project -- proftpd
 
ProFTPD before 1.3.6b and 1.3.7rc before 1.3.7rc2 allows remote unauthenticated denial-of-service due to incorrect handling of overly long commands because main.c in a child process enters an infinite loop.2019-10-215CVE-2019-18217
MISC
MISC
MISC
MISC
MISC
MLIST
FEDORA
FEDORA
qt -- qtbase
 
An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters.2019-10-235CVE-2019-18281
MISC
MISC
MISC
ratpack -- ratpackAn issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.2019-10-185CVE-2019-17513
MISC
MISC
CONFIRM
CONFIRM
MISC
ricoh -- mp_501_printer
 
On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.2019-10-214.3CVE-2019-18203
MISC
rocket.chat -- rocket.chat
 
Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line.2019-10-214.3CVE-2019-17220
MISC
MISC
MISC
MISC
sitemagic_cms -- sitemagic_cms
 
Sitemagic CMS 4.4.1 is affected by a Cross-Site-Request-Forgery (CSRF) issue as it doesn't implement any method to validate incoming requests, allowing the execution of critical functionalities via spoofed requests. This behavior could be abused by a remote unauthenticated attacker to trick Sitemagic users into performing unwarranted actions.2019-10-236.8CVE-2019-18220
MISC
MISC
sitemagic_cms -- sitemagic_cms
 
Sitemagic CMS 4.4.1 is affected by a Cross-Site-Scripting (XSS) vulnerability, as it fails to validate user input. The affected components (index.php, upgrade.php) allow for JavaScript injection within both GET or POST requests, via a crafted URL or via the UpgradeMode POST parameter.2019-10-234.3CVE-2019-18219
MISC
MISC
sourcecodester -- online_grading_system
 
Sourcecodester Online Grading System 1.0 is affected by a Cross Site Request Forgery vulnerability due to a lack of CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code via a crafted HTML page, as demonstrated by a Create User action at the admin/modules/user/controller.php?action=add URI.2019-10-236.8CVE-2019-18280
MISC
tomedo -- tomedo_server
 
The Customer's Tomedo Server in Version 1.7.3 communicates to the Vendor Tomedo Server via HTTP (in cleartext) that can be sniffed by unauthorized actors. Basic authentication is used for the authentication, making it possible to base64 decode the sniffed credentials and discover the username and password.2019-10-185CVE-2019-17393
MISC
FULLDISC
trend_micro -- anti-threat_toolkitTrend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.2019-10-215.1CVE-2019-9491
MISC
FULLDISC
BUGTRAQ
MISC
uncoconv -- uncoconv
 
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.2019-10-215CVE-2019-17400
MISC
MISC
verodin -- director
 
An Information Disclosure issue in Verodin Director 3.5.3.1 and earlier reveals usernames and passwords of integrated security technologies via a /integrations.json JSON REST API request.2019-10-214CVE-2019-10716
MISC
MISC
MISC
video_converter_app_for_nextcloud -- video_converter_app_for_nextcloud
 
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)2019-10-196.8CVE-2019-18214
MISC
videolan -- vlc_media_player
 
When executing VideoLAN VLC media player 3.0.8 with libqt on Windows, Data from a Faulting Address controls Code Flow starting at libqt_plugin!vlc_entry_license__3_0_0f+0x00000000003b9aba.2019-10-234.6CVE-2019-18278
MISC
vmware -- harbor_container_registery_for_pcf
 
Harbor API has a Broken Access Control vulnerability. The vulnerability allows project administrators to use the Harbor API to create a robot account with unauthorized push and/or pull access permissions to a project they don't have access or control for. The Harbor API did not enforce the proper project permissions and project scope on the API request to create a new robot account.2019-10-185CVE-2019-16919
CONFIRM
MISC
MISC
wago -- pfc100_and_pfc200_series_devices
 
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.2019-10-195CVE-2019-18202
MISC
wordpress -- wordpressThe ad-inserter plugin before 1.5.3 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=ad-inserter.php.2019-10-226.8CVE-2015-9497
MISC
MISC
wordpress -- wordpressThe Auberge theme before 1.4.5 for WordPress has XSS via the genericons/example.html anchor identifier.2019-10-234.3CVE-2015-9502
MISC
wordpress -- wordpress
 
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.2019-10-226.5CVE-2015-9496
MISC
EXPLOIT-DB
wordpress -- wordpress
 
The my-wish-list plugin before 1.4.2 for WordPress has multiple XSS issues.2019-10-224.3CVE-2015-9493
CONFIRM
MISC
wordpress -- wordpress
 
The indieweb-post-kinds plugin before 1.3.1.1 for WordPress has XSS via the genericons/example.html anchor identifier.2019-10-224.3CVE-2015-9494
MISC
wordpress -- wordpress
 
The wps-hide-login plugin before 1.1 for WordPress has CSRF that affects saving an option value.2019-10-226.8CVE-2015-9498
CONFIRM
MISC
wordpress -- wordpress
 
The syndication-links plugin before 1.0.3 for WordPress has XSS via the genericons/example.html anchor identifier.2019-10-224.3CVE-2015-9495
CONFIRM
MISC
wordpress -- wordpress
 
The Exquisite Ultimate Newspaper theme 1.3.3 for WordPress has XSS via the anchor identifier to assets/js/jquery.foundation.plugins.js.2019-10-224.3CVE-2015-9500
MISC
wordpress -- wordpress
 
The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.2019-10-224.3CVE-2015-9501
CONFIRM
MISC
wordpress -- wordpress
 
The Modern theme before 1.4.2 for WordPress has XSS via the genericons/example.html anchor identifier.2019-10-234.3CVE-2015-9503
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Wish Lists extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9531
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Shoppette theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9535
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Twenty-Twelve theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9536
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Content Restriction extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9509
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) core component 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7 for WordPress has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9505
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Attach Accounts to Orders extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9507
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Commissions extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9508
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) CSV Manager extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9512
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Cross-sell Upsell extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9510
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Conditional Success Redirects extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9511
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Favorites extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9513
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Free Downloads extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9514
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) htaccess Editor extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9515
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Recurring Payments extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9525
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Reviews extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9526
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Simple Shipping extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9527
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Software Licensing extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9528
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Stripe extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9529
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Digital Store theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9532
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Lattice theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9533
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Quota theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9534
MISC
wordpress -- wordpress
 
The Easy Digital Downloads (EDD) Upload File extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-234.3CVE-2015-9530
MISC
Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
fritz -- fritz!os
 
Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.2019-10-222.1CVE-2017-8087
MISC
MISC
FULLDISC
jenkins -- jenkins
 
Jenkins Bitbucket OAuth Plugin 0.9 and earlier stored credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system.2019-10-232.1CVE-2019-10460
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins Dynatrace Application Monitoring Plugin 2.1.3 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.2019-10-232.1CVE-2019-10461
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins Zulip Plugin 1.1.0 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.2019-10-232.1CVE-2019-10476
MLIST
CONFIRM
loofah_gem_for_ruby_on_rails -- loofah_gem_for_ruby_on_rails
 
In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.2019-10-223.5CVE-2019-15587
CONFIRM
MISC
totemodata -- totemodata
 
totemodata 3.0.0_b936 has XSS via a folder name.2019-10-223.5CVE-2019-17189
MISC
MISC
MISC
verodin -- director
 
There is Stored XSS in Verodin Director 3.5.3.0 and earlier via input fields of certain tooltips, and on the Tags, Sequences, and Actors pages.2019-10-213.5CVE-2019-10715
MISC
MISC
wordpress -- wordpress
 
A reflected XSS vulnerability was found in includes/admin/table-printer.php in the broken-link-checker (aka Broken Link Checker) plugin 1.11.8 for WordPress. This allows unauthorized users to inject client-side JavaScript into an admin-only WordPress page via the wp-admin/tools.php?page=view-broken-links s_filter parameter in a search action.2019-10-183.5CVE-2019-17207
MISC
FULLDISC
MISC
MISC
Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
3s-smart_software_solutions -- codesys_eni_server3S-Smart CODESYS V2.3 ENI server V3.2.2.23 has a Buffer Overflow.2019-10-25not yet calculatedCVE-2019-16265
CONFIRM
MISC
abode -- creative_cloud_desktop_application
 
Creative Cloud Desktop Application version 4.6.1 and earlier versions have Security Bypass vulnerability. Successful exploitation could lead to Privilege Escalation in the context of the current user.2019-10-23not yet calculatedCVE-2019-8236
MISC
adobe -- acrobat_and_reader
 
Adobe Acrobat and Reader versions 2019.010.20100 and earlier; 2019.010.20099 and earlier versions; 2017.011.30140 and earlier version; 2017.011.30138 and earlier version; 2015.006.30495 and earlier versions; 2015.006.30493 and earlier versions have a Path Traversal vulnerability. Successful exploitation could lead to Information Disclosure in the context of the current user.2019-10-23not yet calculatedCVE-2019-8238
MISC
adobe -- acrobat_and_reader
 
Adobe Acrobat and Reader versions 2019.012.20034 and earlier; 2019.012.20035 and earlier versions; 2017.011.30142 and earlier versions; 2017.011.30143 and earlier versions; 2015.006.30497 and earlier versions; 2015.006.30498 and earlier versions have an Insufficiently Robust Encryption vulnerability. Successful exploitation could lead to Security feature bypass in the context of the current user.2019-10-23not yet calculatedCVE-2019-8237
MISC
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.2019-10-25not yet calculatedCVE-2019-8088
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a cross-site request forgery vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8234
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8087
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8084
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8085
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8082
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4 and 6.3 have a cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8083
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have an authentication bypass vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8081
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-24not yet calculatedCVE-2019-8078
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-24not yet calculatedCVE-2019-8079
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-25not yet calculatedCVE-2019-8086
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4 and 6.3 have a stored cross site scripting vulnerability. Successful exploitation could lead to privilege escalation.2019-10-24not yet calculatedCVE-2019-8080
CONFIRM
ant_design -- ant_design_proIn Ant Design Pro 4.0.0, reflected XSS in the user/login redirect GET parameter affects the authorization component, leading to execution of JavaScript code in the login after-action script.2019-10-23not yet calculatedCVE-2019-18350
MISC
apache -- poiIn Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.2019-10-23not yet calculatedCVE-2019-12415
MISC
avast -- antivirusAn issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0.2019-10-23not yet calculatedCVE-2019-17093
MISC
MISC
avstar -- pe204_ip_camera_devicesAn issue was discovered on AVStar PE204 3.10.70 IP camera devices. A denial of service can occur on open TCP port 23456. After a TELNET connection, no TCP ports are open.2019-10-23not yet calculatedCVE-2019-18382
MISC
clonos -- web_control_panelA cross-site scripting (XSS) vulnerability in index.php in ClonOS WEB control panel 19.09 allows remote attackers to inject arbitrary web script or HTML via the lang parameter.2019-10-24not yet calculatedCVE-2019-18419
MISC
clonos -- web_control_panelclonos.php in ClonOS WEB control panel 19.09 allows remote attackers to gain full access via change password requests because there is no session management.2019-10-24not yet calculatedCVE-2019-18418
MISC
cloud_foundry -- smb_volumeCloud Foundry SMB Volume, versions prior to v2.0.3, accidentally outputs sensitive information to the logs. A remote user with access to the SMB Volume logs can discover the username and password for volumes that have been recently created, allowing the user to take control of the SMB Volume.2019-10-23not yet calculatedCVE-2019-11283
CONFIRM
cloud_foundry -- uaaCloud Foundry UAA, versions prior to v74.3.0, contains an endpoint that is vulnerable to SCIM injection attack. A remote authenticated malicious user with scim.invite scope can craft a request with malicious content which can leak information about users of the UAA.2019-10-23not yet calculatedCVE-2019-11282
CONFIRM
corehr -- core_portalCoreHR Core Portal before 27.0.7 allows stored XSS.2019-10-25not yet calculatedCVE-2019-18221
MISC
MISC
craft_cms -- craft_cmsIn Craft CMS through 3.1.7, the elevated session password prompt was not being rate limited like normal login forms, leading to the possibility of a brute force attempt on them.2019-10-24not yet calculatedCVE-2019-15929
MISC
d-link -- dir-865l_wireless_routersD-Link DIR-865L has Information Disclosure.2019-10-25not yet calculatedCVE-2013-4856
MISC
MISC
MISC
d-link -- dir-865l_wireless_routersD-Link DIR-865L has SMB Symlink Traversal due to misconfiguration in the SMB service allowing symbolic links to be created to locations outside of the Samba share.2019-10-25not yet calculatedCVE-2013-4855
MISC
MISC
MISC
d-link -- dir-865l_wireless_routersD-Link DIR-865L has PHP File Inclusion in the router xml file.2019-10-25not yet calculatedCVE-2013-4857
MISC
MISC
darktrace -- enterprise_immune_system

 
Darktrace Enterprise Immune System before 3.1 allows CSRF via the /config endpoint.2019-10-23not yet calculatedCVE-2019-9597
MISC
MISC
BUGTRAQ
MISC
darktrace -- enterprise_immune_system
 
Darktrace Enterprise Immune System before 3.1 allows CSRF via the /whitelisteddomains endpoint.2019-10-23not yet calculatedCVE-2019-9596
MISC
MISC
BUGTRAQ
MISC
forcepoint -- one_endpoint
 
This vulnerability allows a normal (non-admin) user to disable the Forcepoint One Endpoint (versions 19.04 through 19.08) and bypass DLP and Web protection.2019-10-23not yet calculatedCVE-2019-6144
MISC
fortinet -- forticlient_for_windows
 
A malicious DLL preload vulnerability in Fortinet FortiClient for Windows 6.2.0 and below allows a privileged attacker to perform arbitrary code execution via forging that DLL.2019-10-24not yet calculatedCVE-2019-6692
MISC
fortinet -- fortiosAn Insufficient Entropy in PRNG vulnerability in Fortinet FortiOS 6.2.1 and below for device not enable hardware TRNG token and models not support builtin TRNG seed allows attacker to theoretically recover the long term ECDSA secret in a TLS client with a RSA handshake and mutual ECDSA authentication via the help of flush+reload side channel attacks in FortiGate VM models only.2019-10-24not yet calculatedCVE-2019-15703
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9276.2019-10-25not yet calculatedCVE-2019-17145
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Javascript in the HTML2PDF plugin. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8692.2019-10-25not yet calculatedCVE-2019-17139
MISC
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Keystroke action of a listbox field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9081.2019-10-25not yet calculatedCVE-2019-17142
MISC
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Calculate action of a text field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9044.2019-10-25not yet calculatedCVE-2019-17141
MISC
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the OnFocus event. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9091.2019-10-25not yet calculatedCVE-2019-17140
MISC
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9273.2019-10-25not yet calculatedCVE-2019-17143
MISC
foxit_software -- phantompdfThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DWG files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9274.2019-10-25not yet calculatedCVE-2019-17144
MISC
foxit_software -- photo_studioThis vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion from JPEG to EPS. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8809.2019-10-25not yet calculatedCVE-2019-17138
MISC
MISC
fujitsu -- wireless_keyboard_set_lx390_gk381_devicesAn issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, an attacker is able to eavesdrop on sensitive data such as passwords.2019-10-24not yet calculatedCVE-2019-18201
MISC
MISC
MISC
fujitsu -- wireless_keyboard_set_lx390_gk381_devicesAn issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, they are prone to keystroke injection attacks.2019-10-24not yet calculatedCVE-2019-18200
MISC
MISC
MISC
fujitsu -- wireless_keyboard_set_lx390_gk381_devicesAn issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, and because of password-based authentication, they are vulnerable to replay attacks.2019-10-24not yet calculatedCVE-2019-18199
MISC
MISC
MISC
fusionpbx -- fusionpbxIn FusionPBX up to 4.5.7, the file app\destinations\destination_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected on 2 occasions in HTML, leading to XSS.2019-10-23not yet calculatedCVE-2019-16976
MISC
MISC
fusionpbx -- fusionpbxIn FusionPBX up to 4.5.7, the file app\extensions\extension_imports.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.2019-10-23not yet calculatedCVE-2019-16977
MISC
MISC
gnu_project -- gccInteger overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.2019-10-23not yet calculatedCVE-2002-2439
MISC
MISC
CONFIRM
MISC
golang -- goGo before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.2019-10-24not yet calculatedCVE-2019-17596
CONFIRM
CONFIRM
DEBIAN
google -- chromebrowser/extensions/api/dial/dial_registry.cc in Google Chrome before 54.0.2840.98 on macOS, before 54.0.2840.99 on Windows, and before 54.0.2840.100 on Linux neglects to copy a device ID before an erase() call, which causes the erase operation to access data that that erase operation will destroy.2019-10-25not yet calculatedCVE-2016-5202
MISC
MISC
MISC
MISC
MISC
honeywell -- ip-ak2_access_control_panelIn IP-AK2 Access Control Panel Version 1.04.07 and prior, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data, which can be accessed without authentication over the network.2019-10-25not yet calculatedCVE-2019-13525
MISC
horde -- groupware_webmail_editionHorde Groupware Webmail Edition through 5.2.22 allows XSS via an admin/user.php?form=update_f&user_name= or admin/user.php?form=remove_f&user_name= or admin/config/diff.php?app= URI, related to the Tag Cloud feature.2019-10-24not yet calculatedCVE-2019-12094
MISC
MISC
MISC
MISC
MISC
MISC
horde -- groupware_webmail_editionHorde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server.2019-10-24not yet calculatedCVE-2019-12095
MISC
MISC
MISC
MISC
MISC
MISC
MISC
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 contain APIs that could be used by a local user to send email. IBM X-Force ID: 162232.2019-10-25not yet calculatedCVE-2019-4394
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a local user to obtain sensitive information from temporary script files. IBM X-Force ID: 162333.2019-10-25not yet calculatedCVE-2019-4395
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 162260.2019-10-25not yet calculatedCVE-2019-4399
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162261.2019-10-25not yet calculatedCVE-2019-4400
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP response splitting attacks, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject arbitrary HTTP headers and cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning or cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 162236.2019-10-25not yet calculatedCVE-2019-4396
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP Response Splitting caused by improper caching of content. This would allow the attacker to perform further attacks, such as Web Cache poisoning, cross-site scripting and possibly obtain sensitive information. IBM X-Force ID: 163682.2019-10-25not yet calculatedCVE-2019-4461
XF
CONFIRM
ibm -- cloud_orchestrator_and_cloud_orchestrator_enterprise

 
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 could allow a local user to obtain sensitive information from SessionManagement cookies. IBM X-Force ID: 162259.2019-10-24not yet calculatedCVE-2019-4398
XF
CONFIRM
ibm -- cloud_orchestrator_and_cloud_orchestrator_enterprise
 
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 1622392019-10-24not yet calculatedCVE-2019-4397
XF
CONFIRM
ibm -- cloud_orchestrator_and_cloud_orchestrator_enterprise
 
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163656.2019-10-24not yet calculatedCVE-2019-4459
XF
CONFIRM
ibm -- maximo_asset_management
 
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 164070.2019-10-24not yet calculatedCVE-2019-4486
XF
CONFIRM
ibm -- security_access_manager_appliance
 
IBM Security Access Manager Appliance could allow unauthenticated attacker to cause a denial of service in the reverse proxy component. IBM X-Force ID: 156159.2019-10-25not yet calculatedCVE-2019-4036
XF
CONFIRM
ignite_realtime -- openfirePluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability.2019-10-24not yet calculatedCVE-2019-18393
MISC
ignite_realtime -- openfireA Server Side Request Forgery (SSRF) vulnerability in FaviconServlet.java in Ignite Realtime Openfire through 4.4.2 allows attackers to send arbitrary HTTP GET requests.2019-10-24not yet calculatedCVE-2019-18394
MISC
labf -- nfsaxe_ftp_clientBuffer overflow in LabF nfsAxe FTP client 3.7 allows an attacker to execute code remotely.2019-10-25not yet calculatedCVE-2017-14742
EXPLOIT-DB
libarchive -- libarchivearchive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.2019-10-24not yet calculatedCVE-2019-18408
MISC
MISC
MISC
MLIST
libidn -- libidn2GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.2019-10-22not yet calculatedCVE-2019-12290
MISC
CONFIRM
MISC
linksys -- ea6500_wireless_routersLinksys EA6500 has SMB Symlink Traversal allowing symbolic links to be created to locations outside of the Samba share.2019-10-25not yet calculatedCVE-2013-4658
MISC
MISC
MISC
mapr -- cldbA remote code execution vulnerability exists in MapR CLDB code, specifically in the JSON framework that is used in the CLDB code that handles login and ticket issuance. An attacker can use the 'class' property of the JSON request sent to the CLDB to influence the JSON library's decision on which Java class this JSON request is deserialized to. By doing so, the attacker can force the MapR CLDB to construct a URLClassLoader which loads a malicious Java class from a remote path and instantiate this object in the MapR CLDB, thus executing arbitrary code on the machine running the MapR CLDB and take over the cluster. By switching to the newer Jackson library and ensuring that all incoming JSON requests are only deserialized to the same class that it was serialized from, the vulnerability is fixed. This vulnerability affects the entire MapR core platform.2019-10-24not yet calculatedCVE-2019-12017
MISC
milesight -- ip_security_camerasMilesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password.2019-10-25not yet calculatedCVE-2016-2356
MISC
MISC
MISC
milesight -- ip_security_camerasMilesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.2019-10-25not yet calculatedCVE-2016-2359
MISC
MISC
MISC
milesight -- ip_security_camerasMilesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.2019-10-25not yet calculatedCVE-2016-2358
MISC
MISC
MISC
milesight -- ip_security_camerasMilesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory.2019-10-25not yet calculatedCVE-2016-2357
MISC
MISC
MISC
milesight -- ip_security_camerasMilesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.2019-10-25not yet calculatedCVE-2016-2360
MISC
MISC
MISC
mp3gain_project -- mp3gainA buffer over-read was discovered in ReadMP3APETag in apetag.c in MP3Gain 1.6.2. The vulnerability causes an application crash, which leads to remote denial of service.2019-10-23not yet calculatedCVE-2019-18359
MISC
netapp -- clustered_data_ontap
 
Clustered Data ONTAP versions 9.2 through 9.6 are susceptible to a vulnerability which allows an attacker to use l2ping to cause a Denial of Service (DoS).2019-10-25not yet calculatedCVE-2019-5508
MISC
nipper-ng -- nipper-ngA stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve Remote Code Execution or Denial Of Service via a crafted file.2019-10-22not yet calculatedCVE-2019-17424
MISC
MISC
MISC
MISC
node.js -- node.jsThe Post editor functionality in the hexo-admin plugin versions 2.3.0 and earlier for Node.js is vulnerable to stored XSS via the content of a post.2019-10-23not yet calculatedCVE-2019-17606
MISC
MISC
MISC
CONFIRM
philips -- intellispace_perinatalIn IntelliSpace Perinatal, Versions K and prior, a vulnerability within the IntelliSpace Perinatal application environment could enable an unauthorized attacker with physical access to a locked application screen, or an authorized remote desktop session host application user to break-out from the containment of the application and access unauthorized resources from the Windows operating system as the limited-access Windows user. Due to potential Windows vulnerabilities, it may be possible for additional attack methods to be used to escalate privileges on the operating system.2019-10-25not yet calculatedCVE-2019-13546
MISC

project_floodlight -- open_floodlight_sdn_controller_software

A vulnerability in version 0.90 of the Open Floodlight SDN controller software could result in a denial of service attack and crashing of the controller service. This effect is the result of a flaw in OpenFlow protocol processing, where specific malformed and mistimed FEATURES_REPLY messages cause the controller service to not delete switch and port data from its internal tracking structures.2019-10-23not yet calculatedCVE-2014-2304
MISC
python -- pythonAn issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)2019-10-23not yet calculatedCVE-2019-18348
MISC
MISC
repetier-server -- repetier-serverRepetierServer.exe in Repetier-Server 0.8 through 0.91 does not properly validate the XML data structure provided when uploading a new printer configuration. When this is combined with CVE-2019-14450, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.2019-10-25not yet calculatedCVE-2019-14451
CONFIRM
MISC
rittal -- rittal_chiller_sk_3232-seriesRittal Chiller SK 3232-Series web interface as built upon Carel pCOWeb firmware A1.5.3 ? B1.2.4. The authentication mechanism on affected systems is configured using hard-coded credentials. These credentials could allow attackers to influence the primary operations of the affected systems, namely turning the cooling unit on and off and setting the temperature set point.2019-10-25not yet calculatedCVE-2019-13553
MISC
rittal -- rittal_chiller_sk_3232-seriesRittal Chiller SK 3232-Series web interface as built upon Carel pCOWeb firmware A1.5.3 ? B1.2.4. The authentication mechanism on affected systems does not provide a sufficient level of protection against unauthorized configuration changes. Primary operations, namely turning the cooling unit on and off and setting the temperature set point, can be modified without authentication.2019-10-25not yet calculatedCVE-2019-13549
MISC
ruby_parser-legacy_gem_for_ruby_on_rails -- ruby_parser-legacy_gem_for_ruby_on_railsThe ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file.2019-10-24not yet calculatedCVE-2019-18409
MISC
sangoma -- session_border_controllerThe Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin web portal without providing any credentials. This affects /var/webconfig/gui/Webconfig.inc.php.2019-10-22not yet calculatedCVE-2019-12148
MISC
FULLDISC
sangoma -- session_border_controllerThe Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the system (either via the web interface or via SSH) to achieve complete compromise of the device. This affects /var/webconfig/gui/Webconfig.inc.php and /usr/local/sng/bin/sng-user-mgmt.2019-10-22not yet calculatedCVE-2019-12147
MISC
FULLDISC
MISC
schlix -- schlix_cmsadmin/app/mediamanager in Schlix CMS 2.1.8-7 allows Authenticated Unrestricted File Upload, leading to remote code execution.2019-10-24not yet calculatedCVE-2019-11021
MISC
MISC
sourcecodester -- restaurant_management_systemSourcecodester Restaurant Management System 1.0 allows XSS via the "send a message" screen.2019-10-24not yet calculatedCVE-2019-18415
MISC
sourcecodester -- restaurant_management_systemSourcecodester Restaurant Management System 1.0 allows an authenticated attacker to upload arbitrary files that can result in code execution. The issue occurs because the application fails to adequately sanitize user-supplied input, e.g., "add a new food" allows .php files.2019-10-24not yet calculatedCVE-2019-18417
MISC
sourcecodester -- restaurant_management_systemSourcecodester Restaurant Management System 1.0 allows XSS via the Last Name field of a member.2019-10-24not yet calculatedCVE-2019-18416
MISC
sourcecodester -- restaurant_management_systemSourcecodester Restaurant Management System 1.0 is affected by an admin/staff-exec.php Cross Site Request Forgery vulnerability due to a lack of CSRF protection. This could lead to an attacker tricking the administrator into executing arbitrary code or adding a staff entry via a crafted HTML page.2019-10-24not yet calculatedCVE-2019-18414
MISC
sourcecodester -- hotel_and_lodge_management_systemSourcecodester Hotel and Lodge Management System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the id parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.2019-10-23not yet calculatedCVE-2019-18387
MISC
symantec -- symantec_messaging_gatewaySymantec Messaging Gateway (prior to 10.7.0), may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.2019-10-24not yet calculatedCVE-2019-9699
CONFIRM
teamviewer -- teamviewerA DLL side loading vulnerability in the Windows Service in TeamViewer versions up to 11.0.133222 (fixed in 11.0.214397), 12.0.181268 (fixed in 12.0.214399), 13.2.36215 (fixed in 13.2.36216), and 14.6.4835 (fixed in 14.7.1965) on Windows could allow an attacker to perform code execution on a target system via a service restart where the DLL was previously installed with administrative privileges. Exploitation requires that an attacker be able to create a new file in the TeamViewer application directory; directory permissions restrict that by default.2019-10-24not yet calculatedCVE-2019-18196
CONFIRM
tenable -- nessusNessus versions 8.6.0 and earlier were found to contain a Denial of Service vulnerability due to improper validation of specific imported scan types. An authenticated, remote attacker could potentially exploit this vulnerability to cause a Nessus scanner to become temporarily unresponsive.2019-10-23not yet calculatedCVE-2019-3982
MISC
terramaster -- fs-210_devicesAn issue was discovered on TerraMaster FS-210 4.0.19 devices. An unauthenticated attacker can download log files via the include/makecvs.php?Event= substring.2019-10-23not yet calculatedCVE-2019-18385
MISC
terramaster -- fs-210_devicesAn issue was discovered on TerraMaster FS-210 4.0.19 devices. One can download backup files remotely from terramaster_TNAS-00E43A_config_backup.bin without permission.2019-10-23not yet calculatedCVE-2019-18383
MISC
terramaster -- fs-210_devicesAn issue was discovered on TerraMaster FS-210 4.0.19 devices. An authenticated remote non-administrative user can read unauthorized shared files, as demonstrated by the filename=*public*%25252Fadmin_OnlyRead.txt substring.2019-10-23not yet calculatedCVE-2019-18384
MISC
thycotic -- secret_serverAn XSS issue was discovered in Thycotic Secret Server before 10.7 (issue 1 of 2).2019-10-23not yet calculatedCVE-2019-18356
MISC
thycotic -- secret_serverAn SSRF issue was discovered in the legacy Web launcher in Thycotic Secret Server before 10.7.2019-10-23not yet calculatedCVE-2019-18355
MISC
thycotic -- secret_serverAn XSS issue was discovered in Thycotic Secret Server before 10.7 (issue 2 of 2).2019-10-23not yet calculatedCVE-2019-18357
MISC
tonyy -- dormsystemtonyy dormsystem through 1.3 allows DOM XSS.2019-10-24not yet calculatedCVE-2019-17581
MISC
MISC
tp-link -- m7350_devicesTP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow triggerPort OS Command Injection (issue 5 of 5).2019-10-24not yet calculatedCVE-2019-13653
MISC
tp-link -- m7350_devicesTP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow serviceName OS Command Injection (issue 4 of 5).2019-10-24not yet calculatedCVE-2019-13652
MISC
tp-link -- m7350_devicesTP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow internalPort OS Command Injection (issue 2 of 5).2019-10-24not yet calculatedCVE-2019-13650
MISC
tp-link -- m7350_devicesTP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow externalPort OS Command Injection (issue 1 of 5).2019-10-24not yet calculatedCVE-2019-13649
MISC
tp-link -- m7350_devicesTP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow portMappingProtocol OS Command Injection (issue 3 of 5).2019-10-24not yet calculatedCVE-2019-13651
MISC
MISC
tp-link -- tl-wdr4300_wireless_routersTP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities.2019-10-25not yet calculatedCVE-2013-4848
MISC
MISC
MISC
MISC
MISC
typestack -- class-validatorIn TypeStack class-validator 0.10.2, validate() input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional forbidUnknownValues parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input. NOTE: a software maintainer agrees with the "is not documented" finding but suggests that much of the responsibility for the risk lies in a different product.2019-10-24not yet calculatedCVE-2019-18413
MISC
wacom -- update_helper_driver

