Aggregator
CVE-2013-0300 | ownCloud up to 4.5.6 cross-site request forgery (ID 801070)
CVE-2013-0301 | ownCloud up to 4.0.11 timezone cross-site request forgery (ID 801070)
CVE-2013-0201 | ownCloud up to 4.5.6 token cross site scripting (XFDB-81475 / OSVDB-89505)
CVE-2013-0303 | ownCloud up to 4.5.5 privilege escalation (ID 801070)
CVE-2013-7344 | ownCloud up to 4.5.5 code injection (ID 801070)
CVE-2014-2057 | ownCloud up to 4.0.7 cross site scripting (ID 801070)
CVE-2014-2585 | ownCloud up to 6.0.1 Filesystem input validation (Nessus ID 73998 / XFDB-91970)
CVE-2012-5056 | ownCloud up to 4.0.7 lib/db.php root cross site scripting (ID 865290)
CVE-2012-5057 | ownCloud up to 4.0.7 path crlf injection (ID 865290)
CVE-2012-5336 | ownCloud up to 4.0.7 Session lib/base.php session input validation (ID 865290)
CVE-2013-0204 | ownCloud up to 4.5.5 code injection (ID 801070)
CVE-2013-1941 | ownCloud up to 5.0.3 Installation Routine time cryptographic issues (ID 703064)
CVE-2014-2053 | ownCloud up to 6.0.1 getID3 xml external entity reference (News 29405 / Nessus ID 77157)
CVE-2014-2054 | ownCloud up to 6.0.1 xml external entity reference (ID 801070)
CVE-2014-2055 | Fruux SabreDAV up to 1.8.9 xml external entity reference (ID 801070)
DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data
DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022. Initially gaining traction through underground forums, the malware is now widely sold on Telegram, making it accessible to cybercriminals worldwide. DarkCloud employs a variety of distribution techniques, with phishing campaigns being the most prevalent. Attackers […]
The post DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Top 10 Most-Used RDP Passwords Are Not Complex Enough
Triton RAT Uses Telegram for Remote System Access and Control
Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote system access and data exfiltration. This open-source malware, available on GitHub, is designed to execute a wide range of malicious activities, including credential theft, system control, and persistence establishment. Technical Overview Triton RAT initiates its […]
The post Triton RAT Uses Telegram for Remote System Access and Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.