 
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the start/stopLaunchDProcess command. The command takes a user-supplied string argument and executes launchctl under root context. A user with local access can use this vulnerability to raise load arbitrary launchD agents. An attacker would need local access to the machine for a successful exploit.2019-10-24not yet calculatedCVE-2019-5013
MISC
wacom -- update_helper_driver
 
An exploitable privilege escalation vulnerability exists in the Wacom, driver version 6.3.32-3, update helper service in the startProcess command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit.2019-10-24not yet calculatedCVE-2019-5012
MISC
wordpress -- wordpressThe Showbiz Pro plugin through 1.7.1 for WordPress has PHP code execution by uploading a .php file within a ZIP archive.2019-10-22not yet calculatedCVE-2015-9499
MISC
MISC
EXPLOIT-DB
wordpress -- wordpressThe Easy Digital Downloads (EDD) Recommended Products extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9523
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) QR Code extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9522
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9506
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Invoices extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9516
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Manual Purchases extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9517
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Per Product Emails extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9520
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) PDF Stamper extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9519
MISC
wordpress -- wordpressThe weeklynews theme before 2.2.9 for WordPress has XSS via the s parameter.2019-10-23not yet calculatedCVE-2015-9504
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Pushover Notifications extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9521
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) Recount Earnings extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9524
MISC
wordpress -- wordpressThe Easy Digital Downloads (EDD) PDF Invoices extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.2019-10-23not yet calculatedCVE-2015-9518
MISC
wustl -- xnatWUSTL XNAT 1.7.5.3 allows XXE attacks via a POST request body.2019-10-23not yet calculatedCVE-2019-14276
MISC
MISC
MISC
xiaomi -- mi_wifi_r3g_devicesAn issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The backup file is in tar.gz format. After uploading, the application uses the tar zxf command to decompress, so one can control the contents of the files in the decompressed directory. In addition, the application's sh script for testing upload and download speeds reads a URL list from /tmp/speedtest_urls.xml, and there is a command injection vulnerability, as demonstrated by api/xqnetdetect/netspeed.2019-10-23not yet calculatedCVE-2019-18370
MISC
xiaomi -- mi_wifi_r3g_devicesAn issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.2019-10-23not yet calculatedCVE-2019-18371
MISC
xml_language_server -- xml_language_serverXMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.2019-10-23not yet calculatedCVE-2019-18212
MISC
CONFIRM
MISC
MISC
MISC
MISC
xml_language_server -- xml_language_server
 
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response capture for password cracking). This occurs in extensions/contentmodel/participants/diagnostics/LSPXMLParserConfiguration.java.2019-10-23not yet calculatedCVE-2019-18213
MISC
CONFIRM
MISC
MISC
MISC
MISC
youphptube -- youphptubeSQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter name in /objects/pluginSwitch.json.php.2019-10-25not yet calculatedCVE-2019-5122
MISC
youphptube -- youphptube
 
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getSpiritsFromVideo.php is vulnerable to a command injection attack.2019-10-25not yet calculatedCVE-2019-5129
MISC
youphptube -- youphptube
 
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack.2019-10-25not yet calculatedCVE-2019-5127
MISC
youphptube -- youphptube
 
Specially crafted web requests can cause SQL injections in YouPHPTube 7.6. An attacker can send a web request with Parameter dir in /objects/pluginSwitch.json.php.2019-10-25not yet calculatedCVE-2019-5123
MISC
youphptube -- youphptube
 
SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter uuid in /objects/pluginSwitch.json.php2019-10-25not yet calculatedCVE-2019-5121
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.2019-10-25not yet calculatedCVE-2019-5120
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.2019-10-25not yet calculatedCVE-2019-5119
MISC
youphptube -- youphptube
 
Exploitable SQL injection vulnerabilities exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.2019-10-25not yet calculatedCVE-2019-5117
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.2019-10-25not yet calculatedCVE-2019-5116
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.2019-10-25not yet calculatedCVE-2019-5114
MISC
youphptube -- youphptube
 
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack.2019-10-25not yet calculatedCVE-2019-5128
MISC
zend_framework -- zend_frameworkZend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter.2019-10-25not yet calculatedCVE-2015-0270
MISC
Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

FTC Provides Tips for Warding Off Hackers

$
0
0
Original release date: October 29, 2019

The Federal Trade Commission (FTC) has released an article with tips on how protect your personal information from being stolen by hackers. In support of National Cybersecurity Awareness Month (NCSAM), FTC provides recommendations on how to safeguard phones, computers, accounts, and personally identifiable information.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages consumers to review the FTC article and the following additional resources for more information:

This product is provided subject to this Notification and this Privacy & Use policy.

Samba Releases Security Updates

$
0
0
Original release date: October 29, 2019

The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit some of these vulnerabilities to obtain sensitive information.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Samba Security Announcements for CVE-2019-10218, CVE-2019-14833, and CVE-2019-14847 and apply the necessary updates and workarounds.

This product is provided subject to this Notification and this Privacy & Use policy.

Microsoft Reports Global Cyberattacks on Sporting and Anti-Doping Organizations from Russian Espionage Actors

$
0
0
Original release date: October 29, 2019

Microsoft publicly released information revealing an uptick in cyberattacks globally targeting anti-doping authorities and sporting organizations. The Microsoft Threat Intelligence Center (MSTIC) routinely tracks malicious activity originating from the Russian advanced persistent threat (APT) group 28, also known as Fancy Bear, STRONTIUM, Swallowtail, Sofacy, Sednit, and Zebrocy. According to Microsoft, APT28 is targeting sporting and anti-doping organizations using spearphishing, password spraying (a brute force technique), fake Microsoft internet domains, as well as open-source and custom malware to exploit internet-connected devices.

To protect against similar attacks, Microsoft recommends:

  • Enabling two-factor authentication on all business and personal email accounts,
  • Learning how to spot phishing schemes and protect yourself from them, and
  • Enabling security alerts about links and files from suspicious websites.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages network defenders to remain vigilant and review the Microsoft article, the World Anti-Doping Agency article, and the following resources for additional information:

This product is provided subject to this Notification and this Privacy & Use policy.


Apple Releases Security Updates

$
0
0
Original release date: October 30, 2019

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Apple security pages for the following products and apply the necessary updates:

This product is provided subject to this Notification and this Privacy & Use policy.

MS-ISAC Releases Advisory on PHP Vulnerabilities

$
0
0
Original release date: October 30, 2019

The Multi-State Information Sharing & Analysis Center (MS-ISAC) has released an advisory on multiple Hypertext Preprocessor (PHP) vulnerabilities. An attacker could exploit some of these vulnerabilities to take control of an affected system.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review MS-ISAC Advisory 2019-116 and the PHP Downloads page and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

MS-ISAC Releases EOS Software Report List

$
0
0
Original release date: October 30, 2019

The Multi-State Information Sharing and Analysis Center (MS-ISAC) has released an end-of-support (EOS) software report list. Software that has reached its EOS date no longer receives security updates and patches from the vendor and is, therefore, susceptible to exploitation from security vulnerabilities. Unsupported software can also cause compatibility issues as well as decreased system performance and productivity.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review MS-ISAC's EOS Report List: October 2019 and Understanding Patches and Software Updates for more information.

This product is provided subject to this Notification and this Privacy & Use policy.

MAR-10135536-8 – North Korean Trojan: HOPLIGHT

$
0
0
Original release date: October 31, 2019

Notification

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:WHITE--Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.

Summary

Description

This Malware Analysis Report (MAR) is the result of analytic efforts between Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD). Working with U.S. Government partners, DHS, FBI, and DoD identified Trojan malware variants used by the North Korean government. This malware variant has been identified as HOPLIGHT. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https[:]//www[.]us-cert.gov/hiddencobra.

DHS, FBI, and DoD are distributing this MAR to enable network defense and reduce exposure to North Korean government malicious cyber activity.

This MAR includes malware descriptions related to HIDDEN COBRA, suggested response actions and recommended mitigation techniques. Users or administrators should flag activity associated with the malware and report the activity to the Cybersecurity and Infrastructure Security Agency (CISA) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.

This report provides analysis of twenty malicious executable files. Sixteen of these files are proxy applications that mask traffic between the malware and the remote operators. The proxies have the ability to generate fake TLS handshake sessions using valid public SSL certificates, disguising network connections with remote malicious actors. One file contains a public SSL certificate and the payload of the file appears to be encoded with a password or key. The remaining file does not contain any of the public SSL certificates, but attempts outbound connections and drops four files. The dropped files primarily contain IP addresses and SSL certificates.

For a downloadable copy of IOCs, see:

Submitted Files (20)

05feed9762bc46b47a7dc5c469add9f163c16df4ddaafe81983a628da5714461 (23E27E5482E3F55BF828DAB8855690...)

0608e411348905145a267a9beaf5cd3527f11f95c4afde4c45998f066f418571 (34E56056E5741F33D823859E77235E...)

084b21bc32ee19af98f85aee8204a148032ce7eabef668481b919195dd62b319 (170A55F7C0448F1741E60B01DCEC9C...)

12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d (868036E102DF4CE414B0E6700825B3...)

1a01b8a4c505db70f9e199337ce7f497b3dd42f25ad06487e29385580bca3676 (07D2B057D2385A4CDF413E8D342305...)

2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525 (5C3898AC7670DA30CF0B22075F3E8E...)

32ec329301aa4547b4ef4800159940feb950785f1ab68d85a14d363e0ff2bc11 (38FC56965DCCD18F39F8A945F6EBC4...)

4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761 (42682D4A78FE5C2EDA988185A34463...)

4c372df691fc699552f81c3d3937729f1dde2a2393f36c92ccc2bd2a033a0818 (C5DC53A540ABE95E02008A04A0D56D...)

70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3 (61E3571B8D9B2E9CCFADC3DDE10FB6...)

73dcb7639c1f81d3f7c4931d32787bdf07bd98550888c4b29b1058b2d5a7ca33 (3EDCE4D49A2F31B8BA9BAD0B8EF549...)

83228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a (3021B9EF74c&BDDF59656A035F94FD...)

8a1d57ee05d29a730864299376b830a7e127f089e500e148d96d0868b7c5b520 (5C0C1B4C3B1CFD455AC05ACE994AED...)

b05aae59b3c1d024b19c88448811debef1eada2f51761a5c41e70da3db7615a9 (2FF1688FE866EC2871169197F9D469...)

b9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101 (2A791769AA73AC757F210F8546125B...)

c66ef8652e15b579b409170658c95d35cfd6231c7ce030b172692f911e7dcff8 (E4ED26D5E2A84CC5E48D285E4EA898...)

d77fdabe17cdba62a8e728cbe6c740e2c2e541072501f77988674e07a05dfb39 (F8D26F2B8DD2AC4889597E1F2FD1F2...)

ddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d (BE588CD29B9DC6F8CFC4D0AA5E5C79...)

f8f7720785f7e75bd6407ac2acd63f90ab6c2907d3619162dc41a8ffa40a5d03 (D2DA675A8ADFEF9D0C146154084FFF...)

fe43bc385b30796f5e2d94dfa720903c70e66bc91dfdcfb2f3986a1fea3fe8c5 (F315BE41D9765D69AD60F0B4D29E43...)

Additional Files (4)

49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359 (rdpproto.dll)

70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289 (udbcgiut.dat)

96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7 (MSDFMAPI.INI)

cd5ff67ff773cc60c98c35f9e9d514b597cbd148789547ba152ba67bfc0fec8f (UDPTrcSvc.dll)

IPs (22)

112.175.92.57

113.114.117.122

117.239.241.2

119.18.230.253

128.200.115.228

137.139.135.151

14.140.116.172

181.39.135.126

186.169.2.237

195.158.234.60

197.211.212.59

21.252.107.198

210.137.6.37

218.255.24.226

221.138.17.152

26.165.218.44

47.206.4.145

70.224.36.194

81.94.192.10

81.94.192.147

84.49.242.125

97.90.44.200

Findings

05feed9762bc46b47a7dc5c469add9f163c16df4ddaafe81983a628da5714461

Tags

trojan

Details
Name23E27E5482E3F55BF828DAB885569033
Size242688 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD523e27e5482e3f55bf828dab885569033
SHA1139b25e1ae32a8768238935a8c878bfbe2f89ef4
SHA25605feed9762bc46b47a7dc5c469add9f163c16df4ddaafe81983a628da5714461
SHA5122c481ef42dfc9a7a30575293d09a6f81943e307836ec5b8a346354ab5832c15046dd4015a65201311e33f944763fc55dd44fbe390245be5be7a216026ecfb28b
ssdeep6144:YnDlYMzUvLFOL9wqk6+pqC8iooIBgajvQlm/Z0cp1:alYiXiooIKajvQeZ3
Entropy6.537337
Antivirus
AhnlabTrojan/Win32.Generic
AntiyTrojan/Win32.Casdet
AviraTR/NukeSped.uxivj
BitDefenderTrojan.GenericKD.41198265
CyrenW32/Trojan.LXQN-3818
ESETa variant of Win32/NukeSped.AI trojan
EmsisoftTrojan.GenericKD.41198265 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005329311 )
McAfeeTrojan-Hoplight
Microsoft Security EssentialsTrojan:Win32/Hoplight
Quick HealTrojan.Hoplight.S5793599
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
TrendMicroTrojan.55DEE3DA
TrendMicro House CallTrojan.55DEE3DA
VirusBlokAdaTrojan.Casdet
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-06-05 21:57:29-04:00
Import Hashff390ec082b48263a3946814ea18ba46
PE Sections
MD5NameRaw SizeEntropy
c06924120c87e2cb79505e4ab0c2e192header10242.542817
3368eda2d5820605a055596c7c438f0f.text1971206.441545
ec1f06839fa9bc10ad8e183b6bf7c1b5.rdata271365.956914
1e62b7d9f7cc48162e0651f7de314c8a.data81924.147893
980effd28a6c674865537f313318733a.rsrc5125.090362
696fd5cac6e744f336e8ab68a4708fcf.reloc87045.247502
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Description

This artifact is a malicious 32-bit Windows executable. When executed the malware will collect system information about the victim machine including OS Version, Volume Information, and System Time, as well as enumerate the system drives and partitions.

The malware is capable of the following functions:

---Begin Malware Capability---

Read, Write, and Move Files
Enumerate System Drives
Create and Terminate Processes
Inject into Running Processes
Create, Start and Stop Services
Modify Registry Settings
Connect to a Remote Host
Upload and Download Files

---End Malware Capability---

The malware family has 2 versions. Both are nearly identical in functionality but use slightly different command codes. So if the opcode for Keepalive in version 1 is 0xB6C1, the opcode in version 2 will be 0xB6C2.

There may be some versions of the malware that have limited/additional functionality, but most will have these command codes:

---Begin Version 1 Command Codes---

0xB6A4 GetComputerlnfo
   -Gets OS Version
   -Opens and sends back multiple registry keys
       Keys are encrypted in actually binary using RC4 with 16 byte key (af 3d 78    23 4a 79 92 81 9d 7f 20 47 ad e3 f2 b3). Keys are decrypted prior to calling RegOpenKey/RegQueryValue.
   -Calls GetSystemlnfo, returns results of a SYSTEM_INFO struct
   -Calls GetSystemMetrics and returns results
0xB6AS GetDriveslnfo
   -Gets info about different drives/share drives on system as well as memory available/memory used on those drives
0xB6A6 Directorylist
   -Gives list of all files in a directory that is specified by the C2
0xB6A7 SendFile
   -Sends a file from the victim machine to the C2 that is specified by the C2
0xB6A8 ReceiveFile
   -Victim machine receives file from the C2
0xB6A9 CreateProcess
   -Calls CreateProcessW to run a process via the command line. C2 specifies the path of the file to be run via command line.
0xB6AA EnableLogging
   -Prior to victim and C2 closing out a connection the victim will spawn a new thread that will compile a comprehensive log of system/session information. Inside this thread it opens a file that is named randomly and places it in the temp directory. It puts all the log results into this file.
0xB6AB Deletefile
   -Deletes file specified by the C2.
0xB6AC RunCmdPipe
   -Runs CreateProcessW to run a process via the command line. The process will be cmd.exe and the arguments will be the windows cmd command that the C2 specifies. The results of this command will be sent to a temporary file and then read back to the C2 from that file. Afterwards that file is deleted.
0xB6AD Processlist
   -Gets a list of processes
0xB6AE KillProcess
   -Kills process based on the PID that the C2 supplies.
0xB6AF TestEncryption
   -Tests LFSR encryption, no real functionality
0xB6B0 Uninstall
   -Uninstalls the implant from the victim box
0xB6B2 GetConfig
   -Gets the current callback config file from memory, returns the list to C2. There are 10 IP options in this config.
0xB6B3 SetConfig
   -Gets the current callback config file from memory, allows C2 to change the configurations. This will change the beacon IP to whatever the C2 wants.
0xB6B4 SetCurrentDirectory
   -Changes current working directory to the path supplied by C2
0xB6B5 GetCurrentDirectory
   -Gets the current working directory and returns it to the C2
0xB6C1 KeepAlive
   -C2s sends this as a keep alive to the victim, victim responds with confirmation    that it received the keep alive and keeps session open

---End Version 1 Command Codes---

The malware is capable of opening and binding to a socket. The malware uses a public SSL certificate for secure communication. This certificate is from www.naver.com. Naver.com is the largest search engine in Korea and provides a variety of web services to clients around the world.

The malware uses the default certificates/private keys that come with PolarSSL. These are generally used for testing purposes only. Additionally the C2 IPs that act as the server for the TLS handshake require the malware to respond back with a client key. This key is also a default key found within the PolarSSL libraries.

---Begin SSL Certificate Header---

1 0     UNL10U
PolarSSL10UPolarSSL Test CA0
110212144407Z
2102121144407Z0<1 0 UNL10U
PolarSSL10UPolarSSL Client 200

---End SSL Certificate Header---

When executed, the malware will attempt a TLS Handshake with one of four hardcoded IP addresses embedded in the malware. These IP addresses are referenced in 'udbcgiut.dat' below. The malware also contains an embedded Zlib compression library that appears to further obfuscate the communications payload.

After the TLS authentication is completed this particular malware does NOT use the session key that is generated via TLS. It uses a custom Linear Feedback Shift Register (LFSR) encryption scheme to encrypt all communications after the completion of the handshake. A python script to decrypt traffic is given below:

---Begin LFSR Decryption Script---

class lfsr:
   def _init_(self):
       self.b = (0, 0, 0, 0)
       self.data = b"
       self.L= 0

   def lfsr_init(self, data):
       self.L = len(data)
       self.data = data
       self.b[0] = 0
       self.b[1] = 0xc2b45678
       self.b[2] = 0x90abcdef
       self.b[3] = 0xfe268455

   for i in range(int(self.L / 3)):
       self.b[1] ^= self.b[2]
       self.b[2] ^= self.b[3]
       self.b[3] ^= self.b[1]

   for i in range{self.L % 3):
       self.b[1] |= self.b[2]
       self.b[2] |= self.b[3]
       self.b[3] |= self.b[1]

    def lfsr_1(self):
       r = 0
       if (self.b[1] & 0x200) == 0x200:
           r += 1
       if (self.b[2] & 0x800) == 0x800:
           r += 1
       if (self.b[3] & 0x800) == 0x800:
           r += 1
       if r <= 1:
           self.b[0] = 1
       else:
           self.b[0] = 0

   def lfsr_2(self):
       v1 = self.b[1]
       r = (self.b[1] >> 9) & 1
       v3 = r == self.b[0]
       self.b[0] ^= r
       if not v3:
           r = (v1 ^ ((v1 ^ (( v1 ^ (v1 >> 1)) >> 1)) >> 3)) >> 13
           v4 = 2 * (v1 & 0x3ffff)
           self.b[1] = v4
           if (r & 1):
               self.b[1] = v4 ^ 1

   def lfsr_3(self):
       v1 = self.b[2]
       r = (self.b[2] >> 11) & 1
       v3 = r == self.b[0]
       self.b[0] ^= r
       if not v3:
           r = (v1 ^ ((v1 ^ ((v1 ^ (v1 >> 1)) >> 4)) >> 4)) >> 12
           v4 = 2 * (v1 & 0x1fffff)
           self.b[2] = v4
           if (r & 1):
               self.b[2] = v4 ^ 1

   def lfsr 4(self):
       v1 = self.b[3]
       r = (self.b[3] >> 11) & 1
       v3 = r == self.b[0]
       self.b[0] ^= r
       if not v3:
           r = (v1 ^ ((v1 ^ ((v1 ^ (v1 >> 1)) >> 3)) >> 1)) >> 17
           v4 = 2 * (v1 & 0x3fffff)
           self.b[3] = v4
           if (r & 1):
               self.b[3] = v4 ^ 1

   def lfsr_genKeyByte(self):
       self.lfsr_1()
       self.lfsr_2()
       self.lfsr_3()
       self.lfsr_4()
       v2 = self.b[1] ^ self.b[2] ^ self.b[3]
       r = (v2 >> 0x18) ^ (v2 >> 0x10) ^ (v2 >> 0x8) ^ v2
       r &= 0xff
       return r

   def crypt(self):
       r= b"
       for i in range(len(self.data)):
           k = self.lfsr_genKeyByte()
           r += bytes([self.data[i] ^ k])
       return r

---End LFSR Decryption Script---

The following notable strings have been linked to the use of the SSL certificates and can be used to identify the malware:

---Begin Notable Strings---

fjiejffndxklfsdkfjsaadiepwn
ofuierfsdkljffjoiejftyuir
reykfgkodfgkfdskgdfogpdokgsdfpg
ztretrtireotreotieroptkierert
etudjfirejer
yrty
uiyy
uiyiyj lildvucv
erfdfe poiiumwq

---End Notable Strings---

The next four artifacts contain identical characteristics as those described above. Therefore, only capability that is unique will be described for the following four artifacts.

2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525

Tags

trojan

Details
Name5C3898AC7670DA30CF0B22075F3E8ED6
Size221184 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD55c3898ac7670da30cf0b22075f3e8ed6
SHA191110c569a48b3ba92d771c5666a05781fdd6a57
SHA2562151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
SHA512700ec4d923cf0090f4428ac3d4d205b551c3e48368cf90d37f9831d8a57e73c73eb507d1731662321c723362c9318c3f019716991073dc9a4cc829ce01540337
ssdeep3072:nKBzqEHcJw0sqz7vLFOLBAqui1mqLK1VaU9BzNRyHmdMaF0QqWN0Qjpthmu:nKg0cJ19z7vLFOLSqp0q7syHeFhnhm
Entropy6.346504
Antivirus
AhnlabTrojan/Win32.Generic
AntiyTrojan/Win32.NukeSped
AviraTR/NukeSped.bqdkh
BitDefenderTrojan.GenericKD.41198269
CyrenW32/Trojan.MYIL-1461
ESETa variant of Win32/NukeSped.AI trojan
EmsisoftTrojan.GenericKD.41198269 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005329311 )
McAfeeTrojan-Hoplight
Microsoft Security EssentialsTrojan:Win32/Hoplight
Quick HealTrojan.Hoplight.S5774771
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
TrendMicroTrojan.55DEE3DA
TrendMicro House CallTrojan.55DEE3DA
VirusBlokAdaBScope.Trojan.Casdet
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-05-16 02:35:55-04:00
Import Hash6ffc5804961e26c43256df683fea6922
PE Sections
MD5NameRaw SizeEntropy
adb596d3ceae66510778e3bf5d4d9582header40960.695660
6453931a0b6192e0bbd6476e736ca63f.text1843206.343388
0ba1433cc62ba7903ada2f1e57603e83.rdata163846.246206
76a08265777f68f08e5e6ed2102cb31d.data122884.050945
cb8939d6bc1cd076acd850c3850bdf78.rsrc40963.289605
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0
Relationships
2151c1977b...Connected_To81.94.192.147
2151c1977b...Connected_To112.175.92.57
2151c1977b...Related_To181.39.135.126
2151c1977b...Related_To197.211.212.59
2151c1977b...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
2151c1977b...Dropped96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

When this artifact is executed, it will write the file 'udbcgiut.dat' to C:\Users\<user>\AppData\Local\Temp.

The malware will then attempt outbound SSL connections to 81.94.192.147 and 112.175.92.57. Both connection attempts are over TCP Port 443.
The two IP addresses above, as well as the IP addresses 181.39.135.126 and 197.211.212.59 are hard-coded into the malware. However, only connections to the first two IP addresses were attempted during analysis.

197.211.212.59

Ports
  • 7443 TCP
Whois

inetnum:        197.211.208.0 - 197.211.215.255
netname:        ZOL-16e-MOBILE-CUSTOMERS
descr:         ZOL Customers on ZTE Mobile WiMAX Platform
country:        ZW
admin-c:        BS10-AFRINIC
admin-c:        GJ1-AFRINIC
admin-c:        JHM1-AFRINIC
tech-c:         BS10-AFRINIC
tech-c:         GJ1-AFRINIC
tech-c:         JHM1-AFRINIC
status:         ASSIGNED PA
mnt-by:         LIQUID-TOL-MNT
source:         AFRINIC # Filtered
parent:         197.211.192.0 - 197.211.255.255

person:         B Siwela
address:        3rd Floor Greenbridge South
address:        Eastgate Center
address:        R. Mugabe Road
address:        Harare
address:        Zimbabwe
phone:         +263774673452
fax-no:         +2634702375
nic-hdl:        BS10-AFRINIC
mnt-by:         GENERATED-DVCNVXWBH3VN3XZXTRPHOT0OJ77GUNN3-MNT
source:         AFRINIC # Filtered

person:         G Jaya
address:        3rd Floor Greenbridge South
address:        Eastgate Center
address:        R. Mugabe Road
address:        Harare
address:        Zimbabwe
phone:         +263773373135
fax-no:         +2634702375
nic-hdl:        GJ1-AFRINIC
mnt-by:         GENERATED-QPEEUIPPW1WPRZ5HLHRXAVHDOKWLC9UC-MNT
source:         AFRINIC # Filtered

person:         John H Mwangi
address:        Liquid Telecom Kenya
address:        P.O.Box 62499 - 00200
address:        Nairobi Kenya
address:        Nairobi, Kenya
address:        Kenya
phone:         + 254 20 556 755

Relationships
197.211.212.59Related_To2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
197.211.212.59Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
197.211.212.59Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
Description

This IP address is listed in the file 'udbcgiut.dat'. Outbound SSL connection attempts are made to this IP by Malware2.exe, Malware3.exe, and Malware5.exe. The domain, zol-ad-bdc.zol.co.zw is associated with the IP address, however, no DNS query is made for the name.

181.39.135.126

Ports
  • 7443 TCP
Whois

inetnum:     181.39.135.120/29
status:     reallocated
owner:     Clientes Guayaquil
ownerid:     EC-CLGU1-LACNIC
responsible: Tomislav Topic
address:     Kennedy Norte Mz. 109 Solar 21, 5, Piso 2
address:     5934 - Guayaquil - GY
country:     EC
phone:     +593 4 2680555 [101]
owner-c:     SEL
tech-c:     SEL
abuse-c:     SEL
created:     20160720
changed:     20160720
inetnum-up: 181.39/16

nic-hdl:     SEL
person:     Carlos Montero
e-mail:     networking@TELCONET.EC
address:     Kennedy Norte MZ, 109, Solar 21
address:     59342 - Guayaquil -
country:     EC
phone:     +593 42680555 [4601]
created:     20021004
changed:     20170323

Relationships
181.39.135.126Related_To2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
181.39.135.126Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
181.39.135.126Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
Description

This IP address is listed in the file 'udbcgiut.dat'. Outbound SSL connection attempts are made to this IP by Malware2.exe, Malware3.exe, and Malware5.exe. No domain is associated with the IP address.

112.175.92.57

Ports
  • 443 TCP
Whois

inetnum:        112.160.0.0 - 112.191.255.255
netname:        KORNET
descr:         Korea Telecom
admin-c:        IM667-AP
tech-c:         IM667-AP
country:        KR
status:         ALLOCATED PORTABLE
mnt-by:         MNT-KRNIC-AP
mnt-irt:        IRT-KRNIC-KR
last-modified: 2017-02-03T02:21:58Z
source:         APNIC

irt:            IRT-KRNIC-KR
address:        Seocho-ro 398, Seocho-gu, Seoul, Korea
e-mail:         hostmaster@nic.or.kr
abuse-mailbox: hostmaster@nic.or.kr
admin-c:        IM574-AP
tech-c:         IM574-AP
auth:         # Filtered
mnt-by:         MNT-KRNIC-AP
last-modified: 2017-10-19T07:36:36Z
source:         APNIC

person:         IP Manager
address:        Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
country:        KR
phone:         +82-2-500-6630
e-mail:         kornet_ip@kt.com
nic-hdl:        IM667-AP
mnt-by:         MNT-KRNIC-AP
last-modified: 2017-03-28T06:37:04Z
source:         APNIC

Relationships
112.175.92.57Connected_From2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
112.175.92.57Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
112.175.92.57Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
112.175.92.57Connected_From83228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a
Description

This IP address is listed in the file 'udbcgiut.dat'. Outbound SSL connection attempts are made to this IP by Malware2.exe, Malware3.exe, and Malware5.exe. The domain, mail.everzone.co.kr is associated with the IP address, however, no DNS query is made for the name.

81.94.192.147

Ports
  • 443 TCP
Whois

inetnum:        81.94.192.0 - 81.94.192.255
netname:        IOMARTHOSTING
descr:         iomart Hosting Limited
country:        GB
admin-c:        RA1415-RIPE
tech-c:         RA1415-RIPE
status:         ASSIGNED PA
remarks:        ABUSE REPORTS: abuse@redstation.com
mnt-by:         REDSTATION-MNT
mnt-domains:    REDSTATION-MNT
mnt-routes:     REDSTATION-MNT
created:        2016-02-14T11:44:25Z
last-modified: 2016-02-14T11:44:25Z
source:         RIPE

role:         Redstation Admin Role
address:        Redstation Limited
address:        2 Frater Gate Business Park
address:        Aerodrome Road
address:        Gosport
address:        Hampshire
address:        PO13 0GW
address:        UNITED KINGDOM
abuse-mailbox: abuse@redstation.com
e-mail:         abuse@redstation.com
nic-hdl:        RA1415-RIPE
mnt-by:         REDSTATION-MNT
created:        2005-04-22T17:34:33Z
last-modified: 2017-05-02T09:47:13Z
source:         RIPE

% Information related to '81.94.192.0/24AS20860'

route:         81.94.192.0/24
descr:         Wayne Dalton - Redstation Ltd
origin:         AS20860
mnt-by:         GB10488-RIPE-MNT
created:        2015-11-03T12:58:00Z
last-modified: 2015-11-03T12:58:00Z
source:         RIPE

Relationships
81.94.192.147Connected_From2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
81.94.192.147Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
81.94.192.147Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
Description

This IP address is listed in the file 'udbcgiut.dat'. Outbound SSL connection attempts are made to this IP by Malware2.exe, Malware3.exe, and Malware5.exe. No domain is associated with the IP address.

70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289

Tags

trojan

Details
Nameudbcgiut.dat
Size1171 bytes
Typedata
MD5ae829f55db0198a0a36b227addcdeeff
SHA104833210fa57ea70a209520f4f2a99d049e537f2
SHA25670902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
SHA5121b4509102ac734ce310b6f8631b1bedd772a38582b4feda9fee09f1edd096006cf5ba528435c844effa97f95984b07bd2c111aa480bb22f4bcfbc751f069868d
ssdeep3:ElclFUl8GlFcmzkXIil23X1ll:ElcUXmQkXQ3
Entropy0.395693
Antivirus
AhnlabBinImage/Hoplight
AntiyTrojan/Generic.Generic
IkarusTrojan.Win32.Hoplight
McAfeeTrojan-Hoplight.b
Microsoft Security EssentialsTrojan:Win32/Hoplight
TrendMicroTrojan.22D9D34C
TrendMicro House CallTrojan.22D9D34C
Yara Rules

No matches found.

ssdeep Matches

No matches found.

Relationships
70902623c9...Dropped_By70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
70902623c9...Related_Toddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
70902623c9...Related_To2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
70902623c9...Related_To70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
70902623c9...Related_To12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d
Description

'udbcgiut.dat' is dropped by three of the four PE32 executables. This file contains a 32byte unicode string uniquely generated for the infected system, as well as four socket pairs in hexidecimal.

---Begin Decoded Socket Pairs---

197.211.212.59:443
181.39.135.126:443
112.175.92.57:7443
81.94.192.147:7443

---End Decoded Socket Pairs---

The unicode string generated during this analysis was '8a9b11762b96c4b6'. The socket pairs remain the same for all instances of the malware.
For the PE32 executables, 'udbcgiut.dat' was dropped in the victim's profile at %AppData%\Local\Temp. For the 64bit executables, 'udbcgiut.dat' was dropped in C:\Windows.

4c372df691fc699552f81c3d3937729f1dde2a2393f36c92ccc2bd2a033a0818

Tags

trojan

Details
NameC5DC53A540ABE95E02008A04A0D56D6C
Size241152 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD5c5dc53a540abe95e02008a04a0d56d6c
SHA14cfe9e353b1a91a2add627873846a3ad912ea96b
SHA2564c372df691fc699552f81c3d3937729f1dde2a2393f36c92ccc2bd2a033a0818
SHA512fc33c99facfbc98d164e63167353bdcff7c1704810e4bb64f7e56812412d84099b224086c04aea66e321cd546d8cf6f14196f5b58d5e931c68064d659c33b6a2
ssdeep6144:LA5cWD93YuzTvLFOLoqbWbnuX7ZEAV6efA/Pawzq:Xc93YbLZEAV6mX
Entropy6.534884
Antivirus
AhnlabTrojan/Win32.Hoplight
AntiyTrojan/Win32.Casdet
AviraTR/NukeSped.qdbcu
BitDefenderTrojan.GenericKD.31879714
ESETa variant of Win32/NukeSped.AS trojan
EmsisoftTrojan.GenericKD.31879714 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0051d4f01 )
McAfeeTrojan-Hoplight
Microsoft Security EssentialsTrojan:Win32/Hoplight
Quick HealTrojan.Hoplight.S5793599
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
TrendMicroTrojan.55DEE3DA
TrendMicro House CallTrojan.55DEE3DA
VirusBlokAdaTrojan.Casdet
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-06-04 21:31:07-04:00
Import Hashc76f6bb3f2ce6f4ce3e83448836f3ddd
PE Sections
MD5NameRaw SizeEntropy
64cb3246aafa83129f7fd6b25d572a9fheader10242.625229
e8c15e136370c12020eb23545085b9f6.text1960966.431942
cf0eb4ad22ac1ca687b87a0094999ac8.rdata266245.990247
b246681e20b3c8ff43e1fcf6c0335287.data81924.116777
6545248a1e3449e95314cbc874837096.rsrc5125.112624
31a7ab6f707799d327b8425f6693c220.reloc87045.176231
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

This artifact appears to be named 'lamp.exe'. The malware contains the following debug pathway:

---Begin Debug Pathway---

Z:\Develop\41.LampExe\Release\LampExe.pdb

---End Debug Pathway---

ddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d

Tags

adwaretrojan

Details
NameBE588CD29B9DC6F8CFC4D0AA5E5C79AA
Nameddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
Size267776 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD5be588cd29b9dc6f8cfc4d0aa5e5c79aa
SHA106be4fe1f26bc3e4bef057ec83ae81bd3199c7fc
SHA256ddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
SHA512c074ec876350b3ee3f82208041152c0ecf25cc8600c8277eec389c253c12372e78da59182a6df8331b05e0eefb07c142172951115a582606f68b824e1d48f30d
ssdeep6144:UEFpmt3md/iA3uiyzOvLFOLYqnHGZlDwf/OYy85eqmJKRPg:/PQ3mJxeigqi/OYy+/g
Entropy6.554499
Antivirus
AhnlabTrojan/Win32.Generic
AntiyTrojan/Win32.Casdet
AviraTR/NukeSped.yvkuj
BitDefenderTrojan.GenericKD.31879713
CyrenW32/Trojan.TBKF-4720
ESETa variant of Win32/NukeSped.AI trojan
EmsisoftTrojan.GenericKD.31879713 (B)
FilseclabAdware.Amonetize.heur.xjym.mg
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005329311 )
McAfeeTrojan-Hoplight
Microsoft Security EssentialsTrojan:Win32/Nukesped.PA!MTB
Quick HealTrojan.Generic
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
TrendMicroTrojan.55DEE3DA
TrendMicro House CallTrojan.55DEE3DA
VirusBlokAdaBScope.Trojan.Casdet
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-06-06 10:33:38-04:00
Import Hash8184d5d35e3a4640bb5d21698a4b6021
PE Sections
MD5NameRaw SizeEntropy
59b5d567b9b7b9da0ca0936675fd95feheader10242.658486
c0b6929e0f01a7b61bde3d7400a801e0.text2186246.470188
ce1e5ab830fcfaa2d7bea92f56e9026e.rdata271365.962575
006bad003b65738ed203a576205cc546.data81924.157373
992987e022da39fcdbeede8ddd48f226.rsrc30725.511870
4be460324f0f4dc1f6a0983752094cce.reloc97285.303151
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Relationships
ddea408e17...Connected_To81.94.192.147
ddea408e17...Connected_To112.175.92.57
ddea408e17...Connected_To181.39.135.126
ddea408e17...Connected_To197.211.212.59
ddea408e17...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
ddea408e17...Connected_To81.94.192.10
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

This program attempts to initiate a TLS Handshake to the four IP/Port pairs listed in 'udbcgiut.dat'. If the program is unable to establish a connection, the file 'udbcgiut.dat' is deleted.

After 'udbcgiut.dat' is deleted, an outbound SSL connection is made to 81.94.192.10. The IP address is hard coded in the malware and are not randomly generated.

This artifact also loads several APIs that are commonly associated with Pass-The-Hash (PTH) toolkits, indicating a capability to harvest user credentials and passwords.

---Begin Common PTH APIs---

SamiChangePasswordUser
SamFreeMemory
SamCloseHandle
SamOpenUser
SamLookupNamesInDomain
SamOpenDomain
SamConnect

---End Common PTH APIs---

81.94.192.10

Whois

Domain name:
       redstation.net.uk

   Registrant:
       Redstation Limited

   Registrant type:
       UK Limited Company, (Company number: 3590745)

   Registrant's address:
       2 Frater Gate Business Park
       Aerodrome Road
       Gosport
       Hampshire
       PO13 0GW
       United Kingdom

   Data validation:
       Nominet was able to match the registrant's name and address against a 3rd party data source on 21-Feb-2017

   Registrar:
       Easyspace Ltd [Tag = EASYSPACE]
       URL: https://www.easyspace.com/domain-names/extensions/uk

   Relevant dates:
       Registered on: 11-Apr-2005
       Expiry date: 11-Apr-2019
       Last updated: 12-Apr-2017

   Registration status:
       Registered until expiry date.

   Name servers:
       ns1.redstation.com
       ns2.redstation.com

Relationships
81.94.192.10Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
Description

A high port to high port connection attempt is made to this IP address from 'Malware5.dll'. No domain is associated with the IP address.

12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d

Tags

droppertrojan

Details
Name868036E102DF4CE414B0E6700825B319
Size453791 bytes
TypePE32+ executable (GUI) x86-64, for MS Windows
MD5868036e102df4ce414b0e6700825b319
SHA17f1e68d78e455aa14de9020abd2293c3b8ec6cf8
SHA25612480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d
SHA512724d83493dbe86cfcee7f655272d2c733baa5470d7da986e956c789aa1b8f518ad94b575e655b4fe5f6f7d426b9aa7d8304fc879b82a385142b8924e0d454363
ssdeep12288:eb/3G8vg+Rg1cvAHtE0MLa07rt5POui6z:+/3G8vg+pvi9Sa07rt4ui6z
Entropy7.713852
Antivirus
AhnlabTrojan/Win64.Hoplight
AntiyTrojan/Generic.Generic
AviraTR/Dropper.ezydy
CyrenW64/Trojan.PLQG-3049
ESETa variant of Win64/NukeSped.BV trojan
IkarusTrojan.Win64.Nukesped
K7Riskware ( 0040eff71 )
McAfeeGeneric Trojan.ix
Microsoft Security EssentialsTrojan:Win64/Hoplight
NANOAVTrojan.Win64.Crypted.excqpl
NetGateTrojan.Win32.Malware
Quick HealTrojan.Hoplight
SophosTroj/Hoplight-C
SymantecTrojan.Gen.MBT
TrendMicroTrojan.D58D9624
TrendMicro House CallTrojan.D58D9624
VirusBlokAdaTrojan.Win64.Hoplight
Yara Rules

No matches found.

ssdeep Matches
90890d3928be0f36b1f4dcfffb20ac3747a31451ce010caba768974bfccdc26e7c
PE Metadata
Compile Date2017-06-06 10:54:03-04:00
Import Hash947a389c3886c5fa7f3e972fd4d7740c
PE Sections
MD5NameRaw SizeEntropy
e772c7a04c7e3d53c58fdb8a88bb0c02header10242.486400
a6a2750e5b57470403299e0327553042.text348166.297430
cc5d69374e9b0266a4b1119e5274d392.rdata122884.715650
ac4ee21fcb2501656efc217d139ec804.data51201.876950
359af12d4a14ced423d39736dfec613a.pdata25603.878158
097e0e4be076b795a7316f1746bace8a.rsrc30725.514584
5849f380266933d6f3c5c4740334b041.reloc10242.517963
Packers/Compilers/Cryptors
Microsoft Visual C++ 8.0 (DLL)
Relationships
12480585e0...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
12480585e0...Dropped49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

This artifact is a malicious x64 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

In addition to the capabilities described above, this variant will hook the Windows Local Security Authority (lsass.exe). 'lsass.exe' will check the registry for the data value 'rdpproto' under the key SYSTEM\CurrentControlSet\Control\Lsa Name: Security Packages. If not found, this value is added by 'lsass.exe'.
Next, the malware will drop the embedded file, 'rdpproto.dll' into the %System32% directory.
The file, 'udbcgiut.dat' is then written to C:\Windows. Outbound connection attempts are made to the socket pairs found within this file as described above.

49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359

Tags

trojan

Details
Namerdpproto.dll
Size391680 bytes
TypePE32+ executable (DLL) (console) x86-64, for MS Windows
MD5dc268b166fe4c1d1c8595dccf857c476
SHA18264556c8a6e460760dc6bb72ecc6f0f966a16b8
SHA25649757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
SHA512b47c4caa0b5c17c982fcd040c7171d36ec962fe32e9b8bec567ee14b187507fe90e026aa05eec17d36c49a924eeaed55e66c95a111cfa9dcae0e305ab9515cac
ssdeep6144:jfsTC8amAXJeZP6BPjIDeLkigDxcvAHjVXjhtBGshMLa1Mj7rtlkiP60dwtudIye:jvg+Rg1cvAHtE0MLa07rt5POui6
Entropy7.893665
Antivirus
AhnlabTrojan/Win64.Hoplight
AntiyTrojan/Win32.Casdet
AviraTR/Crypt.XPACK.xuqld
BitDefenderTrojan.Generic.22790108
ESETa variant of Win64/NukeSped.BV trojan
EmsisoftTrojan.Generic.22790108 (B)
IkarusTrojan.SuspectCRC
K7Trojan ( 0054bb211 )
McAfeeHoplight-FDXG!DC268B166FE4
Microsoft Security EssentialsTrojan:Win64/Hoplight
NANOAVTrojan.Win64.Crypted.excqpl
Quick HealTrojan.Agent
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
VirusBlokAdaTrojan.Win64.Agent
Yara Rules

No matches found.

ssdeep Matches
99890d3928be0f36b1f4dcfffb20ac3747a31451ce010caba768974bfccdc26e7c
PE Metadata
Compile Date2017-06-06 11:34:06-04:00
Import Hash360d26520c50825099ec61e97b01a43b
PE Sections
MD5NameRaw SizeEntropy
3bb2a7d6aab283c82ab853f536157ce2header10242.524087
b0bf8ec7b067fd3592c0053702e34504.text235526.180871
6cc98c5fef3ea1b782262e355b5c5862.rdata107524.635336
484d4698d46b3b5ad033c1a80ba83acf.data40962.145716
a07c8f17c18c6789a3e757aec183aea6.pdata20483.729952
fae0d0885944745d98849422bd799457.rsrc3486727.997488
0c1c23e1fb129b1b1966f70fc75cf20e.reloc15361.737829
Relationships
49757cf856...Dropped_By12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d
49757cf856...Connected_To21.252.107.198
49757cf856...Connected_To70.224.36.194
49757cf856...Connected_To113.114.117.122
49757cf856...Connected_To47.206.4.145
49757cf856...Connected_To84.49.242.125
49757cf856...Connected_To26.165.218.44
49757cf856...Connected_To137.139.135.151
49757cf856...Connected_To97.90.44.200
49757cf856...Connected_To128.200.115.228
49757cf856...Connected_To186.169.2.237
Description

"rdpproto.dll" is dropped into the %System32% directory by 868036E102DF4CE414B0E6700825B319. When the library is loaded,
"rdpproto.dll" will attempt to send SSL Client Hello packets to any of the following embedded IP addresses:

---Begin Embedded IP Addresses---

21.252.107.198
70.224.36.194
113.114.117.122
47.206.4.145
84.49.242.125
26.165.218.44
137.139.135.151
97.90.44.200
128.200.115.228
186.169.2.237

---End Embedded IP Addresses---

This artifact contains the following notable strings:

---Begin Notable Strings---

CompanyName
Adobe System Incorporated
FileDescription
MicrosoftWindows TransFilter/FilterType : 01 WindowsNT Service
FileVersion
6.1 Build 7601
InternalName
TCP/IP Packet Filter Service
LegalCopyright
Copyright 2015 - Adobe System Incorporated
LegalTrademarks
OriginalFileName
TCP/IP - PacketFilter

---End Notable Strings---

21.252.107.198

Ports
  • 23164 TCP
Whois

NetRange:     21.0.0.0 - 21.255.255.255
CIDR:         21.0.0.0/8
NetName:        DNIC-SNET-021
NetHandle:     NET-21-0-0-0-1
Parent:         ()
NetType:        Direct Allocation
OriginAS:    
Organization: DoD Network Information Center (DNIC)
RegDate:        1991-06-30
Updated:        2009-06-19
Ref:            https://whois.arin.net/rest/net/NET-21-0-0-0-1


OrgName:        DoD Network Information Center
OrgId:         DNIC
Address:        3990 E. Broad Street
City:         Columbus
StateProv:     OH
PostalCode:     43218
Country:        US
RegDate:        
Updated:        2011-08-17
Ref:            https://whois.arin.net/rest/org/DNIC

Relationships
21.252.107.198Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
21.252.107.198Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

70.224.36.194

Ports
  • 59681 TCP
Whois

Domain Name: AMERITECH.NET
Registry Domain ID: 81816_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Updated Date: 2017-06-09T05:27:34Z
Creation Date: 1996-06-14T04:00:00Z
Registry Expiry Date: 2018-06-13T04:00:00Z
Registrar: CSC Corporate Domains, Inc.
Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: 8887802723
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS1.ATTDNS.COM
Name Server: NS2.ATTDNS.COM
Name Server: NS3.ATTDNS.COM
Name Server: NS4.ATTDNS.COM
DNSSEC: unsigned

Domain Name: ameritech.net
Registry Domain ID: 81816_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2017-06-09T05:27:34Z
Creation Date: 1996-06-14T04:00:00Z
Registrar Registration Expiration Date: 2018-06-13T04:00:00Z
Registrar: CSC CORPORATE DOMAINS, INC.
Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Domain Administrator
Registrant Organization: AT&T SERVICES, INC.
Registrant Street: 801 Chestnut Street
Registrant City: Saint Louis
Registrant State/Province: MO
Registrant Postal Code: 63101
Registrant Country: US
Registrant Phone: +1.3142358168
Registrant Phone Ext:
Registrant Fax: +1.3142358168
Registrant Fax Ext:
Registrant Email: att-domains@att.com
Registry Admin ID:
Admin Name: Domain Administrator
Admin Organization: AT&T SERVICES, INC.
Admin Street: 801 Chestnut Street
Admin City: Saint Louis
Admin State/Province: MO
Admin Postal Code: 63101
Admin Country: US
Admin Phone: +1.3142358168
Admin Phone Ext:
Admin Fax: +1.3142358168
Admin Fax Ext:
Admin Email: att-domains@att.com
Registry Tech ID:
Tech Name: Domain Administrator
Tech Organization: AT&T SERVICES, INC.
Tech Street: 801 Chestnut Street
Tech City: Saint Louis
Tech State/Province: MO
Tech Postal Code: 63101
Tech Country: US
Tech Phone: +1.3142358168
Tech Phone Ext:
Tech Fax: +1.3142358168
Tech Fax Ext:
Tech Email: att-domains@att.com
Name Server: ns3.attdns.com
Name Server: ns1.attdns.com
Name Server: ns2.attdns.com
Name Server: ns4.attdns.com
DNSSEC: unsigned

Relationships
70.224.36.194Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
70.224.36.194Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

113.114.117.122

Ports
  • 23397 TCP
Whois

inetnum:        113.112.0.0 - 113.119.255.255
netname:        CHINANET-GD
descr:         CHINANET Guangdong province network
descr:         Data Communication Division
descr:         China Telecom
country:        CN
admin-c:        CH93-AP
tech-c:         IC83-AP
remarks:        service provider
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:     MAINT-CHINANET-GD
mnt-routes:     MAINT-CHINANET-GD
last-modified: 2016-05-04T00:15:17Z
source:         APNIC
mnt-irt:        IRT-CHINANET-CN

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@ns.chinanet.cn.net
abuse-mailbox: anti-spam@ns.chinanet.cn.net
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:         # Filtered
mnt-by:         MAINT-CHINANET
last-modified: 2010-11-15T00:31:55Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@ns.chinanet.cn.net
address:        No.31 ,jingrong street,beijing
address:        100032
phone:         +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified: 2014-02-27T03:37:38Z
source:         APNIC

person:         IPMASTER CHINANET-GD
nic-hdl:        IC83-AP
e-mail:         gdnoc_HLWI@189.cn
address:        NO.18,RO. ZHONGSHANER,YUEXIU DISTRIC,GUANGZHOU
phone:         +86-20-87189274
fax-no:         +86-20-87189274
country:        CN
mnt-by:         MAINT-CHINANET-GD
remarks:        IPMASTER is not for spam complaint,please send spam complaint to abuse_gdnoc@189.cn
abuse-mailbox: antispam_gdnoc@189.cn
last-modified: 2014-09-22T04:41:26Z
source:         APNIC

Relationships
113.114.117.122Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
113.114.117.122Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

47.206.4.145

Ports
  • 59067 TCP
Whois

Domain Name: FRONTIERNET.NET
Registry Domain ID: 4305589_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: http://www.register.com
Updated Date: 2017-09-14T07:53:05Z
Creation Date: 1995-10-14T04:00:00Z
Registry Expiry Date: 2018-10-13T04:00:00Z
Registrar: Register.com, Inc.
Registrar IANA ID: 9
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8003337680
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: AUTH.DLLS.PA.FRONTIERNET.NET
Name Server: AUTH.FRONTIERNET.NET
Name Server: AUTH.LKVL.MN.FRONTIERNET.NET
Name Server: AUTH.ROCH.NY.FRONTIERNET.NET
DNSSEC: unsigned

Domain Name: FRONTIERNET.NET
Registry Domain ID: 4305589_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: www.register.com
Updated Date: 2017-09-14T00:53:05.00Z
Creation Date: 1995-10-14T04:00:00.00Z
Registrar Registration Expiration Date: 2018-10-13T04:00:00.00Z
Registrar: REGISTER.COM, INC.
Registrar IANA ID: 9
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: FRONTIERNET HOSTMASTER
Registrant Organization:
Registrant Street: 95 N. FITZHUGH ST.
Registrant City: ROCHESTER
Registrant State/Province: NY
Registrant Postal Code: 14614-1212
Registrant Country: US
Registrant Phone: +1.8664747662
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: HOSTMASTER@FRONTIERNET.NET
Registry Admin ID:
Admin Name: FRONTIERNET HOSTMASTER
Admin Organization:
Admin Street: 95 N. FITZHUGH ST.
Admin City: ROCHESTER
Admin State/Province: NY
Admin Postal Code: 14614-1212
Admin Country: US
Admin Phone: +1.8664747662
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: HOSTMASTER@FRONTIERNET.NET
Registry Tech ID:
Tech Name: FRONTIERNET HOSTMASTER
Tech Organization:
Tech Street: 95 N. FITZHUGH ST.
Tech City: ROCHESTER
Tech State/Province: NY
Tech Postal Code: 14614-1212
Tech Country: US
Tech Phone: +1.8664747662
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: HOSTMASTER@FRONTIERNET.NET
Name Server: AUTH.DLLS.PA.FRONTIERNET.NET
Name Server: AUTH.FRONTIERNET.NET
Name Server: AUTH.LKVL.MN.FRONTIERNET.NET
Name Server: AUTH.ROCH.NY.FRONTIERNET.NET
DNSSEC: unSigned

Relationships
47.206.4.145Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
47.206.4.145Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

84.49.242.125

Ports
  • 17770 TCP
Whois

Domain Name: NEXTGENTEL.COM
Registry Domain ID: 13395561_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domaininfo.com
Registrar URL: http://www.ports.domains
Updated Date: 2017-11-10T23:44:50Z
Creation Date: 1999-11-17T15:47:51Z
Registry Expiry Date: 2018-11-17T15:47:51Z
Registrar: Ports Group AB
Registrar IANA ID: 73
Registrar Abuse Contact Email: abuse@portsgroup.se
Registrar Abuse Contact Phone: +46.707260017
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: ANYADNS1.NEXTGENTEL.NET
Name Server: ANYADNS2.NEXTGENTEL.NET
DNSSEC: unsigned

Domain Name: nextgentel.com
Registry Domain ID: 13395561_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domaininfo.com
Registrar URL: ports.domains
Updated Date: 2017-11-10T23:44:50Z
Creation Date: 1999-11-17T15:47:51Z
Registrar Registration Expiration Date: 2018-11-17T15:47:51Z
Registrar: PortsGroup AB
Registrar IANA ID: 73
Registrar Abuse Contact Email: abuse@portsgroup.se
Registrar Abuse Contact Phone: +46.317202000
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Hostmaster
Registrant Organization: NextGenTel AS
Registrant Street: Sandslimarka 31
Registrant City: SANDSLI
Registrant State/Province:
Registrant Postal Code: 5254
Registrant Country: NO
Registrant Phone: +47.55527900
Registrant Fax: +47.55527910
Registrant Email: hostmaster@nextgentel.com
Registry Admin ID:
Admin Name: Hostmaster
Admin Organization: NextGenTel AS
Admin Street: Sandslimarka 31
Admin City: Sandsli
Admin State/Province:
Admin Postal Code: 5254
Admin Country: NO
Admin Phone: +47.55527900
Admin Fax: +47.55527910
Admin Email: hostmaster@nextgentel.com
Registry Tech ID:
Tech Name: Hostmaster v/ Eivind Olsen
Tech Organization: NextGenTel AS
Tech Street: Postboks 3 Sandsli
Tech City: Bergen
Tech State/Province:
Tech Postal Code: 5861
Tech Country: NO
Tech Phone: +47.41649322
Tech Fax: +47.55527910
Tech Email: hostmaster@nextgentel.com
Name Server: ANYADNS1.NEXTGENTEL.NET
Name Server: ANYADNS2.NEXTGENTEL.NET
DNSSEC: unsigned

Relationships
84.49.242.125Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
84.49.242.125Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

26.165.218.44

Ports
  • 2248 TCP
Whois

NetRange:     26.0.0.0 - 26.255.255.255
CIDR:         26.0.0.0/8
NetName:        DISANET26
NetHandle:     NET-26-0-0-0-1
Parent:         ()
NetType:        Direct Allocation
OriginAS:    
Organization: DoD Network Information Center (DNIC)
RegDate:        1995-04-30
Updated:        2009-06-19
Ref:            https://whois.arin.net/rest/net/NET-26-0-0-0-1


OrgName:        DoD Network Information Center
OrgId:         DNIC
Address:        3990 E. Broad Street
City:         Columbus
StateProv:     OH
PostalCode:     43218
Country:        US
RegDate:        
Updated:        2011-08-17
Ref:            https://whois.arin.net/rest/org/DNIC


OrgTechHandle: MIL-HSTMST-ARIN
OrgTechName: Network DoD
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.hostmaster-dod-nic@mail.mil
OrgTechRef:    https://whois.arin.net/rest/poc/MIL-HSTMST-ARIN

OrgAbuseHandle: REGIS10-ARIN
OrgAbuseName: Registration
OrgAbusePhone: +1-844-347-2457
OrgAbuseEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgAbuseRef:    https://whois.arin.net/rest/poc/REGIS10-ARIN

OrgTechHandle: REGIS10-ARIN
OrgTechName: Registration
OrgTechPhone: +1-844-347-2457
OrgTechEmail: disa.columbus.ns.mbx.arin-registrations@mail.mil
OrgTechRef:    https://whois.arin.net/rest/poc/REGIS10-ARIN

Relationships
26.165.218.44Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
26.165.218.44Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

137.139.135.151

Ports
  • 64694 TCP
Whois

NetRange:     137.139.0.0 - 137.139.255.255
CIDR:         137.139.0.0/16
NetName:        SUC-OLDWEST
NetHandle:     NET-137-139-0-0-1
Parent:         NET137 (NET-137-0-0-0-0)
NetType:        Direct Assignment
OriginAS:    
Organization: SUNY College at Old Westbury (SCAOW)
RegDate:        1989-11-29
Updated:        2014-02-18
Ref:            https://whois.arin.net/rest/net/NET-137-139-0-0-1


OrgName:        SUNY College at Old Westbury
OrgId:         SCAOW
Address:        223 Store Hill Road
City:         Old Westbury
StateProv:     NY
PostalCode:     11568
Country:        US
RegDate:        1989-11-29
Updated:        2011-09-24
Ref:            https://whois.arin.net/rest/org/SCAOW


OrgTechHandle: SUNYO-ARIN
OrgTechName: SUNYOWNOC
OrgTechPhone: +1-516-876-3379
OrgTechEmail: sunyownoc@oldwestbury.edu
OrgTechRef:    https://whois.arin.net/rest/poc/SUNYO-ARIN

OrgAbuseHandle: SUNYO-ARIN
OrgAbuseName: SUNYOWNOC
OrgAbusePhone: +1-516-876-3379
OrgAbuseEmail: sunyownoc@oldwestbury.edu
OrgAbuseRef:    https://whois.arin.net/rest/poc/SUNYO-ARIN

RAbuseHandle: SUNYO-ARIN
RAbuseName: SUNYOWNOC
RAbusePhone: +1-516-876-3379
RAbuseEmail: sunyownoc@oldwestbury.edu
RAbuseRef:    https://whois.arin.net/rest/poc/SUNYO-ARIN

RTechHandle: SUNYO-ARIN
RTechName: SUNYOWNOC
RTechPhone: +1-516-876-3379
RTechEmail: sunyownoc@oldwestbury.edu
RTechRef:    https://whois.arin.net/rest/poc/SUNYO-ARIN

RNOCHandle: SUNYO-ARIN
RNOCName: SUNYOWNOC
RNOCPhone: +1-516-876-3379
RNOCEmail: sunyownoc@oldwestbury.edu
RNOCRef:    https://whois.arin.net/rest/poc/SUNYO-ARIN

Relationships
137.139.135.151Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
137.139.135.151Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

97.90.44.200

Ports
  • 37120 TCP
Whois

Domain Name: CHARTER.COM
Registry Domain ID: 340223_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2017-07-03T04:22:18Z
Creation Date: 1994-07-30T04:00:00Z
Registry Expiry Date: 2019-07-29T04:00:00Z
Registrar: MarkMonitor Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: abusecomplaints@markmonitor.com
Registrar Abuse Contact Phone: +1.2083895740
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Name Server: NS1.CHARTER.COM
Name Server: NS2.CHARTER.COM
Name Server: NS3.CHARTER.COM
Name Server: NS4.CHARTER.COM
DNSSEC: unsigned

Domain Name: charter.com
Registry Domain ID: 340223_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2017-12-18T04:00:14-0800
Creation Date: 1994-07-29T21:00:00-0700
Registrar Registration Expiration Date: 2019-07-28T21:00:00-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: abusecomplaints@markmonitor.com
Registrar Abuse Contact Phone: +1.2083895740
Domain Status: clientUpdateProhibited (https://www.icann.org/epp#clientUpdateProhibited)
Domain Status: clientTransferProhibited (https://www.icann.org/epp#clientTransferProhibited)
Domain Status: clientDeleteProhibited (https://www.icann.org/epp#clientDeleteProhibited)
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: Charter Communications Operating, LLC
Registrant Street: 12405 Powerscourt Drive,
Registrant City: Saint Louis
Registrant State/Province: MO
Registrant Postal Code: 63131
Registrant Country: US
Registrant Phone: +1.3149650555
Registrant Phone Ext:
Registrant Fax: +1.9064010617
Registrant Fax Ext:
Registrant Email: hostmaster@charter.com
Registry Admin ID:
Admin Name: Domain Admin
Admin Organization: Charter Communications Operating, LLC
Admin Street: 12405 Powerscourt Drive,
Admin City: Saint Louis
Admin State/Province: MO
Admin Postal Code: 63131
Admin Country: US
Admin Phone: +1.3149650555
Admin Phone Ext:
Admin Fax: +1.9064010617
Admin Fax Ext:
Admin Email: hostmaster@charter.com
Registry Tech ID:
Tech Name: Charter Communications Internet Security and Abuse
Tech Organization: Charter Communications Operating, LLC
Tech Street: 12405 Powerscourt Drive,
Tech City: Saint Louis
Tech State/Province: MO
Tech Postal Code: 63131
Tech Country: US
Tech Phone: +1.3142883111
Tech Phone Ext:
Tech Fax: +1.3149090609
Tech Fax Ext:
Tech Email: abuse@charter.net
Name Server: ns4.charter.com
Name Server: ns3.charter.com
Name Server: ns1.charter.com
Name Server: ns2.charter.com
DNSSEC: unsigned

Relationships
97.90.44.200Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
97.90.44.200Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

128.200.115.228

Ports
  • 52884 TCP
Whois

Domain Name: UCI.EDU

Registrant:
University of California, Irvine
6366 Ayala Science Library
Irvine, CA 92697-1175
UNITED STATES

Administrative Contact:
Con Wieland
University of California, Irvine
Office of Information Technology
6366 Ayala Science Library
Irvine, CA 92697-1175
UNITED STATES
(949) 824-2222
oit-nsp@uci.edu

Technical Contact:
Con Wieland
University of California, Irvine
Office of Information Technology
6366 Ayala Science Library
Irvine, CA 92697-1175
UNITED STATES
(949) 824-2222
oit-nsp@uci.edu

Name Servers:
NS4.SERVICE.UCI.EDU     128.200.59.190
NS5.SERVICE.UCI.EDU     52.26.131.47

Domain record activated:    30-Sep-1985
Domain record last updated: 07-Jul-2016
Domain expires:             31-Jul-2018

Relationships
128.200.115.228Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
128.200.115.228Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

186.169.2.237

Ports
  • 65292 TCP
Whois

inetnum:     186.168/15
status:     allocated
aut-num:     N/A
owner:     COLOMBIA TELECOMUNICACIONES S.A. ESP
ownerid:     CO-CTSE-LACNIC
responsible: Administradores Internet
address:     Transversal 60, 114, A 55
address:     N - BOGOTA - Cu
country:     CO
phone:     +57 1 5339833 []
owner-c:     CTE7
tech-c:     CTE7
abuse-c:     CTE7
inetrev:     186.169/16
nserver:     DNS5.TELECOM.COM.CO
nsstat:     20171220 AA
nslastaa:    20171220
nserver:     DNS.TELECOM.COM.CO
nsstat:     20171220 AA
nslastaa:    20171220
created:     20110404
changed:     20141111

nic-hdl:     CTE7
person:     Grupo de Administradores Internet
e-mail:     admin.internet@TELECOM.COM.CO
address:     Transversal, 60, 114 A, 55
address:     571111 - BOGOTA DC - CU
country:     CO
phone:     +57 1 7050000 [71360]
created:     20140220
changed:     20140220

Relationships
186.169.2.237Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
186.169.2.237Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
Description

A high port to high port connection attempt is made to this IP address from 'Malware2.dll'. No domain is associated with the IP address.

4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761

Tags

trojan

Details
Name42682D4A78FE5C2EDA988185A344637D
Name4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
Size346624 bytes
TypePE32+ executable (DLL) (console) x86-64, for MS Windows
MD542682d4a78fe5c2eda988185a344637d
SHA14975de2be0a1f7202037f5a504d738fe512191b7
SHA2564a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
SHA512213e4a0afbfac0bd884ab262ac87aee7d9a175cff56ba11aa4c75a4feb6a96c5e4e2c26adbe765f637c783df7552a56e4781a3b17be5fda2cf7894e58eb873ec
ssdeep6144:nCgsFAkxS1rrtZQXTip12P04nTnvze6lxjWV346vze6lpjWV34Evze6lSjWV34a7:nCgsukxS1vtZ+5nvze6lxjWV346vze6N
Entropy6.102810
Antivirus
AhnlabTrojan/Win32.Generic
AntiyTrojan/Win64.NukeSped
AviraTR/NukeSped.tbxxd
BitDefenderTrojan.GenericKD.41198710
CyrenW64/Trojan.NKDY-0871
ESETa variant of Win64/NukeSped.T trojan
EmsisoftTrojan.GenericKD.41198710 (B)
IkarusTrojan.Win64.Nukesped
K7Trojan ( 0054bc321 )
McAfeeGeneric Trojan.ix
Microsoft Security EssentialsTrojan:Win64/Hoplight
Quick HealTrojan.Hoplight.S5795935
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
TrendMicroTrojan.A7CCF529
TrendMicro House CallTrojan.A7CCF529
VirusBlokAdaTrojan.Win64.Hoplight
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-06-06 11:24:44-04:00
Import Hashe395fbfa0104d0173b3c4fdd3debdceb
Company NameKamsky Co,.Ltd
File DescriptionVote_Controller
Internal NameMDL_170329_x86_V06Lv3
Legal CopyrightCopyright \u24d2 2017
Original FilenameVote_Controller
Product NameKamsky ColdFear
Product Version17, 0, 0, 0
PE Sections
MD5NameRaw SizeEntropy
40d66d1a2f846d7c3bf291c604c9fca3header10242.628651
d061ffec6721133c433386c96520bc55.text2841605.999734
cbbc6550dcbdcaf012bdbf758a377779.rdata389125.789426
c83bcaab05056d5b84fc609f41eed210.data76803.105496
b9fc36206883aa1902566b5d01c27473.pdata87045.319307
1c1d46056b4cb4627a5f92112b7e09f7.rsrc40965.608168
3baedaa3d6b6d6dc9fb0ec4f5c3b007c.reloc20482.331154
Relationships
4a74a9fd40...Connected_To21.252.107.198
4a74a9fd40...Connected_To70.224.36.194
4a74a9fd40...Connected_To113.114.117.122
4a74a9fd40...Connected_To47.206.4.145
4a74a9fd40...Connected_To84.49.242.125
4a74a9fd40...Connected_To26.165.218.44
4a74a9fd40...Connected_To137.139.135.151
4a74a9fd40...Connected_To97.90.44.200
4a74a9fd40...Connected_To128.200.115.228
4a74a9fd40...Connected_To186.169.2.237
Description

This artifact is a malicious 64bit Windows dynamic library called 'Vote_Controller.dll'. The file shares similar functionality with 'rdpproto.dll' above, and attempts to connect to the same ten IP addresses.

42682D4A78FE5C2EDA988185A344637D also contains the same public SSL certificate as many of the artifacts above.

The file contains the following notable strings:

---Begin Notable Strings---

CompanyName
Kamsky Co, .Ltd
FileDescription
Vote_Controller
FileVersion
49, 0, 0, 0
InternalName
MDL_170329_x86_V06Lv3
LegalCopyright
Copyright
2017
LegalTrademarks
OriginalFileName
Vote_Controller
PrivateBuild
ProductName
Kamsky ColdFear
ProductVersion
17, 0, 0, 0

---End Notable Strings---

83228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a

Tags

trojan

Details
Name3021B9EF74c&BDDF59656A035F94FD08
Name83228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a
Size245760 bytes
TypePE32+ executable (DLL) (console) x86-64, for MS Windows
MD53021b9ef74c7bddf59656a035f94fd08
SHA105ad5f346d0282e43360965373eb2a8d39735137
SHA25683228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a
SHA512f8fcc5ed34b7bf144fc708d01d9685f0cb2e678c173d014987d6ecbf4a7c3ed539452819237173a2ab14609a913cf46c3bd618cffe7b5990c63cfe805a7144ff
ssdeep6144:4+ZmN/ix9bd+Rvze6lxjWV346vze6lpjWV34Evze6lSjWV34avze6lkjWV34z5FT:4+ZmN/ix9b8Rvze6lxjWV346vze6lpjn
Entropy5.933390
Antivirus
AhnlabTrojan/Win64.Hoplight
AntiyTrojan/Win32.Hoplight
AviraTR/AD.APTLazerus.ltfzr
BitDefenderTrojan.Agent.DVDE
CyrenW64/Trojan.KDWH-2913
ESETa variant of Win64/NukeSped.BW trojan
EmsisoftTrojan.Agent.DVDE (B)
IkarusTrojan.Agent
K7Riskware ( 0040eff71 )
McAfeeGeneric Trojan.jp
Microsoft Security EssentialsTrojan:Win64/Hoplight
Quick HealTrojan.Generic
SophosTroj/Hoplight-C
SymantecTrojan.Hoplight
TrendMicroTrojan.A7CCF529
TrendMicro House CallTrojan.A7CCF529
VirusBlokAdaTrojan.Win64.Hoplight
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-05-16 02:44:21-04:00
Import Hashca767ccbffbed559cbe77c923e3af1f8
Company NameKamsky Co,.Ltd
File DescriptionVote_Controller
Internal NameMDL_170329_x86_V06Lv3
Legal CopyrightCopyright \u24d2 2017
Original FilenameVote_Controller
Product NameKamsky ColdFear
Product Version17, 0, 0, 0
PE Sections
MD5NameRaw SizeEntropy
83ec15e3cf335f784144db4208b328c9header10242.790421
036c57e89ea3a6afa819c242c5816b70.text2068485.688491
4812d2f39e9a8ae569370d423ba31344.rdata261126.000116
cb41e8f63b7c22c401a0634cb4fe1909.data20484.748331
3cc7651747904bfe94ed18f44354a706.pdata51204.962073
9e92c54604ea67e76210c3c914e9608c.rsrc40965.606351
71dcfb1ec7257ee58dcc20cafb0be691.reloc5120.673424
Relationships
83228075a6...Connected_To112.175.92.57
Description

This artifact is 64bit Windows dynamic library file which shares many of the same characteristics and name (Vote_Controller.dll) as 42682D4A78FE5C2EDA988185A344637D above.

When this library is loaded it will look for the file 'udbcgiut.dat' in C:\WINDOWS. If 'udbcgiut.dat' is not found, the file will attempt connections to the same ten IP addresses described under 'rdpproto.dll' above.

One notable difference with this variant is that it uses the Windows Management Instrumentation (WMI) process to recompile the Managed Object Format (MOF) files in the WMI repository. At runtime, the malware will enumerate the drivers located in the registry at HKLM\Software\WBEM\WDM.
These files are then recompiled by invoking wmiprvse.exe through svchost.exe: "C:\Windows\system32\wbem\wmiprvse.exe -Embedding".
MOF files are written in a SQL-like language and are run (compiled) by the operating system when a predetermined event takes place. Recent malware variants have been observed modifying the MOF files within the system registry to run specific commands and create persistency on the system.

Of note, the paravirtual SCSI driver for VMWare Tools is also located in HKLM\Software\WBEM\WDM within a virtual image. When this driver is recompiled by the malware, VMWare Tools no longer works. It cannot be determined if this is an intentional characteristic of the malware to hinder analysis, or simply a symptom of the method used to establish persistence.

70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3

Tags

trojan

Details
Name61E3571B8D9B2E9CCFADC3DDE10FB6E1
Size258052 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD561e3571b8d9b2e9ccfadc3dde10fb6e1
SHA155daa1fca210ebf66b1a1d2db1aa3373b06da680
SHA25670034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
SHA512235f7b920f54c4d316386cbf6cc14db1929029e8053270e730be15acc8e9f333231d2d984681bea26013a1d1cf4670528ba0989337be13ad4ada3eeba33bdfe8
ssdeep6144:d71TKN7LBHvS+bujAfrsxwkm1Ka5l7gTtJUGx:dxKHPuj8WR0K6VgTtZx
Entropy7.829590
Antivirus
AhnlabTrojan/Win32.Hoplight
AntiyTrojan/Win32.NukeSped
AviraTR/NukeSped.oppme
BitDefenderDropped:Trojan.Generic.22954895
EmsisoftDropped:Trojan.Generic.22954895 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005329311 )
McAfeeTrojan-Hoplight
Microsoft Security EssentialsTrojan:Win32/Nukesped.PA!MTB
NANOAVTrojan.Win32.NukeSped.fpblwf
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/Hoplight-C
SymantecTrojan.Gen.MBT
TrendMicroTrojan.55DEE3DA
TrendMicro House CallTrojan.55DEE3DA
Yara Rules
hidden_cobra_consolidated.yararule crypt_constants_2 { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2018-04-19" Category = "Hidden_Cobra" Family = "n/a" Description = "n/a" strings: $ = {efcdab90} $ = {558426fe} $ = {7856b4c2} condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and all of them }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2016-08-23 00:19:59-04:00
Import Hash8e253f83371d82907ff72f57257e3810
PE Sections
MD5NameRaw SizeEntropy
84f39a6860555231d60a55c72d07bc5eheader40960.586304
649c24790b60bda1cf2a85516bfc7fa0.text245765.983290
fbd6ca444ef8c0667aed75820cc99dce.rdata40963.520964
0ecb4bcb0a1ef1bf8ea4157fabdd7357.data40963.988157
Packers/Compilers/Cryptors
Installer VISE Custom
Relationships
70034b33f5...Droppedcd5ff67ff773cc60c98c35f9e9d514b597cbd148789547ba152ba67bfc0fec8f
70034b33f5...Dropped70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
70034b33f5...Dropped96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7
70034b33f5...Connected_To81.94.192.147
70034b33f5...Connected_To112.175.92.57
70034b33f5...Connected_To181.39.135.126
70034b33f5...Connected_To197.211.212.59
70034b33f5...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
Description

This artifact is a malicious PE32 executable. When executed, the artifact sets up the service, 'Network UDP Trace Management Service'.
To set up the service, the program drops a dynamic library, 'UDPTrcSvc.dll' into the %System32% directory.
Next, the following registry keys are added:

---Begin Registry Keys---

HKLM\SYSTEM\CurrentControlSet\services\UDPTrcSvc Name: Type Value: 20
HKLM\SYSTEM\CurrentControlSet\services\UDPTrcSvc Name: Start Value: 02
HKLM\SYSTEM\CurrentControlSet\services\UDPTrcSvc Name: ImagePath Value: "%SystemRoot%\System32\svchost.exe -k mdnetuse"
HKLM\SYSTEM\CurrentControlSet\services\UDPTrcSvc Name: DisplayName Value: "Network UDP Trace Management Service"
HKLM\SYSTEM\CurrentControlSet\services\UDPTrcSvc Name: ObjectName Value: "LocalSystem"
HKLM\SYSTEM\CurrentControlSet\services\UDPTrcSvc\Parameters Name: ServiceDll Value: "%SystemRoot%\System32\svchost.exe -k mdnetuse"
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\mdnetuse

---End Registry Keys---

The service is started by invoking svchost.exe.

After writing 'UDPTrcSvd.dll' to disk, the program drops two additional files. Similar to 5C3898AC7670DA30CF0B22075F3E8ED6 above, the program writes the file 'udbcgiut.dat' to the victim's profile at %AppData/Local/Temp%. A second file is written to the victim's profile in the %AppData/Local/VirtualStore/Windows% directory and identified as 'MSDFMAPI.INI'. 'MSDFMAPI.INI' is also written to C:\WINDOWS. More information on the content of these files is below.

61E3571B8D9B2E9CCFADC3DDE10FB6E1 attempts the same outbound connections as 5C3898AC7670DA30CF0B22075F3E8ED6, however the file does not contain any of the public SSL certificates referenced above.

cd5ff67ff773cc60c98c35f9e9d514b597cbd148789547ba152ba67bfc0fec8f

Tags

backdoortrojan

Details
NameUDPTrcSvc.dll
Size221184 bytes
TypePE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD50893e206274cb98189d51a284c2a8c83
SHA1d1f4cf4250e7ba186c1d0c6d8876f5a644f457a4
SHA256cd5ff67ff773cc60c98c35f9e9d514b597cbd148789547ba152ba67bfc0fec8f
SHA5128042356ff8dc69fa84f2de10a4c34685c3ffa798d5520382d4fbcdcb43ae17e403a208be9891cca6cf2bc297f767229a57f746ca834f6b79056a0ff1202941cf
ssdeep3072:WsyjTzEvLFOL8AqCiueLt1VFu9+zcSywy0mcj90nSJ5NatCmtWwNQLK:W/zEvLFOLdq9uebdSwHN9n5wtkwNwK
Entropy6.359677
Antivirus
AhnlabBackdoor/Win32.Akdoor
AntiyTrojan/Win32.AGeneric
AviraTR/NukeSped.davct
BitDefenderTrojan.Generic.22954895
ESETWin32/NukeSped.AI trojan
EmsisoftTrojan.Generic.22954895 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005329311 )
McAfeeTrojan-Hoplight
Microsoft Security EssentialsTrojan:Win32/Hoplight
NANOAVTrojan.Win32.NukeSped.fcodob
Quick HealTrojan.Hoplight
SophosTroj/Hoplight-C
SymantecTrojan.Gen.MBT
Systweakmalware.gen-ra
TrendMicroTrojan.CCD7B260
TrendMicro House CallTrojan.CCD7B260
VirusBlokAdaTrojan.Tiggre
Zillya!Trojan.NukeSped.Win32.73
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2016-08-23 00:23:04-04:00
Import Hash30d3466536de2b423897a3c8992ef999
PE Sections
MD5NameRaw SizeEntropy
d37b95aa17fa132415b37ec777f439ffheader40960.709908
badbc93c35554aec904ab0c34f05fbe0.text1802246.295472
64f7a9cafdad34003aba4547bba0e25b.rdata163846.372911
c792eb0c57577f4f3649775cbf32b253.data122883.996008
8791f715ae89ffe2c7d832c1be821edc.reloc81925.154376
Relationships
cd5ff67ff7...Dropped_By70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
Description

This artifact is a malicious 32bit Windows dynamic library. 'UDPTrcSvc.dll' is identified as the 'Network UDP Trace Management Service'. The following description is provided:

---Begin Service Description---

Network UDP Trace Management Service Hosts TourSvc Tracing. If this service is stopped, notifications of network trace will no longer function and there might not be access to service functions. If this service is disabled, notifications of and monitoring to network state will no longer function.

---End Service Description---

The service is invoked with the command, 'C:\Windows\System32\svchost.exe -k mdnetuse'.
When the service is run a modification to the system firewall is attempted, 'cmd.exe /c netsh firewall add portopening TCP 0 "adp"'.

Unlike many of the files listed above that use a public certificate from naver.com, 'UDPTrcSvc.dll' uses a public SSL certificate from google.com.

96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7

Tags

trojan

Details
NameMSDFMAPI.INI
Size2 bytes
Typedata
MD5c4103f122d27677c9db144cae1394a66
SHA11489f923c4dca729178b3e3233458550d8dddf29
SHA25696a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7
SHA5125ea71dc6d0b4f57bf39aadd07c208c35f06cd2bac5fde210397f70de11d439c62ec1cdf3183758865fd387fcea0bada2f6c37a4a17851dd1d78fefe6f204ee54
ssdeep3::
Entropy0.000000
Antivirus
NetGateTrojan.Win32.Malware
Yara Rules

No matches found.

ssdeep Matches
100028f5531e8593ce6faf30dd5c5131abf1400fc4deb4d322f3f39578f14348be1
100132fde08d7f788dece120e98bf6c794bafb655959764798ead053b872d097638
100200608c94d52d33ff86b8f4db28451752eeae7c70062488f380f112e11b4350a
1002d07a41ae992770085117e9815300bfd0730745883e60b24aaad5e69dfc087ae
1003d1066ae1cd00d635b2131664a7d0d5483554901ed6aae9d627b697ecb02718e
1005309e677c79cffae49a65728c61b436d3cdc2a2bab4c81bf0038415f74a56880
100c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
Relationships
96a296d224...Dropped_By70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
96a296d224...Dropped_By2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
Description

'MSDFMAPI.INI' is written to C:\WINDOWS and to %UserProfile\AppData\Local\VirtualStore\Windows%. During analysis, two NULL characters were written to the file. The purpose of the file has not been determined.

d77fdabe17cdba62a8e728cbe6c740e2c2e541072501f77988674e07a05dfb39

Tags

trojan

Details
NameF8D26F2B8DD2AC4889597E1F2FD1F248
Named77fdabe17cdba62a8e728cbe6c740e2c2e541072501f77988674e07a05dfb39
Size456241 bytes
Typedata
MD5f8d26f2b8dd2ac4889597e1f2fd1f248
SHA1dd132f76a4aff9862923d6a10e54dca26f26b1b4
SHA256d77fdabe17cdba62a8e728cbe6c740e2c2e541072501f77988674e07a05dfb39
SHA51234f8d10ebcab6f10c5140e94cf858761e9fa2e075db971b8e49c7334e1d55237f844ed6cf8ce735e984203f58d6b5032813b55e29a59af4bfff3853b1d07bc44
ssdeep12288:MG31DF/ubokxmgF8JsVusikiWxdj3tIQLYe:NlI0UV0ou1kiWvm4Ye
Entropy7.999350
Antivirus
AhnlabBinImage/Agent
AntiyTrojan/Win32.Casdet
AviraTR/Agent.anrq
BitDefenderTrojan.Agent.DVDS
CyrenTrojan.GTWY-8
EmsisoftTrojan.Agent.DVDS (B)
IkarusTrojan.Agent
McAfeeTrojan-Hoplight.b
Yara Rules

No matches found.

ssdeep Matches

No matches found.

Description

This artifact contains a similar public SSL certificate from naver.com, similar to many of the files above. The payload of the file appears to be encoded with a password or key. No context was provided with the file's submission.

b9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101

Tags

trojan

Details
Name2A791769AA73AC757F210F8546125B57
Size110592 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD52a791769aa73ac757f210f8546125b57
SHA1269f1cc44f6b323118612bde998d17e5bfbf555e
SHA256b9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101
SHA5121e88edf97f62282323928a304762864d69e0e5a1b98c7824cf7ee8af92a5a7d17586e30165c6b6ec4b64ea64dd97d6f2b3a3ef880debc8c6eaed1e63f9ce9a97
ssdeep1536:BdQGY/Ni+mo06N1homALeoYbrAUD7Qum5T9Xlxgj5MX7jbthYWL3:DQGYFFzxAgoYbrAOQum5TsgjbHP
Entropy6.406443
Antivirus
AhnlabTrojan/Win32.Akdoor
AntiyTrojan/Win32.Autophyte
AviraTR/AD.APTLazerus.zobau
BitDefenderGen:Variant.Graftor.487501
CyrenW32/Trojan.BCDT-8700
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Graftor.487501 (B)
HuorongTrojan/NukeSped.a
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Autophyte.E!dha
NANOAVTrojan.Win32.NukeSped.fyoobu
Quick HealTrojan.Generic
SophosTroj/NukeSpe-G
SymantecTrojan Horse
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
VirusBlokAdaBScope.Trojan.Autophyte
Zillya!Trojan.NukeSped.Win32.158
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-08-11 01:03:45-04:00
Import Hashe56949fef3294200cb30be8009694a42
PE Sections
MD5NameRaw SizeEntropy
3d755df7f28ddb5a661a68637cfdf23eheader40960.647583
8f28409d19efb02746f0cc7f186ac3e3.text860166.553916
03ec21be9a3702ad9b6a107a387c2be1.rdata163845.844150
cecd220a4af1182a425b07c4547fd1e6.data40962.638490
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0
Relationships
b9a26a5692...Connected_To117.239.241.2
b9a26a5692...Connected_To195.158.234.60
b9a26a5692...Connected_To218.255.24.226
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

--Begin IP List--

117.239.241.2
218.255.24.226
195.158.234.60

--End IP List--

Client uses uk.yahoo.com for client hello server name instead of naver.com.
 

117.239.241.2

Relationships
117.239.241.2Connected_Fromb9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101

218.255.24.226

Relationships
218.255.24.226Connected_Fromb9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101

195.158.234.60

Relationships
195.158.234.60Connected_Fromb9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101

1a01b8a4c505db70f9e199337ce7f497b3dd42f25ad06487e29385580bca3676

Tags

trojan

Details
Name07D2B057D2385A4CDF413E8D342305DF
Size2608223 bytes
TypePE32+ executable (GUI) x86-64, for MS Windows
MD507d2b057d2385a4cdf413e8d342305df
SHA11991e7797b2e97179b7604497f7f6c39eba2229b
SHA2561a01b8a4c505db70f9e199337ce7f497b3dd42f25ad06487e29385580bca3676
SHA512fa2535b08c43c0dae210c12c4a5445925723d50f8828e0d0b89ec70d08aaa2f1d222eea9fd4be40c46c9024b3ed9bfe33e16724496c1c4f90ea6fdc8891c5fee
ssdeep49152:2sn+T/ymkSsvc1vb+oNEOaPmztSWNz25hqhbR5C7kcaFZweRrjxQTgZdy:2sck5ojp+Ef25al5CyjwSJQMzy
Entropy7.981828
Antivirus
AhnlabTrojan/Win32.Akdoor
AntiyTrojan/Win64.NukeSped
AviraTR/NukeSped.cgnux
BitDefenderTrojan.GenericKD.41793016
CyrenW64/Trojan.DUQO-0431
ESETa variant of Win64/NukeSped.AH trojan
EmsisoftTrojan.GenericKD.41793016 (B)
IkarusTrojan.Win64.Nukesped
K7Trojan ( 00545d8d1 )
McAfeeTrojan-HidCobra.a
Microsoft Security EssentialsTrojan:Win32/Casdet!rfn
NANOAVTrojan.Win64.NukeSped.gayjsq
Quick HealTrojan.Casdet
SophosTroj/NukeSpe-H
SymantecTrojan.Hoplight
TACHYONTrojan/W64.Agent.2608223
TrendMicroTSPY_KI.58F058EF
TrendMicro House CallTSPY_KI.58F058EF
VirusBlokAdaTrojan.Agent
Zillya!Trojan.Agent.Win32.1135323
Yara Rules

No matches found.

ssdeep Matches

No matches found.

PE Metadata
Compile Date2018-02-12 15:06:28-05:00
Import Hash347c977c6137a340c7cc0fcd5b224aef
PE Sections
MD5NameRaw SizeEntropy
28fc69ad12a0765af4cc06fbd261cb24header10242.672166
88425c71e7e293d43db9868e4693b365.text890886.415516
bb0048e4f3851ea07b365828ddf613f7.rdata266244.912250
50e3efe1a6ea325c87f8e86e2fbd40b4.data56322.093641
f56a65eb9562d6c6d607f867d1d0fd09.pdata46084.725531
6a9a84d523e53e1d43c31b2cc069930c.rsrc15364.308150
dab5e290c15de9634d93d8f592a44633.reloc15362.912599
Packers/Compilers/Cryptors
Microsoft Visual C++ 8.0 (DLL)
Description

This artifact is a malicious 64bit Windows dynamic library. When run the malware drops a Themida packed DLL. This DLL runs and drops another DLL that acts as the Remote admin tool. This RAT is very similar to version 2 in op codes and functionality however it uses real TLS instead of the LFSR encryption. Additionally it encodes it's data with XOR Ox47 SUB Ox28 prior to being TLS encrypted.

73dcb7639c1f81d3f7c4931d32787bdf07bd98550888c4b29b1058b2d5a7ca33

Tags

trojan

Details
Name3EDCE4D49A2F31B8BA9BAD0B8EF54963
Size147456 bytes
TypePE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD53edce4d49a2f31b8ba9bad0b8ef54963
SHA11209582451283c46f29a5185f451aa3c989723c9
SHA25673dcb7639c1f81d3f7c4931d32787bdf07bd98550888c4b29b1058b2d5a7ca33
SHA5120d3de1758b44597ccc4dad46a9b42626237da425a41b8833bf7549a3c809bd7432ce938cd8757b362e2268bead45a0b212c96cc881737cf0e6952097280d7277
ssdeep3072:bQGYFFzsaXlvJdbx9NAzDZWaNoh05WKRYW7IWwh7:bSFhLlh9N8DZWaNoG5W8VIWC
Entropy6.605430
Antivirus
AhnlabTrojan/Win32.Akdoor
AntiyTrojan/Win32.Autophyte
AviraTR/AD.APTLazerus.jtxjg
BitDefenderGen:Variant.Zusy.290462
CyrenW32/Trojan.DXJJ-0934
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Zusy.290462 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Autophyte.E!dha
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/NukeSpe-I
SymantecTrojan.Hoplight
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
VirusBlokAdaTrojan.Autophyte
Zillya!Trojan.NukeSped.Win32.154
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-07-11 14:26:59-04:00
Import Hashcf3e2269004b18054d77ec54601edfd1
PE Sections
MD5NameRaw SizeEntropy
f31fc1b632aa011a29b506385890b3bbheader40960.703326
0b401c68fa1a8f024f25189b31fd8caf.text1187846.634510
78ad5231f5184af8093a2f31ef1f9952.rdata163846.126224
8c48fdefd1785500380702796882a0b6.data40963.860135
e6b0be8044e573ca9fc84de173a7ca3d.reloc40965.404736
Packers/Compilers/Cryptors
Microsoft Visual C++ 6.0 DLL
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

This file is dropped by a different binary into System32 and then run as a service. When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

--Begin IP List--

192.168.1.2

--End IP List--

Client uses uk.yahoo.com for client hello server name instead of naver.com.

084b21bc32ee19af98f85aee8204a148032ce7eabef668481b919195dd62b319

Tags

trojan

Details
Name170A55F7C0448F1741E60B01DCEC9CFB
Size197632 bytes
TypePE32+ executable (DLL) (GUI) x86-64, for MS Windows
MD5170a55f7c0448f1741e60b01dcec9cfb
SHA1b6b84783816cca123adbc18e78d3b847f04f1d32
SHA256084b21bc32ee19af98f85aee8204a148032ce7eabef668481b919195dd62b319
SHA512a014cf5772ed993951dc62026e3acef174c424e47fd56583a1563c692ac3ed2ae5e1d51d34974ed04db11824dc9c76290297244e28e5d848cd8b3a05b509ab1e
ssdeep6144:XT1NVhDJSUaZcdHItR3SG88+Tlm5T7BRWj:xx9tuVSe+Tlm5Tt
Entropy6.262340
Antivirus
AhnlabTrojan/Win32.Akdoor
AntiyTrojan/Win32.Casdet
AviraTR/AD.APTLazerus.dsenk
BitDefenderTrojan.GenericKD.32643407
CyrenW64/Trojan3.AOLF
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftTrojan.GenericKD.32643407 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005233111 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Casdet!rfn
NANOAVTrojan.Win64.NukeSped.fzpbxb
Quick HealTrojan.Multi
SophosTroj/NukeSpe-G
SymantecTrojan.Hoplight
TrendMicroTROJ64_.655BEC93
TrendMicro House CallTROJ64_.655BEC93
VirusBlokAdaTrojan.Agent
Zillya!Trojan.Agent.Win32.1134660
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-05-03 22:40:47-04:00
Import Hash0675d7e21ce264449360c0b797c279e7
PE Sections
MD5NameRaw SizeEntropy
48a2d611f70a4718084857fa2f732b21header10242.780205
aaf67ea89d12bea95c148274c71ebac5.text445446.440744
91171a72af025ca7098ba6c94ecbb2a0.rdata256003.935800
fc2a61b6f1b29162f93fad1660c4b8af.data1203206.379891
114b795f9c567e0a81a04cec6ae1a0b4.pdata25604.287495
17c80d03f2f5729407ec55eca7e1f5b2.rsrc20482.948558
c9243c94e36bc012d7d5eb0a3f588dfb.reloc15365.079827
Description

This artifact is a malicious 64bit Windows dynamic library. The DLL can be run using the DoStart export. This export calls write file to load the actual implant into a file "C:\windows\msncone.exe" and then calls Win Exec to execute the implant.

c66ef8652e15b579b409170658c95d35cfd6231c7ce030b172692f911e7dcff8

Tags

trojan

Details
NameE4ED26D5E2A84CC5E48D285E4EA898C0
Size157696 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD5e4ed26d5e2a84cc5e48d285e4ea898c0
SHA1c3d28d8e49a24a0c7082053d22597be9b58302b1
SHA256c66ef8652e15b579b409170658c95d35cfd6231c7ce030b172692f911e7dcff8
SHA5120c0b8fa4e83036b9dbe88b193e93b412c47eee8c6f4b04f04082288d7dce0f0d687e7581e624145bd357e5ad70584b9ab4d9f5a950afe8389696523697940998
ssdeep3072:MzviXzovLFOLUAqWilvLc1V2n9+zEty7+LEfq0Mg3ewPWTc:Mzv+zovLFOLFqhlvlQz7ZqueweT
Entropy6.446363
Antivirus
AhnlabTrojan/Win32.Crypt
AntiyTrojan/Win32.Casdet
AviraTR/AD.APTLazerus.tmifd
BitDefenderTrojan.GenericKD.32416111
CyrenW32/Trojan.GVKT-3327
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftTrojan.GenericKD.32416111 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Nukesped.PA!MTB
NANOAVTrojan.Win32.NukeSped.fzlqhl
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/NukeSpe-E
SymantecTrojan.Hoplight
TrendMicroTROJ_FR.D1E707E2
TrendMicro House CallTROJ_FR.D1E707E2
Vir.IT eXplorerTrojan.Win32.Genus.BRN
VirusBlokAdaTrojan.Casdet
Zillya!Trojan.NukeSped.Win32.153
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-10-23 16:44:37-04:00
Import Hash861401f76d1251e0d08a8ade1a5ed38c
PE Sections
MD5NameRaw SizeEntropy
0aa18a6525a2203ee52f6df5f9622dcbheader10242.637312
33e3584e4c52c24e16fc108224a3f6a3.text1326086.153434
8a43450710359fae49269f1217924cf5.rdata168966.299497
b0c95d35585e130bea58057c11e9d53b.data35845.455587
3a4fdc31bb49b29d6f19b94641d14ee8.rsrc5125.112624
f74e21bd34aa3a05131ae77f0b48c2b2.reloc30725.875833
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Description

This artifact is a malicious PE32 executable that is an add-on tool for other Hoplight implants.

When malware is run it opens a log file C:\WINDOWS\Temp\ndb.dat that is used for the remainder of the program to log all activity.

The malware runs with an IP as an argument. It sends out a beacon to this IP and connects to it using the same FakeTLS/PolarSSL protocol as the other samples. After a successful connection to a C2, it uses a named pipe called \\\\.\\pipe\\AnonymousPipe to connect to a running implant and sends tasking to the running implant. The implant returns the results of these taskings over the named pipe and the malware sends the results back to the C2.

fe43bc385b30796f5e2d94dfa720903c70e66bc91dfdcfb2f3986a1fea3fe8c5

Tags

trojan

Details
NameF315BE41D9765D69AD60F0B4D29E4300
Size147456 bytes
TypePE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5f315be41d9765d69ad60f0b4d29e4300
SHA1f60c2bd78436a14e35a7e85feccb319d3cc040eb
SHA256fe43bc385b30796f5e2d94dfa720903c70e66bc91dfdcfb2f3986a1fea3fe8c5
SHA512bc8f821b4989076e441fbe5668cee0a388adcc375fac4a553f4c27423cd61c4500739820033b32f4197820ddf34decf1a043c6d34619aa18e1a932feb4e4233b
ssdeep3072:pQWbIWSG5bzxbT33FiDZWTNArLioB4Gwhes:pR3SGtJ33YDZWTNMLiGah
Entropy6.477832
Antivirus
AhnlabTrojan/Win32.Agent
AntiyTrojan/Win32.Autophyte
AviraTR/AD.APTLazerus.ifaaj
BitDefenderGen:Variant.Graftor.487501
CyrenW32/Trojan.CTPG-1488
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Graftor.487501 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Autophyte.E!dha
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/NukeSpe-D
SymantecTrojan Horse
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
VirusBlokAdaBScope.Trojan.Autophyte
Zillya!Trojan.NukeSped.Win32.161
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-08-21 12:39:06-04:00
Import Hash00c4520b07e61d244e7e7b942ebae39f
PE Sections
MD5NameRaw SizeEntropy
7991745d0f6ed295154f066bb53ccbc2header40960.767780
cd39ffb10726106d9b85172804784b97.text1146886.620841
3ab93f20dc7859f5510efbf121790dd7.rdata163845.991690
9fdf9be0cd049c58cb3718927458e69c.data40963.880827
330d3d9d2c3c1a342547cea468095f2a.rsrc40961.138029
cefd737bf48bc8375f92c8f7d9755e3a.reloc40965.221555
Packers/Compilers/Cryptors
Microsoft Visual C++ 6.0 DLL

f8f7720785f7e75bd6407ac2acd63f90ab6c2907d3619162dc41a8ffa40a5d03

Tags

trojan

Details
NameD2DA675A8ADFEF9D0C146154084FFF62
Size139264 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD5d2da675a8adfef9d0c146154084fff62
SHA1c55d080ea24e542397bbbfa00edc6402ec1c902c
SHA256f8f7720785f7e75bd6407ac2acd63f90ab6c2907d3619162dc41a8ffa40a5d03
SHA51206f531e49154d59f684475da95693df1fccd50b505e6d3ca028c9d84fcfc79ef287704dd0b24b022bfac6ba9ee581d19f440773dd00cfcfecf068b644ecbecb5
ssdeep3072:1QGYFFzYCGUXBk/hbpjYr9Lde0NPV1Y88PxbE:1SFhYaXBkjYJLde0Nd1Hqb
Entropy6.605300
Antivirus
AhnlabTrojan/Win32.Akdoor
AntiyTrojan/Win32.Autophyte
AviraTR/AD.APTLazerus.denpe
BitDefenderGen:Variant.Graftor.487501
CyrenW32/Trojan.ATKI-5308
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Graftor.487501 (B)
HuorongTrojan/NukeSped.a
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-FPIA!D2DA675A8ADF
Microsoft Security EssentialsTrojan:Win32/Autophyte.E!dha
NANOAVTrojan.Win32.NukeSped.fyopnf
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/NukeSpe-F
SymantecTrojan Horse
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
VirusBlokAdaBScope.Trojan.Autophyte
Zillya!Trojan.NukeSped.Win32.146
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-07-14 18:40:25-04:00
Import Hash86e90e40d8e53d1e5b06a22353734ed4
PE Sections
MD5NameRaw SizeEntropy
bf34ee8fcf71c0aa14531ae02d74f359header40960.647238
66e2b83909b4d47d3e3d20ad44df1acc.text1146886.660284
d20ad0b8b42883ae6eb4c89cfbbd893b.rdata163846.057701
5e1b09084dfc15dda52bdac606eaed3d.data40963.824972
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

--Begin IP List--

10.10.30.130

--End IP List--

Client uses uk.yahoo.com for client hello server name instead of naver.com.

32ec329301aa4547b4ef4800159940feb950785f1ab68d85a14d363e0ff2bc11

Tags

trojan

Details
Name38FC56965DCCD18F39F8A945F6EBC439
Size122880 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD538fc56965dccd18f39f8a945f6ebc439
SHA150736517491396015afdf1239017b9abd16a3ce9
SHA25632ec329301aa4547b4ef4800159940feb950785f1ab68d85a14d363e0ff2bc11
SHA51270a1568df0e97e8ab020f108e52ec861a0cdae936ac3340f1657565a8ac8a253179b4c451a79cb7c362fe60ff70be2694705110c67369c645e9061d3800db99e
ssdeep1536:kSQWbe9BzK0xGtGVyDBWikDsD3bG0aII2Tm5TPb+5MI7jcg9YL23O:fQWbIWSG61UD3bGUI2Tm5TP2Njcmn+
Entropy6.236928
Antivirus
AhnlabTrojan/Win32.Crypt
AntiyTrojan/Win32.AGeneric
AviraTR/AD.APTLazerus.sogzc
BitDefenderGen:Variant.Graftor.487501
CyrenW32/Trojan.ACES-2943
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Graftor.487501 (B)
HuorongTrojan/NukeSped.a
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-FPIA!38FC56965DCC
Microsoft Security EssentialsTrojan:Win32/Nukesped.PA!MTB
NANOAVTrojan.Win32.HiddenCobra.fyqdsh
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/NukeSpe-F
SymantecTrojan Horse
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
VirusBlokAdaBScope.Trojan.Autophyte
Zillya!Trojan.NukeSped.Win32.149
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-12-12 12:58:45-05:00
Import Hash2054fd7bbbbcb62441ba2a21c156d403
PE Sections
MD5NameRaw SizeEntropy
39af78f4af9f093c2eb4765202eab41aheader40960.704943
48f0a09061c556cbde93f864f2adb2e3.text942086.479768
65fe1d182b2f7322719d142a81a901a8.rdata163845.812175
43cd1b0954c2785708b9e8da200242e9.data40962.465375
cab878079ca8c3f53ed3e0d0414e3a3a.rsrc40961.194369
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

--Begin IP List--

218.255.24.226

--End IP List--

Client uses www.bing.com. Microsoft.com, and facebook.com for client hello server name instead of naver.com.

8a1d57ee05d29a730864299376b830a7e127f089e500e148d96d0868b7c5b520

Tags

backdoortrojan

Details
Name5C0C1B4C3B1CFD455AC05ACE994AED4B
Size348160 bytes
TypePE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD55c0c1b4c3b1cfd455ac05ace994aed4b
SHA169cda1f1adeeed455b519f9cf188e7787b5efa07
SHA2568a1d57ee05d29a730864299376b830a7e127f089e500e148d96d0868b7c5b520
SHA512084d2223934848594e23dbedab5064f98cd3d07d0783d4a7de66800a2a823daf73b0b044aea0ff9516538e6c478c8d18018c006c713e7e63b2977f44df568718
ssdeep6144:aR3SGkuDrOZm5Te5EXzO7h2ZMB6zJJ+KFvmjyFdzDs0dRb83hYnOQSzS7:aVSWrOZm5TeOjVMoJFFv+mdzDs+kYnOS
Entropy7.540376
Antivirus
AhnlabBackdoor/Win32.Akdoor
AntiyTrojan/Win32.Autophyte
AviraTR/AD.APTLazerus.itcpp
BitDefenderGen:Variant.Graftor.487501
CyrenW32/Trojan.HLGX-3930
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Graftor.487501 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Autophyte.E!dha
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/NukeSpe-I
SymantecTrojan.Hoplight
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
VirusBlokAdaTrojan.Autophyte
Zillya!Trojan.NukeSped.Win32.163
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-08-12 05:20:38-04:00
Import Hash3ca68e2a005e05e2c4831de87ae091c0
PE Sections
MD5NameRaw SizeEntropy
787ed8122e53d5ea17e3ece6d9fb7342header40960.782305
83b06d297acb20b05505da2d09905abd.text1024006.523509
b2e739b37837f1c2b941660711daf98f.rdata163845.951907
cd8aa1387168caeb4604401aedb143eb.data40962.718596
8840ce03428c311935a20ac968c10ce7.rsrc2170887.888219
2f0ede5fcdada29ec11ad8cd25c53f77.reloc40964.923777
Packers/Compilers/Cryptors
Microsoft Visual C++ 6.0 DLL
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

This file is dropped by a different binary into System32 and then run as a service. When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

--Begin IP List--

81.94.192.147
112.175.92.57
181.39.135.126
197.211.212.59

--End IP List--
 

0608e411348905145a267a9beaf5cd3527f11f95c4afde4c45998f066f418571

Tags

trojan

Details
Name34E56056E5741F33D823859E77235ED9
Size151552 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD534e56056e5741f33d823859e77235ed9
SHA1fcc2dcbac7d3cbcf749f6aab2f37cc4b62d0bb64
SHA2560608e411348905145a267a9beaf5cd3527f11f95c4afde4c45998f066f418571
SHA51293ac57f0b9bf48e39870b88f918f9b6e33404c1667d5f98d0965736e9e001b18152530f1c3a843b91929d308f63739faf3de62077bbfb155039f6847d22d3dd0
ssdeep3072:nQWbIWSGw0CkXbhM1Vsm5TJYwMrzPoXL8GnQj3y3:nR3SGQYM16m5TJDwPo7bUC3
Entropy6.652398
Antivirus
AhnlabTrojan/Win32.Agent
AntiyTrojan/Win32.Autophyte
AviraHEUR/AGEN.1023221
BitDefenderGen:Variant.Graftor.487501
CyrenW32/Trojan.PGQL-0621
ESETa variant of Win32/NukeSped.AU trojan
EmsisoftGen:Variant.Graftor.487501 (B)
HuorongTrojan/NukeSped.a
IkarusTrojan.Win32.NukeSped
K7Trojan ( 0052cf421 )
McAfeeTrojan-FPIA!34E56056E574
Microsoft Security EssentialsTrojan:Win32/Autophyte.E!dha
NANOAVTrojan.Win32.NukeSped.fyqduv
Quick HealTrojan.Generic
SophosTroj/NukeSpe-F
SymantecTrojan Horse
TrendMicroTROJ_FR.D0256DD5
TrendMicro House CallTROJ_FR.D0256DD5
VirusBlokAdaBScope.Trojan.Autophyte
Zillya!Trojan.NukeSped.Win32.166
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-08-12 03:44:57-04:00
Import Hashe93a06b89e75751a9ac2c094ca7da8b0
PE Sections
MD5NameRaw SizeEntropy
a45f9a7c2174752a1472fb634ba9d8c7header40960.715236
2b9f5ce0725453a209a416ab7a13f3df.text983046.576807
03605ec3eefe3b70e118cea4b8655229.rdata163845.866137
5ac0ab0641ec076e15dd1468e11c57cd.data40962.680020
58ede934084bbe73fa7f9e0d32c4fafb.rsrc286727.045289
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0
Relationships
0608e41134...Connected_To14.140.116.172
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

---Begin IP List---

14.140.116.172

---End IP List---

Client uses uk.yahoo.com for client hello server name instead of naver.com.

14.140.116.172

Relationships
14.140.116.172Connected_From0608e411348905145a267a9beaf5cd3527f11f95c4afde4c45998f066f418571
Description

The file 34E56056E5741F33D823859E77235ED9 beacons to this hard coded IP.

b05aae59b3c1d024b19c88448811debef1eada2f51761a5c41e70da3db7615a9

Tags

trojan

Details
Name2FF1688FE866EC2871169197F9D46936
Size229500 bytes
TypePE32 executable (GUI) Intel 80386, for MS Windows
MD52ff1688fe866ec2871169197f9d46936
SHA16dc37ff32ea70cbd0078f1881a351a0a4748d10e
SHA256b05aae59b3c1d024b19c88448811debef1eada2f51761a5c41e70da3db7615a9
SHA51291c3a6e84ca728ecc26d63b91a09f3081288c9b9592430035b9ea50ba7cf2d4b4ddba4711933d17013d3d06fcb8d70789a37ddfa5c741445e058bc02d529cf06
ssdeep6144:GANjUaXCXwz+vLFOLEq3VNwO9zyPqYNkHms:bNjxXgA9uPqR
Entropy6.385793
Antivirus
AhnlabTrojan/Win32.Agent
AntiyTrojan/Win32.NukeSped
AviraTR/AD.APTLazerus.oytdw
BitDefenderTrojan.GenericKD.32416090
CyrenW32/Trojan.GCCR-6631
ESETa variant of Win32/NukeSped.AI trojan
EmsisoftTrojan.GenericKD.32416090 (B)
IkarusTrojan.Win32.NukeSped
K7Trojan ( 005329311 )
McAfeeTrojan-HidCobra
Microsoft Security EssentialsTrojan:Win32/Nukesped.PA!MTB
NetGateTrojan.Win32.Malware
Quick HealTrojan.Generic
SophosTroj/Inject-DZV
SymantecTrojan.Gen.MBT
TrendMicroBKDR_HO.9D36C86C
TrendMicro House CallBKDR_HO.9D36C86C
Zillya!Trojan.NukeSped.Win32.160
Yara Rules
hidden_cobra_consolidated.yararule hoplight { meta: Author = "CISA trusted 3rd party" Incident = "10135536" Date = "2019-08-14" Category = "Hidden_Cobra" Family = "HOPLIGHT" Description = "Detects polarSSL certificates" strings: $polarSSL = "fjiejffndxklfsdkfjsaadiepwn" $p1 = { ef cd ab 90 } $p2 = { 78 56 b4 c2 } $p3 = { 55 84 26 fe } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and ($polarSSL and all of ($p*)) }
ssdeep Matches

No matches found.

PE Metadata
Compile Date2017-06-13 11:12:43-04:00
Import Hash8948765c0ef7c91beff2e97907c801d0
PE Sections
MD5NameRaw SizeEntropy
eb0f947605842ea84fea9d8d8382f056header40960.684814
f9aa8191af45813b80031064403835f1.text1925126.400854
bbcbbf5f54deaee51d41d404973c30e4.rdata163846.228868
8ea12cda731d50b93944d8534c11402c.data122883.927662
06d5d2729a367d565819e6867d8caea7.rsrc40963.317978
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0
Description

This artifact is a malicious PE32 executable with similar characteristics of those described in 23E27E5482E3F55BF828DAB885569033 above.

When the malware runs it checks a config file to determine where it should beacon back to. If the config file has not been modified the malware will beacon back to the following hard coded IPs:

---Begin IP List---

210.137.6.37
119.18.230.253
221.138.17.152

---End IP List---

Client uses naver.com for client hello server name.

119.18.230.253

Description

The file 2FF1688FE866EC2871169197F9D46936 beacons to this hard coded IP.

210.137.6.37

Description

The file 2FF1688FE866EC2871169197F9D46936 beacons to this hard coded IP.

221.138.17.152

Description

The file 2FF1688FE866EC2871169197F9D46936 beacons to this hard coded IP.

Relationship Summary

2151c1977b...Connected_To81.94.192.147
2151c1977b...Connected_To112.175.92.57
2151c1977b...Related_To181.39.135.126
2151c1977b...Related_To197.211.212.59
2151c1977b...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
2151c1977b...Dropped96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7
197.211.212.59Related_To2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
197.211.212.59Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
197.211.212.59Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
181.39.135.126Related_To2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
181.39.135.126Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
181.39.135.126Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
112.175.92.57Connected_From2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
112.175.92.57Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
112.175.92.57Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
112.175.92.57Connected_From83228075a604e955d59edc760e4c4ed16eedabfc8f6ac291cf21b4fcbcd1f70a
81.94.192.147Connected_From2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
81.94.192.147Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
81.94.192.147Connected_From70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
70902623c9...Dropped_By70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
70902623c9...Related_Toddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
70902623c9...Related_To2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
70902623c9...Related_To70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
70902623c9...Related_To12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d
ddea408e17...Connected_To81.94.192.147
ddea408e17...Connected_To112.175.92.57
ddea408e17...Connected_To181.39.135.126
ddea408e17...Connected_To197.211.212.59
ddea408e17...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
ddea408e17...Connected_To81.94.192.10
81.94.192.10Connected_Fromddea408e178f0412ae78ff5d5adf2439251f68cad4fd853ee466a3c74649642d
12480585e0...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
12480585e0...Dropped49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
49757cf856...Dropped_By12480585e08855109c5972e85d99cda7701fe992bc1754f1a0736f1eebcb004d
49757cf856...Connected_To21.252.107.198
49757cf856...Connected_To70.224.36.194
49757cf856...Connected_To113.114.117.122
49757cf856...Connected_To47.206.4.145
49757cf856...Connected_To84.49.242.125
49757cf856...Connected_To26.165.218.44
49757cf856...Connected_To137.139.135.151
49757cf856...Connected_To97.90.44.200
49757cf856...Connected_To128.200.115.228
49757cf856...Connected_To186.169.2.237
21.252.107.198Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
21.252.107.198Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
70.224.36.194Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
70.224.36.194Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
113.114.117.122Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
113.114.117.122Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
47.206.4.145Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
47.206.4.145Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
84.49.242.125Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
84.49.242.125Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
26.165.218.44Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
26.165.218.44Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
137.139.135.151Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
137.139.135.151Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
97.90.44.200Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
97.90.44.200Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
128.200.115.228Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
128.200.115.228Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
186.169.2.237Connected_From4a74a9fd40b63218f7504f806fce71dffefc1b1d6ca4bbaadd720b6a89d47761
186.169.2.237Connected_From49757cf85657757704656c079785c072bbc233cab942418d99d1f63d43f28359
4a74a9fd40...Connected_To21.252.107.198
4a74a9fd40...Connected_To70.224.36.194
4a74a9fd40...Connected_To113.114.117.122
4a74a9fd40...Connected_To47.206.4.145
4a74a9fd40...Connected_To84.49.242.125
4a74a9fd40...Connected_To26.165.218.44
4a74a9fd40...Connected_To137.139.135.151
4a74a9fd40...Connected_To97.90.44.200
4a74a9fd40...Connected_To128.200.115.228
4a74a9fd40...Connected_To186.169.2.237
83228075a6...Connected_To112.175.92.57
70034b33f5...Droppedcd5ff67ff773cc60c98c35f9e9d514b597cbd148789547ba152ba67bfc0fec8f
70034b33f5...Dropped70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
70034b33f5...Dropped96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7
70034b33f5...Connected_To81.94.192.147
70034b33f5...Connected_To112.175.92.57
70034b33f5...Connected_To181.39.135.126
70034b33f5...Connected_To197.211.212.59
70034b33f5...Related_To70902623c9cd0cccc8513850072b70732d02c266c7b7e96d2d5b2ed4f5edc289
cd5ff67ff7...Dropped_By70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
96a296d224...Dropped_By70034b33f59c6698403293cdc28676c7daa8c49031089efa6eefce41e22dccb3
96a296d224...Dropped_By2151c1977b4555a1761c12f151969f8e853e26c396fa1a7b74ccbaf3a48f4525
b9a26a5692...Connected_To117.239.241.2
b9a26a5692...Connected_To195.158.234.60
b9a26a5692...Connected_To218.255.24.226
117.239.241.2Connected_Fromb9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101
218.255.24.226Connected_Fromb9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101
195.158.234.60Connected_Fromb9a26a569257fbe02c10d3735587f10ee58e4281dba43474dbdef4ace8ea7101
0608e41134...Connected_To14.140.116.172
14.140.116.172Connected_From0608e411348905145a267a9beaf5cd3527f11f95c4afde4c45998f066f418571

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
  • Monitor users' web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, "Guide to Malware Incident Prevention & Handling for Desktops and Laptops".

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.gov/forms/feedback/

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or soc@us-cert.gov.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.us-cert.gov.

This product is provided subject to this Notification and this Privacy & Use policy.

North Korean Malicious Cyber Activity

$
0
0
Original release date: October 31, 2019

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD) have identified a Trojan malware variant—referred to as HOPLIGHT—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

CISA encourages users and administrators to review Malware Analysis Reports MAR-10135536-8 and the page on HIDDEN COBRA - North Korean Malicious Cyber Activity for more information.

This product is provided subject to this Notification and this Privacy & Use policy.

Google Releases Security Updates for Chrome

$
0
0
Original release date: October 31, 2019

Google has released Chrome version 78.0.3904.87 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system. One of these vulnerabilities (CVE-2019-13720) was detected in exploits in the wild.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Chrome Release and apply the necessary updates.

This product is provided subject to this Notification and this Privacy & Use policy.

National Critical Infrastructure Security and Resilience Month

$
0
0
Original release date: November 1, 2019

November is National Critical Infrastructure Security and Resilience Month. The Nation’s critical infrastructure (CI) relies on a highly interdependent environment, in which physical and cyber systems converge. CI plays a vital role in keeping our Nation and communities safe and secure. Everyone is involved in the mission to protect CI and can help by using cybersecurity best practices, reporting cybersecurity incidents and phishing attempts, and submitting malware for review.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages critical infrastructure owners and operators to download the Critical Infrastructure Security and Resilience Month Toolkit and to visit CISA’s Critical Infrastructure Security and Resilience Month resource page throughout November for information and updates.

This product is provided subject to this Notification and this Privacy & Use policy.


Vulnerability Summary for the Week of October 28, 2019

$
0
0
Original release date: November 4, 2019

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a command injection vulnerability. Successful exploitation could lead to arbitrary code execution.2019-10-257.5CVE-2019-8088
CONFIRM
apache -- thriftIn Apache Thrift all versions up to and including 0.12.0, a server or client may run into an endless loop when feed with specific input data. Because the issue had already been partially fixed in version 0.11.0, depending on the installed version it affects only certain language bindings.2019-10-297.8CVE-2019-0205
MISC
bitlbee -- bitlbee
 
Bitlbee does not drop extra group privileges correctly in unix.c2019-10-297.5CVE-2012-1187
MISC
MISC
MISC
MISC
cisco -- video_communications_server
 
Cisco Video Communications Server (VCS) before X7.0.3 contains a command injection vulnerability which allows remote, authenticated attackers to execute arbitrary commands.2019-10-299CVE-2011-2538
CONFIRM
codesys -- eni_server
 
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.2019-10-257.5CVE-2019-16265
CONFIRM
MISC
d-link -- dir-865
 
D-Link DIR-865L has PHP File Inclusion in the router xml file.2019-10-257.5CVE-2013-4857
MISC
MISC
d-link -- dir-865l_devices
 
D-Link DIR-865L has SMB Symlink Traversal due to misconfiguration in the SMB service allowing symbolic links to be created to locations outside of the Samba share.2019-10-257.9CVE-2013-4855
MISC
MISC
MISC
debian_project -- qtparted
 
qtparted has insecure library loading which may allow arbitrary code execution2019-10-297.5CVE-2010-3375
DEBIAN
MISC
MISC
google -- chrome
 
browser/extensions/api/dial/dial_registry.cc in Google Chrome before 54.0.2840.98 on macOS, before 54.0.2840.99 on Windows, and before 54.0.2840.100 on Linux neglects to copy a device ID before an erase() call, which causes the erase operation to access data that that erase operation will destroy.2019-10-257.5CVE-2016-5202
MISC
MISC
MISC
MISC
MISC
hot-world -- repetier-serverA directory traversal vulnerability was discovered in RepetierServer.exe in Repetier-Server 0.8 through 0.91 that allows for the creation of a user controlled XML file at an unintended location. When this is combined with CVE-2019-14451, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.2019-10-2810CVE-2019-14450
CONFIRM
MISC
hot-world -- repetier-server
 
RepetierServer.exe in Repetier-Server 0.8 through 0.91 does not properly validate the XML data structure provided when uploading a new printer configuration. When this is combined with CVE-2019-14450, an attacker can upload an "external command" configuration as a printer configuration, and achieve remote code execution. After exploitation, loading of the external command configuration is dependent on a system reboot or service restart.2019-10-2510CVE-2019-14451
CONFIRM
MISC
intrasrv -- intrasrv
 
A remote SEH buffer overflow has been discovered in IntraSrv 1.0 (2007-06-03). An attacker may send a crafted HTTP GET or HEAD request that can result in a compromise of the hosting system.2019-10-2810CVE-2019-17181
MISC
MISC
jetbrains -- teamcityIn JetBrains TeamCity before 2019.1.4, insecure Java Deserialization could potentially allow remote code execution.2019-10-317.5CVE-2019-18364
CONFIRM
k7_computing -- antivirus_premium_and_total_security_and_ultimate_security
 
In K7 Antivirus Premium 16.0.xxx through 16.0.0120; K7 Total Security 16.0.xxx through 16.0.0120; and K7 Ultimate Security 16.0.xxx through 16.0.0120, the module K7TSHlpr.dll improperly validates the administrative privileges of the user, allowing arbitrary registry writes in the K7AVOptn.dll module to facilitate escalation of privileges via inter-process communication with a service process.2019-10-287.5CVE-2019-16897
MISC
labf -- nfsaxe_ftp_client
 
Buffer overflow in LabF nfsAxe FTP client 3.7 allows an attacker to execute code remotely.2019-10-257.5CVE-2017-14742
EXPLOIT-DB
linksys -- ea6500_router
 
Linksys EA6500 has SMB Symlink Traversal allowing symbolic links to be created to locations outside of the Samba share.2019-10-2510CVE-2013-4658
MISC
MISC
MISC
medoo -- medoo
 
columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.2019-10-307.5CVE-2019-10762
MISC
MISC
mikrotik -- routeros
 
RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade packages are download from when using the autoupgrade feature. Therefore, a remote attacker can trick the router into "upgrading" to an older version of RouterOS and possibly reseting all the system's usernames and passwords.2019-10-298.5CVE-2019-3977
MISC
milesight -- ip_security_cameras
 
Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password.2019-10-257.5CVE-2016-2356
MISC
MISC
MISC
milesight -- ip_security_cameras
 
Milesight IP security cameras through 2016-11-14 allow remote attackers to bypass authentication and access a protected resource by simultaneously making a request for the unprotected vb.htm resource.2019-10-257.5CVE-2016-2359
MISC
MISC
MISC
mitsubishi_electric_and_inea -- me-rtu_devicesAn issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Undocumented hard-coded user passwords for root, ineaadmin, mitsadmin, and maint could allow an attacker to gain unauthorised access to the RTU. (Also, the accounts ineaadmin and mitsadmin are able to escalate privileges to root without supplying a password due to insecure entries in /etc/sudoers on the RTU.)2019-10-2810CVE-2019-14930
MISC
MISC
mitsubishi_electric_and_inea -- me-rtu_devices
 
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote OS Command Injection vulnerability allows an attacker to execute arbitrary commands on the RTU due to the passing of unsafe user supplied data to the RTU's system shell. Functionality in mobile.php provides users with the ability to ping sites or IP addresses via Mobile Connection Test. When the Mobile Connection Test is submitted, action.php is called to execute the test. An attacker can use a shell command separator (;) in the host variable to execute operating system commands upon submitting the test data.2019-10-2810CVE-2019-14931
MISC
MISC
mitsubishi_electric_and_inea -- me-rtu_devices
 
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Hard-coded SSH keys allow an attacker to gain unauthorised access or disclose encrypted data on the RTU due to the keys not being regenerated on initial installation or with firmware updates. In other words, these devices use private-key values in /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_dsa_key files that are publicly available from the vendor web sites.2019-10-287.5CVE-2019-14926
MISC
MISC
philips -- intellispace_perinatal
 
In IntelliSpace Perinatal, Versions K and prior, a vulnerability within the IntelliSpace Perinatal application environment could enable an unauthorized attacker with physical access to a locked application screen, or an authorized remote desktop session host application user to break-out from the containment of the application and access unauthorized resources from the Windows operating system as the limited-access Windows user. Due to potential Windows vulnerabilities, it may be possible for additional attack methods to be used to escalate privileges on the operating system.2019-10-257.2CVE-2019-13546
MISC
php -- php
 
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.2019-10-287.5CVE-2019-11043
REDHAT
REDHAT
REDHAT
REDHAT
CONFIRM
MISC
FEDORA
FEDORA
FEDORA
CONFIRM
CONFIRM
UBUNTU
UBUNTU
DEBIAN
DEBIAN
pixelpost -- pixelpost
 
pixelpost 1.7.1 has SQL injection2019-10-287.5CVE-2009-4899
MISC
DEBIAN
MISC
rconfig -- rconfig
 
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.2019-10-289CVE-2019-16663
MISC
MISC
MISC
MISC
MISC
rconfig -- rconfig
 
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to ajaxServerSettingsChk.php because the rootUname parameter is passed to the exec function without filtering, which can lead to command execution.2019-10-2810CVE-2019-16662
MISC
MISC
MISC
MISC
MISC
MISC
rittal -- rittal_chiller_sk_3232_series
 
Rittal Chiller SK 3232-Series web interface as built upon Carel pCOWeb firmware A1.5.3 ? B1.2.4. The authentication mechanism on affected systems is configured using hard-coded credentials. These credentials could allow attackers to influence the primary operations of the affected systems, namely turning the cooling unit on and off and setting the temperature set point.2019-10-2510CVE-2019-13553
FULLDISC
MISC
sequelize -- sequelize
 
Sequelize all versions prior to 3.35.1, 4.44.3, and 5.8.11 are vulnerable to SQL Injection due to JSON path keys not being properly escaped for the MySQL/MariaDB dialects.2019-10-297.5CVE-2019-10748
MISC
MISC
MISC
sequelize -- sequelize
 
sequelize before version 3.35.1 allows attackers to perform a SQL Injection due to the JSON path keys not being properly sanitized in the Postgres dialect.2019-10-297.5CVE-2019-10749
MISC
MISC
snoopy -- snoopy
e
Snoopy before 2.0.0 has a security hole in exec cURL2019-10-287.5CVE-2002-2444
MISC
DEBIAN
MISC
sugarcrm -- sugarcrm
 
SugarCRM CE <= 6.3.1 contains scripts that use "unserialize()" with user controlled input which allows remote attackers to execute arbitrary PHP code.2019-10-297.5CVE-2012-0694
MISC
MISC
EXPLOIT-DB
tightvnc_software -- tightvncTightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.2019-10-297.5CVE-2019-8287
MLIST
tightvnc_software -- tightvnc
 
TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.2019-10-297.5CVE-2019-15679
MLIST
tightvnc_software -- tightvnc
 
TightVNC code version 1.3.10 contains heap buffer overflow in rfbServerCutText handler, which can potentially result code execution.. This attack appear to be exploitable via network connectivity.2019-10-297.5CVE-2019-15678
MLIST
tiki_wiki -- cms_groupwareTiki Wiki CMS Groupware 5.2 has Local File Inclusion2019-10-287.5CVE-2010-4239
MISC
MISC
MISC
MISC
tp-link -- tl-wdr4300_devicesTP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities.2019-10-259.3CVE-2013-4848
MISC
MISC
MISC
MISC
MISC
transmission -- transmission
 
Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.2019-10-307.5CVE-2010-0748
MISC
CONFIRM
MISC
CONFIRM
MLIST
youphptube -- youphptube
 
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImage.php is vulnerable to a command injection attack.2019-10-257.5CVE-2019-5127
MISC
youphptube -- youphptube
 
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getImageMP4.php is vulnerable to a command injection attack.2019-10-257.5CVE-2019-5128
MISC
youphptube -- youphptube
 
A command injection have been found in YouPHPTube Encoder. A successful attack could allow an attacker to compromise the server. Exploitable unauthenticated command injections exist in YouPHPTube Encoder 2.3 a plugin for providing encoder functionality in YouPHPTube. The parameter base64Url in /objects/getSpiritsFromVideo.php is vulnerable to a command injection attack.2019-10-257.5CVE-2019-5129
MISC
ytnef -- ytnef
 
ytnef has directory traversal2019-10-297.5CVE-2009-3887
MISC
MISC
MISC
MISC
MISC
zend_framework -- zend_framework
 
Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter.2019-10-257.5CVE-2015-0270
MISC
Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-255CVE-2019-8087
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4 and 6.3 have a cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-254.3CVE-2019-8083
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-254.3CVE-2019-8084
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a reflected cross site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-254.3CVE-2019-8085
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a cross-site request forgery vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-254.3CVE-2019-8234
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have an authentication bypass vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-255CVE-2019-8081
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-255CVE-2019-8082
CONFIRM
adobe -- experience_manager
 
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.2019-10-255CVE-2019-8086
CONFIRM
apache -- hadoop
 
Hadoop 1.0.3 contains a symlink vulnerability.2019-10-295CVE-2012-2945
MISC
MISC
apache -- thrift
 
In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.2019-10-295CVE-2019-0210
CONFIRM
clipsoft -- rexpertClipSoft REXPERT 1.0.0.527 and earlier version allows directory traversal by issuing a special HTTP POST request with ../ characters. This could lead to create malicious HTML file, because they can inject a content with crafted template. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.2019-10-304.3CVE-2019-17324
MISC
clipsoft -- rexpert
 
ClipSoft REXPERT 1.0.0.527 and earlier version allows remote attacker to upload arbitrary local file via the ActiveX method in RexViewerCtrl30.ocx. That could lead to disclosure of sensitive information. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.2019-10-304.3CVE-2019-17325
MISC
clipsoft -- rexpert
 
ClipSoft REXPERT 1.0.0.527 and earlier version allows remote attacker to arbitrary file deletion by issuing a HTTP GET request with a specially crafted parameter. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.2019-10-305.8CVE-2019-17326
MISC
clipsoft -- rexpert
 
ClipSoft REXPERT 1.0.0.527 and earlier version allows arbitrary file creation via a POST request with the parameter set to the file path to be written. This can be an executable file that is written to in the arbitrary directory. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.2019-10-304.3CVE-2019-17322
MISC
clipsoft -- rexpert
 
ClipSoft REXPERT 1.0.0.527 and earlier version have an information disclosure issue. When requesting web page associated with session, could leak username via session file path of HTTP response data. No authentication is required.2019-10-305CVE-2019-17321
MISC
clipsoft -- rexpert
 
ClipSoft REXPERT 1.0.0.527 and earlier version allows arbitrary file creation and execution via report print function of rexpert viewer with modified XML document. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.2019-10-306.8CVE-2019-17323
MISC
corehr -- core_portal
 
CoreHR Core Portal before 27.0.7 allows stored XSS.2019-10-254.3CVE-2019-18221
MISC
MISC
debian_project -- mercurial
 
Mercurial before 1.6.4 fails to verify the Common Name field of SSL certificates which allows remote attackers who acquire a certificate signed by a Certificate Authority to perform a man-in-the-middle attack.2019-10-294.3CVE-2010-4237
MISC
CONFIRM
CONFIRM
MISC
debian_project -- pootle
 
pootle 2.0.5 has XSS via 'match_names' parameter2019-10-284.3CVE-2010-4245
MISC
DEBIAN
MISC
MISC
debian_project -- xpdf
 
In xpdf, the xref table contains an infinite loop which allows remote attackers to cause a denial of service (application crash) in xpdf-based PDF viewers.2019-10-304.3CVE-2010-0207
MISC
MISC
debian_project -- xpdf
 
xpdf allows remote attackers to cause a denial of service (NULL pointer dereference and crash) in the way it processes JBIG2 PDF stream objects.2019-10-304.3CVE-2010-0206
MISC
MISC
debian_project -- zoo
 
Zoo 2.10 has Directory traversal2019-10-285CVE-2005-2349
MISC
MISC
devada -- dzone_and_answerhub
 
An XML External Entity Injection vulnerability exists in Dzone AnswerHub.2019-10-285CVE-2017-15725
MISC
digium -- asterisk
 
asterisk allows calls on prohibited networks2019-10-295CVE-2009-3723
MISC
MISC
MISC
fabrik -- fabrik
 
Reflected Cross-Site Scripting (XSS) vulnerability in the fabrik_referrer hidden field in the Fabrikar Fabrik component through v3.8.1 for Joomla! allows remote attackers to inject arbitrary web script via the HTTP Referer header.2019-10-294.3CVE-2018-10727
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.5.0.20723. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of Javascript in the HTML2PDF plugin. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8692.2019-10-256.8CVE-2019-17139
MISC
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DXF files to PDF. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9276.2019-10-256.8CVE-2019-17145
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of DWG files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9274.2019-10-256.8CVE-2019-17144
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Keystroke action of a listbox field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9081.2019-10-256.8CVE-2019-17142
MISC
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of script within a Calculate action of a text field. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9044.2019-10-256.8CVE-2019-17141
MISC
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9273.2019-10-254.3CVE-2019-17143
MISC
foxit -- phantompdf
 
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the OnFocus event. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9091.2019-10-256.8CVE-2019-17140
MISC
MISC
foxit -- studio_photo
 
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion from JPEG to EPS. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8809.2019-10-254.3CVE-2019-17138
MISC
MISC
gnuboard -- gnuboard5
 
GNUBOARD5 before 5.3.2.0 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board group extra contents" parameter, aka the adm/boardgroup_form_update.php gr_1~10 parameter.2019-10-304.3CVE-2018-18678
MISC
MISC
MISC
gpw -- gpw
 
gpw generates shorter passwords than required2019-10-295CVE-2011-4931
MISC
MISC
MISC
MISC
honeywell -- ip-ak2
 
In IP-AK2 Access Control Panel Version 1.04.07 and prior, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data, which can be accessed without authentication over the network.2019-10-255CVE-2019-13525
MISC
ibm -- api_connect
 
IBM API Connect version V5.0.0.0 through 5.0.8.7 could reveal sensitive information to an attacker using a specially crafted HTTP request. IBM X-Force ID: 167883.2019-10-295CVE-2019-4600
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 162260.2019-10-255CVE-2019-4399
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162261.2019-10-254CVE-2019-4400
XF
CONFIRM
ibm -- maximo_asset_management
 
After installing the IBM Maximo Health- Safety and Environment Manager 7.6.1, a user is granted additional privileges that they are not normally allowed to access. IBM X-Force ID: 165948.2019-10-296.5CVE-2019-4546
XF
CONFIRM
ibm -- security_access_manager_appliance
 
IBM Security Access Manager Appliance could allow unauthenticated attacker to cause a denial of service in the reverse proxy component. IBM X-Force ID: 156159.2019-10-255CVE-2019-4036
XF
CONFIRM
ibm -- security_guardium_big_data_intelligenceIBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 161418.2019-10-295CVE-2019-4339
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 specifies permissions for a security-critical resource which could lead to the exposure of sensitive information or the modification of that resource by unintended parties. IBM X-Force ID: 160986.2019-10-296.4CVE-2019-4306
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores sensitive information in cleartext within a resource that might be accessible to another control sphere. IBM X-Force ID: 1610141.2019-10-295CVE-2019-4314
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 does not set the secure attribute for cookies in HTTPS sessions, which could cause the user agent to send those cookies in plaintext over an HTTP session. IBM X-Force ID: 161210.2019-10-294.3CVE-2019-4330
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 161209.2019-10-294CVE-2019-4329
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 161037.2019-10-295CVE-2019-4311
XF
CONFIRM
ikiwiki -- ikiwiki
 
A cross-site scripting (XSS) vulnerability in ikiwiki before 3.20101112 allows remote attackers to inject arbitrary web script or HTML via a comment.2019-10-304.3CVE-2010-1673
CONFIRM
MISC
ikiwiki -- ikiwiki
 
Cross Site Scripting (XSS) in ikiwiki before 3.20110122 could allow remote attackers to insert arbitrary JavaScript due to insufficient checking in comments.2019-10-294.3CVE-2011-0428
CONFIRM
MISC
jetbrains -- teamcity
 
In JetBrains YouTrack before 2019.2.55152, removing tags from the issues list without the corresponding permission was possible.2019-10-315CVE-2019-18369
CONFIRM
jetbrains -- teamcity
 
In JetBrains TeamCity before 2019.1.2, access could be gained to the history of builds of a deleted build configuration under some circumstances.2019-10-315CVE-2019-18363
CONFIRM
labkey -- labkey_server
 
An issue was discovered in LabKey Server 19.1.0. It is possible to force a logged-in administrator to execute code through a /reports-viewScriptReport.view CSRF vulnerability.2019-10-296.8CVE-2019-9926
MISC
MISC
labkey -- labkey_server
 
An issue was discovered in LabKey Server 19.1.0. Sending an SVG containing an XXE payload to the endpoint visualization-exportImage.view or visualization-exportPDF.view allows local files to be read.2019-10-295CVE-2019-9757
MISC
MISC
libpod -- libpod
 
An issue was discovered in Podman in libpod before 1.6.0. It resolves a symlink in the host context during a copy operation from the container to the host, because an undesired glob operation occurs. An attacker could create a container image containing particular symlinks that, when copied by a victim user to the host filesystem, may overwrite existing files with others from the host.2019-10-285.8CVE-2019-18466
MISC
MISC
MISC
MISC
mcafee -- mcafee_total_protection
 
A File Masquerade vulnerability in McAfee Total Protection (MTP) version 16.0.R21 and earlier in Windows client allowed an attacker to read the plaintext list of AV-Scan exclusion files from the Windows registry, and to possibly replace excluded files with potential malware without being detected.2019-10-284.6CVE-2019-3636
CONFIRM
mediawiki -- mediawiki
 
An issue was discovered in the AbuseFilter extension through 1.34 for MediaWiki. Previously hidden (restricted) AbuseFilter filters were viewable (or their differences were viewable) to unprivileged users, thus disclosing potentially sensitive information.2019-10-295CVE-2019-18612
MISC
MISC
mediawiki -- mediawiki
 
A cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.5 and 1.20.x before 1.20.4 and allows remote attackers to inject arbitrary web script or HTML via Lua function names.2019-10-314.3CVE-2013-1951
MISC
MISC
MISC
MISC
MISC
MISC
MISC
CONFIRM
MISC
mediawiki -- mediawiki
 
An issue was discovered in the CheckUser extension through 1.34 for MediaWiki. Certain sensitive information within oversighted edit summaries made available via the MediaWiki API was potentially visible to users with various levels of access to this extension. Said users should not have been able to view these oversighted edit summaries via the MediaWiki API.2019-10-294CVE-2019-18611
MISC
MISC
mediawiki -- mediawiki
 
mediawiki allows deleted text to be exposed2019-10-295CVE-2012-0046
MISC
MISC
MISC
mikrotik -- routeros
 
RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data attack. The router adds all A records to its DNS cache even when the records are unrelated to the domain that was queried. Therefore, a remote attacker controlled DNS server can poison the router's DNS cache via malicious responses with additional and untrue records.2019-10-295CVE-2019-3979
MISC
mikrotik -- routeros
 
RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled.2019-10-296.5CVE-2019-3976
MISC
mikrotik -- routeros
 
RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning2019-10-295CVE-2019-3978
MISC
MISC
milesight -- ip_security_cameras
 
Milesight IP security cameras through 2016-11-14 have a default set of 10 privileged accounts with hardcoded credentials. They are accessible if the customer has not configured 10 actual user accounts.2019-10-255CVE-2016-2358
MISC
MISC
MISC
milesight -- ip_security_cameras
 
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.2019-10-255CVE-2016-2360
MISC
MISC
MISC
milesight -- ip_security_cameras
 
Milesight IP security cameras through 2016-11-14 have a hardcoded SSL private key under the /etc/config directory.2019-10-255CVE-2016-2357
MISC
MISC
MISC
mitsubishi_electric_and_inea -- me-rtu_devices

 
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. A world-readable /usr/smartrtu/init/settings.xml configuration file on the file system allows an attacker to read sensitive configuration settings such as usernames, passwords, and other sensitive RTU data due to insecure permission assignment.2019-10-284CVE-2019-14925
MISC
MISC
mitsubishi_electric_and_inea -- me-rtu_devices
 
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.2019-10-285CVE-2019-14929
MISC
MISC
mitsubishi_electric_and_inea -- me-rtu_devices
 
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).2019-10-285CVE-2019-14927
MISC
MISC
netapp -- clustered_data_ontapClustered Data ONTAP versions 9.2 through 9.6 are susceptible to a vulnerability which allows an attacker to use l2ping to cause a Denial of Service (DoS).2019-10-255CVE-2019-5508
MISC
openafs_foundation -- openafsOpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to an information disclosure vulnerability because uninitialized scalars are sent over the network to a peer.2019-10-295CVE-2019-18602
MISC
openafs_foundation -- openafs
 
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer.2019-10-294.3CVE-2019-18603
MISC
openafs_foundation -- openafs
 
OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to denial of service from unserialized data access because remote attackers can make a series of VOTE_Debug RPC calls to crash a database server within the SVOTE_Debug RPC handler.2019-10-295CVE-2019-18601
MISC
pimcore -- pimcore
 
Pimcore 6.2.3 has XSS in the translations grid because bundles/AdminBundle/Resources/public/js/pimcore/settings/translations.js mishandles certain HTML elements.2019-10-314.3CVE-2019-18656
MISC
pixelpost -- pixelpost
 
pixelpost 1.7.1 has XSS2019-10-284.3CVE-2009-4900
MISC
DEBIAN
MISC
python_keyring_lib -- python_keyring_lib
 
Python keyring lib before 0.10 created keyring files with world-readable permissions.2019-10-285CVE-2012-5577
MISC
CONFIRM
MISC
MISC
MISC
rittal -- rittal_chiller_sk_3232_series
 
Rittal Chiller SK 3232-Series web interface as built upon Carel pCOWeb firmware A1.5.3 ? B1.2.4. The authentication mechanism on affected systems does not provide a sufficient level of protection against unauthorized configuration changes. Primary operations, namely turning the cooling unit on and off and setting the temperature set point, can be modified without authentication.2019-10-255CVE-2019-13549
FULLDISC
MISC
schneider_electric -- multiple_modicon_controllers
 
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the firmware with no firmware image inside the package using FTP protocol.2019-10-294CVE-2019-6841
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the firmware with a missing web server image inside the package using FTP protocol.2019-10-294CVE-2019-6842
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the controller with an empty firmware package using FTP protocol.2019-10-294CVE-2019-6843
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service atack on the PLC when upgrading the controller with a firmware package containing an invalid web server image using FTP protocol.2019-10-294CVE-2019-6844
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol.2019-10-294CVE-2019-6847
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-200: Information Exposure vulnerability exists in Modicon M580, Modicon BMENOC 0311, and Modicon BMENOC 0321, which could cause the disclosure of sensitive information when using specific Modbus services provided by the REST API of the controller/communication module.2019-10-295CVE-2019-6849
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon BMENOC 0311, and Modicon BMENOC 0321, which could cause a Denial of Service attack on the PLC when sending specific data on the REST API of the controller/communication module.2019-10-295CVE-2019-6848
CONFIRM
schneider_electric -- multiple_modicon_controllers
 
A CWE-200: Information Exposure vulnerability exists in Modicon M580, Modicon BMENOC 0311, and Modicon BMENOC 0321, which could cause the disclosure of sensitive information when reading specific registers with the REST API of the controller/communication module.2019-10-295CVE-2019-6850
CONFIRM
terramaster -- fs-210_devices
 
An issue was discovered on TerraMaster FS-210 4.0.19 devices. Normal users can use 1.user.php for privilege elevation.2019-10-286.5CVE-2019-18195
MISC
tightvnc_software -- tightvnc
 
TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.2019-10-295CVE-2019-15680
MLIST
tiki_wiki -- cms_groupware
 
Tiki Wiki CMS Groupware 5.2 has XSS2019-10-284.3CVE-2010-4240
MISC
MISC
MISC
MISC
tiki_wiki -- cms_groupware
 
Tiki Wiki CMS Groupware 5.2 has CSRF2019-10-286.8CVE-2010-4241
MISC
MISC
MISC
MISC
total_defense -- anti-virus
 
The malware scan function in Total Defense Anti-virus 11.5.2.28 is vulnerable to a TOCTOU bug; consequently, symbolic link attacks allow privileged files to be deleted.2019-10-315.8CVE-2019-18644
MISC
transmission -- transmission
 
Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame.2019-10-305CVE-2010-0749
MISC
CONFIRM
MISC
CONFIRM
MLIST
trend_micro -- apex_one
 
Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication.2019-10-285CVE-2019-18188
N/A
trend_micro -- office_scan
 
Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.2019-10-285CVE-2019-18187
N/A
youphptube -- youphptubeAn exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.2019-10-256.5CVE-2019-5120
MISC
youphptube -- youphptube
 
SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter name in /objects/pluginSwitch.json.php.2019-10-256.5CVE-2019-5122
MISC
youphptube -- youphptube
 
SQL injection vulnerabilities exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with Parameter uuid in /objects/pluginSwitch.json.php2019-10-256.5CVE-2019-5121
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exist in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configurations, access the underlying operating system.2019-10-256.5CVE-2019-5119
MISC
youphptube -- youphptube
 
Exploitable SQL injection vulnerabilities exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.2019-10-256.5CVE-2019-5117
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exists in the authenticated part of YouPHPTube 7.6. Specially crafted web requests can cause a SQL injection. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and in certain configuration, access the underlying operating system.2019-10-256.5CVE-2019-5116
MISC
youphptube -- youphptube
 
An exploitable SQL injection vulnerability exists in the authenticated portion of YouPHPTube 7.6. Specially crafted web requests can cause SQL injections. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and,in certain configuration, access the underlying operating system.2019-10-256.5CVE-2019-5114
MISC
youphptube -- youphptube
 
Specially crafted web requests can cause SQL injections in YouPHPTube 7.6. An attacker can send a web request with Parameter dir in /objects/pluginSwitch.json.php.2019-10-256.5CVE-2019-5123
MISC
zucchetti -- infobusinessMultiple Reflected Cross-site Scripting (XSS) vulnerabilities exist in Zucchetti InfoBusiness before and including 4.4.1. The browsing component did not properly sanitize user input (encoded in base64). This also applies to the search functionality for the searchKey parameter.2019-10-304.3CVE-2019-18205
MISC
zucchetti -- infobusiness
 
Zucchetti InfoBusiness before and including 4.4.1 allows any authenticated user to upload .php files in order to achieve code execution.2019-10-306.5CVE-2019-18204
MISC
Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
apache -- airflow
 
A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process.2019-10-303.5CVE-2019-12417
MLIST
d-link -- dir-865l_devices
 
D-Link DIR-865L has Information Disclosure.2019-10-252.9CVE-2013-4856
MISC
MISC
MISC
debian_project -- mailscanner
 
mailscanner can allow local users to prevent virus signatures from being updated2019-10-282.1CVE-2010-3293
MISC
DEBIAN
MISC
MISC
debian_project -- paxtext
 
paxtest handles temporary files insecurely2019-10-292.1CVE-2010-3373
MISC
MISC
MISC
gmer -- gmerA stack based buffer overflow vulnerability exists in the method receiving data from SysTreeView32 control of the GMER 2.1.19357 application. A specially created long path can lead to a buffer overflow on the stack resulting in code execution. An attacker needs to create path longer than 99 characters to trigger this vulnerability.2019-10-292.1CVE-2016-4289
MISC
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 could allow a local user to obtain sensitive information from temporary script files. IBM X-Force ID: 162333.2019-10-252.1CVE-2019-4395
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP response splitting attacks, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject arbitrary HTTP headers and cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning or cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 162236.2019-10-253.5CVE-2019-4396
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 is vulnerable to HTTP Response Splitting caused by improper caching of content. This would allow the attacker to perform further attacks, such as Web Cache poisoning, cross-site scripting and possibly obtain sensitive information. IBM X-Force ID: 163682.2019-10-253.5CVE-2019-4461
XF
CONFIRM
ibm -- cloud_orchestrator
 
IBM Cloud Orchestrator 2.4 through 2.4.0.5 and 2.5 through 2.5.0.9 contain APIs that could be used by a local user to send email. IBM X-Force ID: 162232.2019-10-252.1CVE-2019-4394
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 160987.2019-10-292.1CVE-2019-4307
XF
CONFIRM
ibm -- security_guardium_big_data_intelligence
 
IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses hard coded credentials which could allow a local user to obtain highly sensitive information. IBM X-Force ID: 161035.2019-10-292.1CVE-2019-4309
XF
CONFIRM
labkey -- labkey_server
 
An issue was discovered in LabKey Server 19.1.0. The display name of a user is vulnerable to stored XSS that can execute on administrators from security/permissions.view, security/addUsers.view, or wiki/Administration/page.view in the admin panel, leading to privilege escalation.2019-10-293.5CVE-2019-9758
MISC
MISC
mantisbt -- mantisbt
 
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value.2019-10-313.5CVE-2013-1934
MISC
MISC
MISC
CONFIRM
MISC
mitsubishi_electric_and_inea -- me-rtu_devices
 
An issue was discovered on Mitsubishi Electric ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. A number of stored cross-site script (XSS) vulnerabilities allow an attacker to inject malicious code directly into the application. An example input variable vulnerable to stored XSS is SerialInitialModemString in the index.php page.2019-10-283.5CVE-2019-14928
MISC
MISC
postgresql -- postgresql
 
Postgresql, versions 11.x before 11.5, is vulnerable to a memory disclosure in cross-type comparison for hashed subplan.2019-10-293.5CVE-2019-10209
CONFIRM
CONFIRM
postgresql -- postgresql_windows_installer
 
Postgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via superuser writing password to unprotected temporary file.2019-10-291.9CVE-2019-10210
CONFIRM
CONFIRM
total_defense -- antivirus
 
The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.2019-10-312.1CVE-2019-18645
MISC
Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
advantech -- wise-paas/rmmAdvantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information.2019-10-31not yet calculatedCVE-2019-18229
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
advantech -- wise-paas/rmmAdvantech WISE-PaaS/RMM, Versions 3.3.29 and prior. There is an unsecured function that allows anyone who can access the IP address to use the function without authentication.2019-10-31not yet calculatedCVE-2019-13547
MISC
MISC
advantech -- wise-paas/rmmAdvantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data.2019-10-31not yet calculatedCVE-2019-18227
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
advantech -- wise-paas/rmmAdvantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Path traversal vulnerabilities are caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage these vulnerabilities to remotely execute code while posing as an administrator.2019-10-31not yet calculatedCVE-2019-13551
MISC
MISC
MISC
MISC
MISC
amd -- atidxx64.dll_driverAn exploitable memory corruption vulnerability exists in AMD ATIDXX64.DLL driver, versions 25.20.15031.5004 and 25.20.15031.9002. A specially crafted pixel shader can cause an out-of-bounds memory write. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability can be triggered from VMware guest, affecting VMware host.2019-10-31not yet calculatedCVE-2019-5049
MISC
apache -- strutsApache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.2019-11-01not yet calculatedCVE-2011-3923
MISC
EXPLOIT-DB
BID
MISC
MISC
XF
MISC
apak -- wholesale_floorplanning_financeApak Wholesale Floorplanning Finance 6.31.8.3 and 6.31.8.5 allows XSS via the mainForm:loanNotesnotes:0:rich_text_editor_note_text parameter to WFS/agreementView.faces in the Notes section. Although versions 6.31.8.3 and 6.31.8.5 are confirmed to be affected, all versions with the vulnerable WYSIWYG ?Notes? section are likely affected.2019-10-31not yet calculatedCVE-2019-17551
MISC
archiver -- archiverAll versions of archiver allow attacker to perform a Zip Slip attack via the "unarchive" functions. It is exploited using a specially crafted zip archive, that holds path traversal filenames. When exploited, a filename in a malicious archive is concatenated to the target extraction directory, which results in the final path ending up outside of the target folder. For instance, a zip may hold a file with a "../../file.exe" location and thus break out of the target folder. If an executable or a configuration file is overwritten with a file containing malicious code, the problem can turn into an arbitrary code execution issue quite easily.2019-10-29not yet calculatedCVE-2019-10743
MISC
MISC
MISC
archos -- safe-t_devicesOn Archos Safe-T devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.2019-11-02not yet calculatedCVE-2019-14358
MISC
aruba -- instantAruba Instant 4.x prior to 6.4.4.8-4.2.4.12, 6.5.x prior to 6.5.4.11, 8.3.x prior to 8.3.0.6, and 8.4.x prior to 8.4.0.1 allows Command injection.2019-10-30not yet calculatedCVE-2018-16417
BID
CONFIRM
MISC
CONFIRM
MISC
atlantis_word_processor -- atlantis_word_processorAn exploitable uninitialized pointer vulnerability exists in the Word document parser of the the Atlantis Word Processor. A specially crafted document can cause an array fetch to return an uninitialized pointer and then performs some arithmetic before writing a value to the result. Usage of this uninitialized pointer can allow an attacker to corrupt heap memory resulting in code execution under the context of the application. An attacker must convince a victim to open a document in order to trigger this vulnerability.2019-10-31not yet calculatedCVE-2018-3983
MISC
atlassian -- infosysta_for_jiraAn issue was discovered in the Infosysta "In-App & Desktop Notifications" app before 1.6.14_J8 for Jira. It is possible to obtain a list of all Jira projects without authentication/authorization via the plugins/servlet/nfj/ProjectFilter?searchQuery= URI.2019-11-01not yet calculatedCVE-2019-16908
MISC
MISC
atlassian -- infosysta_for_jiraAn issue was discovered in the Infosysta "In-App & Desktop Notifications" app before 1.6.14_J8 for Jira. It is possible to obtain a list of all Jira projects (with authentication as a Jira user, but without authorization for specific projects) via the plugins/servlet/nfj/NotificationSettings URI.2019-11-01not yet calculatedCVE-2019-16909
MISC
MISC
atlassian -- infosysta_for_jiraAn issue was discovered in the Infosysta "In-App & Desktop Notifications" app 1.6.13_J8 for Jira. It is possible to obtain a list of all valid Jira usernames without authentication/authorization via the plugins/servlet/nfj/UserFilter?searchQuery=@ URI.2019-10-31not yet calculatedCVE-2019-16907
MISC
BUGTRAQ
atlassian -- infosysta_for_jiraAn issue was discovered in the Infosysta "In-App & Desktop Notifications" app 1.6.13_J8 for Jira. By using plugins/servlet/nfj/PushNotification?username= with a modified username, a different user's notifications can be read without authentication/authorization. These notifications are then no longer displayed to the normal user.2019-10-31not yet calculatedCVE-2019-16906
MISC
BUGTRAQ
atlassian -- jiraAn issue summary information disclosure vulnerability exists in Atlassian Jira Tempo plugin, version 4.10.0. Authenticated users can obtain the summary for issues they do not have permission to view via the Tempo plugin.2019-10-31not yet calculatedCVE-2019-5095
MISC
autojump -- autojumpautojump before 21.5.8 allows local users to gain privileges via a Trojan horse custom_install directory in the current working directory.2019-10-31not yet calculatedCVE-2013-2012
MISC
MISC
MISC
CONFIRM
CONFIRM
MISC
avast -- antivirusA Cross Site Scripting (XSS) issue exists in Avast AntiVirus (Free, Internet Security, and Premiere Edition) 19.3.2369 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name.2019-11-01not yet calculatedCVE-2019-18653
MISC
MISC
avg_technologies -- avg_antivirusA Cross Site Scripting (XSS) issue exists in AVG AntiVirus (Internet Security Edition) 19.3.3084 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name.2019-11-01not yet calculatedCVE-2019-18654
MISC
MISC
axohelp -- axohelpIn axohelp.c before 1.3 in axohelp in axodraw2 before 2.1.1b, as distributed in TeXLive and other collections, sprintf is mishandled.2019-10-29not yet calculatedCVE-2019-18604
MISC
bitdefender -- box_firmwareAn issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that allows an attacker to pass arbitrary code to the BOX appliance via the web API. In order to exploit this vulnerability, an attacker needs presence in Bitdefender BOX setup network and Bitdefender BOX be in setup mode.2019-10-31not yet calculatedCVE-2019-12612
CONFIRM
centos-webpanel -- centos_web_panelStored XSS in filemanager2.php in CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.885 exists via the cmd_arg parameter. This can be exploited by a local attacker who supplies a crafted filename within a directory visited by the victim.2019-10-31not yet calculatedCVE-2019-16295
MISC
CONFIRM
cezerin -- cezerinCezerin v0.33.0 allows unauthorized order-information modification because certain internal attributes can be overwritten via a conflicting name when processing order requests. Hence, a malicious customer can manipulate an order (e.g., its payment status or shipping fee) by adding additional attributes to user-input during the PUT /ajax/cart operation for a checkout, because of getValidDocumentForUpdate in api/server/services/orders/orders.js.2019-10-29not yet calculatedCVE-2019-18608
MISC
chicken -- chickenOS command injection vulnerability in the "qs" procedure from the "utils" module in Chicken before 4.9.0.2019-10-31not yet calculatedCVE-2013-2024
MISC
MISC
MISC
MISC
CONFIRM
MISC
MISC
chicken -- chickenMultiple buffer overflows in the (1) R5RS char-ready, (2) tcp-accept-ready, and (3) file-select procedures in Chicken through 4.8.0.3 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value. NOTE: this issue exists because of an incomplete fix for CVE-2012-6122.2019-10-31not yet calculatedCVE-2013-2075
CONFIRM
CONFIRM
CONFIRM
MISC
MISC
MISC
CONFIRM
MISC
chicken -- chickenA casting error in Chicken before 4.8.0 on 64-bit platform caused the random number generator to return a constant value. NOTE: the vendor states "This function wasn't used for security purposes (and is advertised as being unsuitable)."2019-10-31not yet calculatedCVE-2012-6124
MISC
MISC
CONFIRM
MISC
chicken -- chickenChicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack."2019-10-31not yet calculatedCVE-2012-6123
MISC
MISC
MISC
chicken -- chickenChicken before 4.8.0 is susceptible to algorithmic complexity attacks related to hash table collisions.2019-10-31not yet calculatedCVE-2012-6125
MISC
MISC
CONFIRM
CONFIRM
MISC
chicken -- chickenBuffer overflow in the thread scheduler in Chicken before 4.8.0.1 allows attackers to cause a denial of service (crash) by opening a file descriptor with a large integer value.2019-10-31not yet calculatedCVE-2012-6122
MISC
MISC
MISC
MISC
MISC
CONFIRM
CONFIRM
MISC
compal -- ch7465lg_modemThe web interface of the Compal Broadband CH7465LG modem (version CH7465LG-NCIP-6.12.18.25-2p6-NOSH) is vulnerable to a /%2f/ path traversal attack, which can be exploited in order to test for the existence of a file pathname outside of the web root directory. If a file exists but is not part of the product, there is a 404 error. If a file does not exist, there is a 302 redirect to index.html.2019-10-28not yet calculatedCVE-2019-17224
MISC
MISC
cujo -- smart_firewallAn exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability.2019-10-31not yet calculatedCVE-2018-4031
MISC
cujo -- smart_firewallAn exploitable denial-of-service vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. When parsing labels in mDNS packets, the firewall unsafely handles label compression pointers, leading to an uncontrolled recursion that eventually exhausts the stack, crashing the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability.2019-10-31not yet calculatedCVE-2018-4002
MISC
debian_project -- autokeyThe init script in autokey before 0.61.3-2 allows local attackers to write to arbitrary files via a symlink attack.2019-10-30not yet calculatedCVE-2010-0398
MISC
MISC
debian_project -- burnburn allows file names to escape via mishandled quotation marks2019-10-31not yet calculatedCVE-2009-5043
MISC
debian_project -- debianThe Debian backport of the fix for CVE-2017-3137 leads to assertion failure in validator.c:1858; Affects Debian versions 9.9.5.dfsg-9+deb8u15; 9.9.5.dfsg-9+deb8u18; 9.10.3.dfsg.P4-12.3+deb9u5; 9.11.5.P4+dfsg-5.1 No ISC releases are affected. Other packages from other distributions who did similar backports for the fix for 2017-3137 may also be affected.2019-10-30not yet calculatedCVE-2018-5735
CONFIRM
debian_project -- mumbleMumble: murmur-server has DoS due to malformed client query2019-10-31not yet calculatedCVE-2010-2490
MISC
MISC
MISC
debian_project -- overkilloverkill has buffer overflow via long player names that can corrupt data on the server machine2019-10-31not yet calculatedCVE-2009-5041
MISC
debian_project -- python-docutilspython-docutils allows insecure usage of temporary files2019-10-31not yet calculatedCVE-2009-5042
MISC
debian_project -- drbd8drbd8 allows local users to bypass intended restrictions for certain actions via netlink packets, similar to CVE-2009-3725.2019-10-30not yet calculatedCVE-2010-0747
MISC
CONFIRM
debian_project -- muttMutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.2019-11-01not yet calculatedCVE-2005-2351
MISC
MISC
elastic -- elasticsearchElasticsearch versions 7.0.0-7.3.2 and 6.7.0-6.8.3 contain a username disclosure flaw was found in the API Key service. An unauthenticated attacker could send a specially crafted request and determine if a username exists in the Elasticsearch native realm.2019-10-30not yet calculatedCVE-2019-7619
CONFIRM
CONFIRM
CONFIRM
elastic -- logstashLogstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would cause Logstash to stop responding.2019-10-30not yet calculatedCVE-2019-7620
CONFIRM
CONFIRM
CONFIRM
european_commission -- eidas_node_integration_packageEuropean Commission eIDAS-Node Integration Package before 2.3.1 has Missing Certificate Validation because a certain ExplicitKeyTrustEvaluator return value is not checked. NOTE: only 2.1 is confirmed to be affected.2019-10-30not yet calculatedCVE-2019-18633
MISC
european_commission -- eidas_node_integration_packageEuropean Commission eIDAS-Node Integration Package before 2.3.1 allows Certificate Faking because an attacker can sign a manipulated SAML response with a forged certificate.2019-10-30not yet calculatedCVE-2019-18632
MISC
f5 -- big-ipOn BIG-IP 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, a reflected cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Traffic Management User Interface (TMUI), also known as the BIG-IP Configuration utility.2019-11-01not yet calculatedCVE-2019-6657
CONFIRM
f5 -- big-ip_afmOn BIG-IP AFM 15.0.0-15.0.1, 14.0.0-14.1.2, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, a vulnerability in the AFM configuration utility may allow any authenticated BIG-IP user to run an SQL injection attack.2019-11-01not yet calculatedCVE-2019-6658
CONFIRM
facebook -- whatsappThe Wireless Emergency Alerts (WEA) protocol allows remote attackers to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated shield box suggested that all LTE phones are affected by design (e.g., use of Android versus iOS does not matter); testing in an open RF environment is, of course, contraindicated.2019-11-02not yet calculatedCVE-2019-18659
MISC
fastweb -- fastgate_devicesFastweb FASTGate 1.0.1b devices allow partial authentication bypass by changing a certain check_pwd return value from 0 to 1. An attack does not achieve administrative control of a device; however, the attacker can view all of the web pages of the administration console.2019-11-02not yet calculatedCVE-2019-18661
MISC
MISC
fortinet -- fortiextenderAn OS command injection vulnerability in FortiExtender 4.1.1 and below under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted "execute date" commands.2019-10-31not yet calculatedCVE-2019-15710
CONFIRM
foswiki -- foswikiFoswiki before 1.1.8 contains a code injection vulnerability in the MAKETEXT macro.2019-11-01not yet calculatedCVE-2013-1666
CONFIRM
MISC
MISC
MISC
freebsd --freebsd/usr/local/www/freeradius_view_config.php in the freeradius3 package before 0.15.7_3 for pfSense on FreeBSD has XSS via a filename.2019-11-02not yet calculatedCVE-2019-18667
MISC
freebsd -- freebsdFreeBSD NSD before 3.2.13 allows remote attackers to crash a NSD child server process (SIGSEGV) and cause a denial of service in the NSD server.2019-11-01not yet calculatedCVE-2012-2979
MISC
CONFIRM
MISC
freetds -- freetdsFreeTDS through 1.1.11 has a Buffer Overflow.2019-10-31not yet calculatedCVE-2019-13508
MISC
glpi_project -- glpiGLPI 0.83.7 has Local File Inclusion in common.tabs.php.2019-11-01not yet calculatedCVE-2013-2227
MISC
MISC
MISC
MISC
MISC
gnome -- evinceevince is missing a check on number of pages which can lead to a segmentation fault2019-11-01not yet calculatedCVE-2013-3718
MISC
MISC
MISC
MISC
google -- nest_cam_iq_indoorAn exploitable denial-of-service vulnerability exists in the Weave daemon of the Nest Cam IQ Indoor, version 4620002. A set of TCP connections can cause unrestricted resource allocation, resulting in a denial of service. An attacker can connect multiple times to trigger this vulnerability.2019-10-31not yet calculatedCVE-2019-5043
MISC
grsecurity -- paxAn exploitable vulnerability exists in the grsecurity PaX patch for the function read_kmem, in PaX from version pax-linux-4.9.8-test1 to 4.9.24-test7, grsecurity official from version grsecurity-3.1-4.9.8-201702060653 to grsecurity-3.1-4.9.24-201704252333, grsecurity unofficial from version v4.9.25-unofficialgrsec to v4.9.74-unofficialgrsec. PaX adds a temp buffer to the read_kmem function, which is never freed when an invalid address is supplied. This results in a memory leakage that can lead to a crash of the system. An attacker needs to induce a read to /dev/kmem using an invalid address to exploit this vulnerability.2019-10-31not yet calculatedCVE-2019-5023
MISC
gs-gpl -- gs-gplI race condition in Temp files was found in gs-gpl before 8.56 addons scripts.2019-11-01not yet calculatedCVE-2005-2352
MISC
MISC
honeywell -- equip_and_performance_series_ip_camerasHoneywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.2019-10-31not yet calculatedCVE-2019-18230
MISC
honeywell -- equip_and_performance_series_ip_cameras_and_recordersHoneywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.2019-10-31not yet calculatedCVE-2019-18226
MISC

honeywell -- equip_ip_and_multiple_equip_series_cameras

Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affe products where a specially crafted HTTP packet request could result in a denial of service.2019-10-31not yet calculatedCVE-2019-18228
MISC
hunt_cctv -- multiple_cctv_devicesAuthentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.2019-10-30not yet calculatedCVE-2013-1391
MISC
MISC
BID
hyundai -- pay_kasse_hk-1000_devicesOn Hyundai Pay Kasse HK-1000 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.2019-11-02not yet calculatedCVE-2019-14360
MISC
icedtea6 -- icedtea6IcedTea6 before 1.7.4 allow unsigned apps to read and write arbitrary files, related to Extended JNLP Services.2019-10-31not yet calculatedCVE-2010-2783
CONFIRM
MISC
MISC
MISC
icedtea6 -- icedtea6IcedTea6 before 1.7.4 does not properly check property access, which allows unsigned apps to read and write arbitrary files.2019-10-31not yet calculatedCVE-2010-2548
CONFIRM
MISC
MISC
ikiwiki -- ikiwikiikiwiki before 3.20110608 allows remote attackers to hijack root's tty and run symlink attacks.2019-10-29not yet calculatedCVE-2011-1408
CONFIRM
MISC
MISC
MISC
internet_systems_consortium -- bindThere had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.2019-11-01not yet calculatedCVE-2019-6470
CONFIRM
CONFIRM
CONFIRM
CONFIRM
ipswitch -- progress_movieit_transferIn Progress MOVEit Transfer 11.1 before 11.1.3, a vulnerability has been found that could allow an attacker to sign in without full credentials via the SSH (SFTP) interface. The vulnerability affects only certain SSH (SFTP) configurations, and is applicable only if the MySQL database is being used.2019-10-31not yet calculatedCVE-2019-18465
CONFIRM
CONFIRM
ipswitch -- progress_movieit_transferIn Progress MOVEit Transfer 10.2 before 10.2.6 (2018.3), 11.0 before 11.0.4 (2019.0.4), and 11.1 before 11.1.3 (2019.1.3), multiple SQL Injection vulnerabilities have been found in the REST API that could allow an unauthenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database or may be able to alter the database.2019-10-31not yet calculatedCVE-2019-18464
CONFIRM
CONFIRM
CONFIRM
CONFIRM
jetbrains -- hubIn JetBrains Hub versions earlier than 2019.1.11738, username enumeration was possible through password recovery.2019-10-31not yet calculatedCVE-2019-18360
CONFIRM
jetbrains -- intellij_ideaJetBrains IntelliJ IDEA before 2019.2 allows local user privilege escalation, potentially leading to arbitrary code execution.2019-10-31not yet calculatedCVE-2019-18361
CONFIRM
jetbrains -- mpsJetBrains MPS before 2019.2.2 exposed listening ports to the network.2019-10-31not yet calculatedCVE-2019-18362
CONFIRM
jetbrains -- teaamcityIn JetBrains TeamCity before 2019.1.2, a non-destructive operation could be performed by a user without the corresponding permissions.2019-10-31not yet calculatedCVE-2019-18367
CONFIRM
jetbrains -- teaamcityIn JetBrains TeamCity before 2019.1.4, reverse tabnabbing was possible on several pages.2019-10-31not yet calculatedCVE-2019-18365
CONFIRM
jetbrains -- teaamcityIn JetBrains TeamCity before 2019.1.2, secure values could be exposed to users with the "View build runtime parameters and data" permission.2019-10-31not yet calculatedCVE-2019-18366
CONFIRM
jetbrains -- toolbox_appIn JetBrains Toolbox App before 1.15.5666 for Windows, privilege escalation was possible.2019-10-31not yet calculatedCVE-2019-18368
CONFIRM
jitbit -- jitbitA cross-site scripting (XSS) vulnerability in Jitbit .NET Forum (aka ASP.NET forum) 8.3.8 allows remote attackers to inject arbitrary web script or HTML via the gravatar URL parameter.2019-11-01not yet calculatedCVE-2019-18636
MISC
MISC
libvnc -- libvncLibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.2019-10-29not yet calculatedCVE-2019-15681
MISC
MLIST
MLIST
linux -- linux_kernelovirt-engine 3.2 running on Linux kernel 3.1 and newer creates certain files world-writeable due to an upstream kernel change which impacted how python's os.chmod() works when passed a mode of '-1'.2019-11-01not yet calculatedCVE-2013-4367
MISC
MISC
magento -- magentoAn insecure direct object reference (IDOR) vulnerability exists in Magento 2.3 prior to 2.3.1, 2.2 prior to 2.2.8, and 2.1 prior to 2.1.17 versions. An authenticated user may be able to view personally identifiable shipping details of another user due to insufficient validation of user controlled input.2019-10-30not yet calculatedCVE-2019-8235
CONFIRM
manageiq -- manageiq_evmMultiple cross-site scripting (XSS) vulnerabilities in ManageIQ EVM allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2019-11-01not yet calculatedCVE-2013-0186
CONFIRM
MISC
mantisbt -- mantisbtA cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows remote attackers to inject arbitrary web script or HTML via a version, related to deleting a version.2019-10-31not yet calculatedCVE-2013-1931
MISC
MISC
MISC
MISC
MISC
CONFIRM
MISC
mantisbt -- mantisbtA cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.13 allows remote authenticated users to inject arbitrary web script or HTML via a project name.2019-10-31not yet calculatedCVE-2013-1932
MISC
MISC
MISC
CONFIRM
MISC
mantisbt -- mantisbtMantisBT 1.2.12 before 1.2.15 allows authenticated users to by the workflow restriction and close issues.2019-10-31not yet calculatedCVE-2013-1930
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
mapserver -- mapserverMapserver 5.2, 5.4 and 5.6 before 5.6.5-2 improperly validates symbol index values during Mapfile parsing.2019-10-29not yet calculatedCVE-2010-1678
MISC
MISC
CONFIRM
maxthon -- maxthon_browser_for_windowsUnquoted Search Path in Maxthon 5.1.0 to 5.2.7 Browser for Windows.2019-10-29not yet calculatedCVE-2019-16647
MISC
MISC
minidlna -- minidlnaMiniDLNA has heap-based buffer overflow2019-11-01not yet calculatedCVE-2013-2739
MISC
MISC
minidlna -- minidlnaminidlna has SQL Injection that may allow retrieval of arbitrary files2019-11-01not yet calculatedCVE-2013-2738
MISC
MISC
MISC
MISC
miniupnpd -- miniupnpdMiniUPnPd has information disclosure use of snprintf()2019-11-01not yet calculatedCVE-2013-2600
MISC
MISC
MISC
MISC
MISC
mooltipass -- moolticuteAn issue was discovered in Mooltipass Moolticute through v0.42.1 and v0.42.x-testing through v0.42.5-testing. There is a NULL pointer dereference in MPDevice_win.cpp.2019-10-30not yet calculatedCVE-2019-18635
MISC
MISC
opera -- opera_mini_for_androidOpera Mini for Android allows attackers to bypass intended restrictions on .apk file download/installation via an RTLO (aka Right to Left Override) approach, as demonstrated by misinterpretation of malicious%E2%80%AEtxt.apk as maliciouskpa.txt. This affects 44.1.2254.142553, 44.1.2254.142659, and 44.1.2254.143214.2019-10-29not yet calculatedCVE-2019-18624
MISC
MISC
phoenix_contact -- pc_works_and_pc_worx_express_and_config+An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.2019-10-31not yet calculatedCVE-2019-16675
MISC
MISC
MISC
postgresql -- postgresqlA flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.2019-10-29not yet calculatedCVE-2019-10208
CONFIRM
CONFIRM
postgresql -- postgresql_windows_installerPostgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via bundled OpenSSL executing code from unprotected directory.2019-10-29not yet calculatedCVE-2019-10211
CONFIRM
CONFIRM
project_jupyter -- jupyter_notebookJupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.2019-10-31not yet calculatedCVE-2018-21030
MISC
MISC
python -- pythonAn exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.2019-10-31not yet calculatedCVE-2019-5010
MISC
qtum -- qtumqtum through 0.16 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service. The attacker sends invalid headers/blocks. The attack requires no stake and can fill the victim's disk and RAM.2019-10-29not yet calculatedCVE-2018-19151
MISC
MISC

rainbow_pdf -- office_server_document_converter

A buffer overflow vulnerability exists in the PowerPoint document conversion function of Rainbow PDF Office Server Document Converter V7.0 Pro MR1 (7,0,2019,0220). While parsing a document text info container, the TxMasterStyleAtom::parse function is incorrectly checking the bounds corresponding to the number of style levels, causing a vtable pointer to be overwritten, which leads to code execution.2019-10-31not yet calculatedCVE-2019-5030
MISC
rdesktop -- rdesktopRDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.52019-10-30not yet calculatedCVE-2019-15682
MISC
red_hat -- jboss_operations_networkA missing permission check was found in The CLI in JBoss Operations Network before 2.3.1 does not properly check permissions, which allows JBoss ON users to perform management tasks and configuration changes with the privileges of the administrator user.2019-10-30not yet calculatedCVE-2010-0737
MISC
red_hat -- openshiftcartridges/openshift-origin-cartridge-mongodb-2.2/info/bin/dump.sh in OpenShift does not properly create files in /tmp.2019-11-01not yet calculatedCVE-2013-0165
MISC
red_hat -- openstackHTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.2019-11-01not yet calculatedCVE-2013-2255
MISC
MISC
MISC
MISC
MISC
MISC
MISC
red_hat -- red_hat_enterprise_linuxWhile backporting a feature for a newer branch of BIND9, RedHat introduced a path leading to an assertion failure in buffer.c:420. Affects RedHat versions bind-9.9.4-65.el7 -> bind-9.9.4-72.el7. No ISC releases are affected. Other packages from other distributions who made the same error may also be affected.2019-10-30not yet calculatedCVE-2018-5742
CONFIRM
redis -- redisInsecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.2019-11-01not yet calculatedCVE-2013-0180
MLIST
MISC
redis -- redisInsecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.2019-11-01not yet calculatedCVE-2013-0178
MISC
MISC
MISC
MISC
MISC
MISC
rpcbind -- rpcbindrpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.2019-10-29not yet calculatedCVE-2010-2061
MISC
MISC
MISC
MISC
MLIST
rpcbind -- rpcbindrpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.2019-10-29not yet calculatedCVE-2010-2064
MISC
MISC
MISC
MLIST
ruby193 -- ruby193ruby193 uses an insecure LD_LIBRARY_PATH setting.2019-10-31not yet calculatedCVE-2013-1945
MISC
sahi_pro -- sahi_proSahi Pro 8.0.0 has a script manager arena located at _s_/dyn/pro/DBReports with many different areas that are vulnerable to reflected XSS, by updating a script's Script Name, Suite Name, Base URL, Android, iOS, Scripts Run, Origin Machine, or Comment field. The sql parameter can be used to trigger reflected XSS.2019-10-29not yet calculatedCVE-2019-13066
MISC
MISC
schneider_electric -- multiple_modicon_productsA CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists in Modicon M580, Modicon M340, Modicon Premium , Modicon Quantum (all firmware versions), which could cause the disclosure of information when transferring applications to the controller using Modbus TCP protocol.2019-10-29not yet calculatedCVE-2019-6845
CONFIRM
schneider_electric -- multiple_modicon_productsA CWE-538: File and Directory Information Exposure vulnerability exists in Modicon M580, Modicon M340, Modicon Premium , Modicon Quantum (all firmware versions), which could cause the disclosure of information from the controller when using TFTP protocol.2019-10-29not yet calculatedCVE-2019-6851
CONFIRM
schneider_electric -- multiple_modicon_productsA CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause information disclosure when using the FTP protocol.2019-10-29not yet calculatedCVE-2019-6846
CONFIRM
secudos -- domosThe Log module in SECUDOS DOMOS before 5.6 allows XSS.2019-11-02not yet calculatedCVE-2019-18664
MISC
secudos -- domosThe Log module in SECUDOS DOMOS before 5.6 allows local file inclusion.2019-11-02not yet calculatedCVE-2019-18665
MISC
sensiolabs -- php-symphony2-validatorphp-symfony2-Validator has loss of information during serialization2019-11-01not yet calculatedCVE-2013-4751
MISC
MISC
MISC
MISC
MISC
MISC
shift_cryptosecurity -- bitbox02On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. Note: BIP39 secrets are not displayed by default on this device. The side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.2019-11-02not yet calculatedCVE-2019-18673
MISC
sierra_wireless -- airlink_es450_fwAn exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability.2019-10-31not yet calculatedCVE-2018-4064
MISC
smokeping -- smokepingCross-site scripting (XSS) vulnerability in SmokePing 2.6.9 in the start and end time fields.2019-11-01not yet calculatedCVE-2013-4168
MISC
MISC
MISC
MISC
MISC
MISC
sonatype -- nexus_repository_managerThere is an OS Command Injection in Nexus Repository Manager <= 2.14.14 (bypass CVE-2019-5475) that could allow an attacker a Remote Code Execution (RCE). All instances using CommandLineExecutor.java with user-supplied data is vulnerable, such as the Yum Configuration Capability.2019-11-01not yet calculatedCVE-2019-15588
MISC
CONFIRM
symantec -- sonarThe Symantec SONAR component, prior to 12.0.2, may be susceptible to a tamper protection bypass vulnerability which could potentially allow an attacker to circumvent the existing tamper protection in use on the resident system.2019-11-01not yet calculatedCVE-2019-12752
CONFIRM
systemd -- systemdsystemd 239 through 243 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend.2019-10-30not yet calculatedCVE-2018-21029
MISC
MISC
MISC
technicolor -- td5130v2_devicesAn issue was discovered in certain Oi third-party firmware that may be installed on Technicolor TD5130v2 devices. A Command Injection in the Ping module in the Web Interface in OI_Fw_V20 allows remote attackers to execute arbitrary OS commands in the pingAddr parameter to mnt_ping.cgi. NOTE: This may overlap CVE-2017?14127.2019-10-31not yet calculatedCVE-2019-18396
MISC
MISC
tightrope_media_systems -- carouselThe Tightrope Media Carousel Seneca HDn Windows-based appliance 7.0.4.104 is shipped with a default local administrator username and password. This can be found by a limited user account in an "unattend.xml" file left over on the C: drive from the Sysprep process. An attacker with this username and password can leverage it to gain administrator-level access on the system.2019-10-29not yet calculatedCVE-2018-18929
MISC
tightrope_media_systems -- carouselAn issue was discovered in the Tightrope Media Carousel digital signage product 7.0.4.104. Due to insecure default permissions on the C:\TRMS\Services directory, an attacker who has gained access to the system can elevate their privileges from a restricted account to full SYSTEM by replacing the Carousel.Service.exe file with a custom malicious executable. This service is independent of the associated IIS web site, which means that this service can be manipulated by an attacker without losing access to vulnerabilities in the web interface (which would potentially be used in conjunction with this attack, to control the service). Once the attacker has replaced Carousel.Service.exe, the server can be restarted using the command "shutdown -r -t 0" from a web shell, causing the system to reboot and launching the malicious Carousel.Service.exe as SYSTEM on startup. If this malicious Carousel.Service.exe is configured to launch a reverse shell back to the attacker, then upon reboot the attacker will have a fully privileged remote command-line environment to manipulate the system further.2019-10-29not yet calculatedCVE-2018-18931
MISC
tightrope_media_systems -- carouselThe Tightrope Media Carousel digital signage product 7.0.4.104 contains an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. An authenticated attacker can upload a crafted ZIP file (based on an exported backup of existing "Bulletins") containing a malicious file. When uploaded, the system only checks for the presence of the needed files within the ZIP and, as long as the malicious file is named properly, will extract all contained files to a new directory on the system, named with a random GUID. The attacker can determine this GUID by previewing an image from the uploaded Bulletin within the web UI. Once the GUID is determined, the attacker can navigate to the malicious file and execute it. In testing, an ASPX web shell was uploaded, allowing for remote-code execution in the context of a restricted IIS user.2019-10-29not yet calculatedCVE-2018-18930
MISC

trend_micro -- apex_one_and_officescan_and_worry-free_business_security

A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an attacker to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does not require authentication.2019-10-28not yet calculatedCVE-2019-18189
N/A
turbovnc -- turbovncTurboVNC server code contains stack buffer overflow vulnerability in commit prior to cea98166008301e614e0d36776bf9435a536136e. This could possibly result into remote code execution, since stack frame is not protected with stack canary. This attack appear to be exploitable via network connectivity. To exploit this vulnerability authorization on server is required. These issues have been fixed in commit cea98166008301e614e0d36776bf9435a536136e.2019-10-29not yet calculatedCVE-2019-15683
MISC
twiki -- twikiTWiki allows arbitrary shell command execution via the Include function2019-11-01not yet calculatedCVE-2005-3056
DEBIAN
MISC
CONFIRM
typo3 -- typo3TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows Open Redirection on the backend.2019-11-01not yet calculatedCVE-2010-3661
MISC
MISC
CONFIRM
typo3 -- typo3TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 allows XSS on the backend.2019-11-01not yet calculatedCVE-2010-3660
MISC
MISC
CONFIRM
vmware -- esxi_and_workstation_and_fusionVMware ESXi (6.7 before ESXi670-201908101-SG and 6.5 before ESXi650-201910401-SG), Workstation (15.x before 15.5.0) and Fusion (11.x before 11.5.0) contain a denial-of-service vulnerability in the shader functionality. Successful exploitation of this issue may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. Exploitation of this issue require an attacker to have access to a virtual machine with 3D graphics enabled. It is not enabled by default on ESXi and is enabled by default on Workstation and Fusion.2019-10-28not yet calculatedCVE-2019-5536
MISC
vmware -- sd-wanIn VMware SD-WAN by VeloCloud versions 3.x prior to 3.3.0, the VeloCloud Orchestrator parameter authorization check mistakenly allows enterprise users to obtain information of Managed Service Provider accounts. Among the information is username, first and last name, phone numbers and e-mail address if present but no other personal data. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 4.3.2019-10-29not yet calculatedCVE-2019-5533
CONFIRM
vmware -- vcenter_server_applianceSensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance (6.7 before 6.7u3a and 6.5 before 6.5u3d) may allow a malicious actor to intercept sensitive data in transit over FTPS and HTTPS. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.2019-10-28not yet calculatedCVE-2019-5537
MISC
vmware -- vcenter_server_applianceSensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance (6.7 before 6.7u3a and 6.5 before 6.5u3d) may allow a malicious actor to intercept sensitive data in transit over SCP. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.2019-10-28not yet calculatedCVE-2019-5538
MISC
websieve -- websieveCross-site scripting (XSS) vulnerability in websieve v0.62 allows remote attackers to inject arbitrary web script or HTML code in the web user interface.2019-11-01not yet calculatedCVE-2005-2350
MISC
MISC
wordpress -- wordpressplugin-fw/lib/yit-plugin-panel-wc.php in the YIT Plugin Framework through 3.3.8 for WordPress allows authenticated options changes.2019-10-31not yet calculatedCVE-2019-16251
MISC
MISC
wordpress -- wordpressAn issue was discovered in the Currency Switcher addon before 2.11.2 for WooCommerce if a user provides a currency that was not added by the administrator. In this case, even though the currency does not exist, it will be selected, but a price amount will fall back to the default currency. This means that if an attacker provides a currency that does not exist and is worth less than this default, the attacker can eventually purchase an item for a significantly cheaper price.2019-11-02not yet calculatedCVE-2019-18668
MISC
MISC
xen_project -- xenAn issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don't install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.2019-10-31not yet calculatedCVE-2019-18425
MLIST
MISC
xen_project -- xenAn issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m->max_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUG_ON(). The function p2m_get_root_pointer() will ignore the unused top bits of a guest physical frame. This means that the function p2m_set_entry() will alias the frame. However, p2m->max_mapped_gfn will be updated using the original frame. It would be possible to set p2m->max_mapped_gfn high enough to cover a frame that would lead p2m_get_root_pointer() to return NULL in p2m_get_entry() and p2m_resolve_translation_fault(). Additionally, the sanity check on p2m->max_mapped_gfn is off-by-one allowing "highest mapped + 1" to be considered valid. However, p2m_get_root_pointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEM_add_to_physmap{, _batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2m_get_root_pointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.2019-10-31not yet calculatedCVE-2019-18423
MLIST
MISC
xen_project -- xenAn issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.2019-10-31not yet calculatedCVE-2019-18422
MLIST
MISC
xen_project -- xenAn issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.2019-10-31not yet calculatedCVE-2019-18424
MLIST
MISC
xen_project -- xenAn issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.2019-10-31not yet calculatedCVE-2019-18420
MLIST
MISC
xen_project -- xenAn issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be "promoted" before being used as a pagetable, and "demoted" before being used for any other type. Xen also allows for "recursive" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.2019-10-31not yet calculatedCVE-2019-18421
MLIST
MISC
yandex -- clickhouseClickHouse before 19.13.5.44 allows HTTP header injection via the url table function.2019-10-31not yet calculatedCVE-2019-18657
MISC
MISC
MISC
youphptube -- youphptubeAn issue was discovered in YouPHPTube through 7.7. User input passed through the live_stream_code POST parameter to /plugin/LiveChat/getChat.json.php is not properly sanitized (in getFromChat in plugin/LiveChat/Objects/LiveChatObj.php) before being used to construct a SQL query. This can be exploited by malicious users to, e.g., read sensitive data from the database through in-band SQL Injection attacks. Successful exploitation of this vulnerability requires the Live Chat plugin to be enabled.2019-11-02not yet calculatedCVE-2019-18662
MISC
youphptube -- youphptubeAn exploitable SQL injection vulnerability exist in YouPHPTube 7.7. A specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability.2019-10-31not yet calculatedCVE-2019-5151
MISC
youphptube -- youphptubeAn exploitable SQL injection vulnerability exist in YouPHPTube 7.7. When the "VideoTags" plugin is enabled, a specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability.2019-10-31not yet calculatedCVE-2019-5150
MISC
yum -- yumyum does not properly handle bad metadata, which allows an attacker to cause a denial of service and possibly have other unspecified impact via a Trojan horse file in the metadata of a remote repository.2019-10-31not yet calculatedCVE-2013-1910
MISC
MISC
MISC
MISC
MISC
MISC
zte -- zx297520v3The 7520V3V1.0.0B09P27 version, and all earlier versions of ZTE product ZX297520V3 are impacted by a Command Injection vulnerability. Unauthorized users can exploit this vulnerability to control the user terminal system.2019-10-31not yet calculatedCVE-2019-3421
CONFIRM
zte -- zxmpA security vulnerability exists in a management port in the version of ZTE's ZXMP M721V3.10P01B10_M2NCP. An attacker could exploit this vulnerability to build a link to the device and send specific packets to cause a denial of service.2019-10-31not yet calculatedCVE-2019-3419
CONFIRM
zuchetti -- infobusinessIn Zucchetti InfoBusiness before and including 4.4.1, an authenticated user can inject client-side code due to improper validation of the Title field in the InfoBusiness Web Component. The payload will be triggered every time a user browses the reports page.2019-10-30not yet calculatedCVE-2019-18207
MISC
zuchetti -- infobusinessA cross-site request forgery (CSRF) vulnerability in Zucchetti InfoBusiness before and including 4.4.1 allows arbitrary file upload.2019-10-30not yet calculatedCVE-2019-18206
MISC
Back to top

This product is provided subject to this Notification and this Privacy & Use policy.

CSET Version 9.2 Now Available

$
0
0
Original release date: November 4, 2019

The Cybersecurity and Infrastructure Security Agency (CISA) has released version 9.2 of its Cyber Security Evaluation Tool (CSET). CSET is a desktop software tool that guides asset owners and operators through a consistent process for evaluating control system networks as part of a comprehensive cybersecurity assessment that uses recognized government and industry standards and recommendations.

CSET 9.2 includes the following feature enhancements and upgrades:

  • Web-based diagram editor
  • Enhanced reporting
  • New capability maturity model for financial sector customers
  • National Credit Union Administration (NCUA) Automated Cybersecurity Examination Tool (ACET) Standard
  • Financial sector risk assessment wizard
  • New analysis for network diagram questions
  • Transportation Security Administration (TSA) 2018 Pipeline security standard
  • International Society of Automation (ISA)/International Electrotechnical Commission (IEC) 62443 standards  

CISA encourages users to update to CSET version 9.2, available at https://github.com/cisagov/cset/wiki.

This product is provided subject to this Notification and this Privacy & Use policy.

U.S. Cyber Command Shares Seven New Malware Samples

$
0
0
Original release date: November 6, 2019

U.S. Cyber Command has released seven malware samples to the malware aggregation tool and repository, VirusTotal. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review U.S. Cyber Command’s VirusTotal page to view the samples. CISA also recommends users and administrators review the CISA Tip on Protecting Against Malicious Code for best practices on protecting systems and networks against malware.

This product is provided subject to this Notification and this Privacy & Use policy.

CISA Launches “Cyber Essentials” for Small Businesses and Small SLTT Governments

$
0
0
Original release date: November 6, 2019

The Cybersecurity and Infrastructure Security Agency (CISA) has launched Cyber Essentials, an effort to assist small organizations in understanding and addressing cybersecurity risks. Developed in partnership with small businesses and small state, local, tribal, and territorial (SLTT) governments, Cyber Essentials aims to equip these organizations with basic steps and resources to improve their cybersecurity resilience.

CISA’s Fall 2019 Cyber Essentials infographic includes a list of six actions organizations can take to reduce cyber risks:

  • Drive cybersecurity strategy, investment, and culture;
  • Develop security awareness and vigilance;
  • Protect critical assets and applications;
  • Ensure only those who belong on your digital workplace have access;
  • Make backups and avoid the loss of information critical to operations; and
  • Limit damage and quicken restoration of normal operations.

CISA encourages small organizations to review CISA’s Cyber Essentials page to learn more about improving their cybersecurity resilience. 

This product is provided subject to this Notification and this Privacy & Use policy.

Cisco Releases Security Updates

$
0
0
Original release date: November 7, 2019

Cisco has released security updates to address vulnerabilities in Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities see the Cisco Security Advisories webpage.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the following Cisco advisories and apply the necessary updates:

This product is provided subject to this Notification and this Privacy & Use policy.

Viewing all 2670 articles
Browse latest View live