Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
{"id": "SECURITYVULNS:DOC:8546", "bulletinFamily": "software", "title": "[SA15240] MaraDNS Unspecified Random Number Generator Vulnerability", "description": "\r\n----------------------------------------------------------------------\r\n\r\nWant a new IT Security job?\r\n\r\nVacant positions at Secunia:\r\nhttp://secunia.com/secunia_vacancies/\r\n\r\n----------------------------------------------------------------------\r\n\r\nTITLE:\r\nMaraDNS Unspecified Random Number Generator Vulnerability\r\n\r\nSECUNIA ADVISORY ID:\r\nSA15240\r\n\r\nVERIFY ADVISORY:\r\nhttp://secunia.com/advisories/15240/\r\n\r\nCRITICAL:\r\nLess critical\r\n\r\nIMPACT:\r\nUnknown\r\n\r\nWHERE:\r\n>From remote\r\n\r\nSOFTWARE:\r\nMaraDNS 1.x\r\nhttp://secunia.com/product/5045/\r\n\r\nDESCRIPTION:\r\nA vulnerability with an unknown impact has been reported in MaraDNS.\r\n\r\nThe vulnerability is caused due to an unspecified error affecting the\r\nMaraDNS's secure random number generator.\r\n\r\nNo further details are currently available.\r\n\r\nSOLUTION:\r\nUpdate to version 1.0.27.\r\nhttp://www.maradns.org/download.html\r\n\r\nPROVIDED AND/OR DISCOVERED BY:\r\nReported by vendor.\r\n\r\n----------------------------------------------------------------------\r\n\r\nAbout:\r\nThis Advisory was delivered by Secunia as a free service to help\r\neverybody keeping their systems up to date against the latest\r\nvulnerabilities.\r\n\r\nSubscribe:\r\nhttp://secunia.com/secunia_security_advisories/\r\n\r\nDefinitions: (Criticality, Where etc.)\r\nhttp://secunia.com/about_secunia_advisories/\r\n\r\n\r\nPlease Note:\r\nSecunia recommends that you verify all advisories you receive by\r\nclicking the link.\r\nSecunia NEVER sends attached files with advisories.\r\nSecunia does not advise people to install third party patches, only\r\nuse those supplied by the vendor.\r\n", "published": "2005-05-04T00:00:00", "modified": "2005-05-04T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:8546", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:12", "edition": 1, "viewCount": 3, "enchantments": {"score": {"value": 6.0, "vector": "NONE", "modified": "2018-08-31T11:10:12", "rev": 2}, "dependencies": {"references": [{"type": "mskb", "idList": ["KB4461473", "KB3023167", "KB4461487"]}, {"type": "cve", "idList": ["CVE-2019-8546", "CVE-2014-2595", "CVE-2015-8546", "CVE-2015-9286", "CVE-2018-8546", "CVE-2008-7273", "CVE-2008-7272"]}, {"type": "apple", "idList": ["APPLE:HT209602", "APPLE:HT209599", "APPLE:HT209600"]}, {"type": "nessus", "idList": ["MACOS_10_14_4.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310815009", "OPENVAS:1361412562310814283"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:150425"]}, {"type": "threatpost", "idList": ["THREATPOST:B75E5B7B7EE0FD43DE75A445E5EB5584"]}, {"type": "thn", "idList": ["THN:FC0A657EEDC66A38CB29C06FB477EEF0"]}, {"type": "talosblog", "idList": ["TALOSBLOG:888E52F54CE3D9839D4EF47A5A2C49D8"]}], "modified": "2018-08-31T11:10:12", "rev": 2}, "vulnersScore": 6.0}, "affectedSoftware": []}
{"rst": [{"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **74[.]120.174.17** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **19**.\n First seen: 2020-10-22T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **shellprobe, generic**.\nASN 25820: (First IP 74.120.168.0, Last IP 74.120.175.255).\nASN Name \"IT7NET\" and Organisation \"IT7 Networks Inc\".\nASN hosts 87966 domains.\nGEO IP information: City \"Los Angeles\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-10-22T00:00:00", "id": "RST:A114D823-4928-31D9-8546-344FEA270CC6", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 74.120.174.17", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **47[.]46.220.20** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2020-10-21T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **generic**.\nASN 20115: (First IP 47.46.0.0, Last IP 47.47.127.255).\nASN Name \"CHARTERNETHKYNC\" and Organisation \"Charter Communications\".\nASN hosts 30248 domains.\nGEO IP information: City \"Greenville\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-10-21T00:00:00", "id": "RST:91B6B488-84D4-3CB4-8546-77B08A4623E3", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 47.46.220.20", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-25T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **66[.]42.106.138** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2020-01-02T03:00:00, Last seen: 2021-01-25T03:00:00.\n IOC tags: **malware**.\nASN 20473: (First IP 66.42.32.0, Last IP 66.42.127.255).\nASN Name \"ASCHOOPA\" and Organisation \"Choopa LLC\".\nASN hosts 1012594 domains.\nGEO IP information: City \"Los Angeles\", Country \"United States\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-01-02T00:00:00", "id": "RST:E2643D28-190A-3D39-8546-139D91FDB60B", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 66.42.106.138", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **62[.]140.23.192** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **19**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **generic**.\nASN 3356: (First IP 62.140.12.0, Last IP 62.140.30.255).\nASN Name \"LEVEL3\" and Organisation \"Level 3 Communications Inc\".\nASN hosts 238163 domains.\nGEO IP information: City \"Unterfoehring\", Country \"Germany\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:677B5C26-8546-318D-8655-7E8B21FB26AF", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 62.140.23.192", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **http://generaldeviales[.]com/wp-admin/swift/q3kbe1861928732711755fv8oqozi4c7n30u** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-01-05T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **malware**.\nIt was found that the IOC is used by: **emotet**.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-05T00:00:00", "id": "RST:3D0D3EF3-A50A-35A8-8546-FDB8DEA20FEA", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: http://generaldeviales.com/wp-admin/swift/q3kbe1861928732711755fv8oqozi4c7n30u", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-25T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **5[.]77.61.92** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **2**.\n First seen: 2020-01-02T03:00:00, Last seen: 2021-01-25T03:00:00.\n IOC tags: **malware**.\nASN 20860: (First IP 5.77.56.0, Last IP 5.77.61.255).\nASN Name \"IOMARTAS\" and Organisation \"\".\nASN hosts 450060 domains.\nGEO IP information: City \"\", Country \"United Kingdom\".\nIn according to RST Threat Feed the IP is related to **k18investgroup.com** malicious domains.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-01-02T00:00:00", "id": "RST:E73434F6-C975-3FA0-8546-B1E86C84DE10", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 5.77.61.92", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **36[.]255.87.228** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **19**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **generic**.\nASN 132559: (First IP 36.255.84.0, Last IP 36.255.87.255).\nASN Name \"GATIKASIN\" and Organisation \"Gatik Business Solutions\".\nASN hosts 25 domains.\nGEO IP information: City \"Bengaluru\", Country \"India\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:BE5DBE41-C4CF-3000-8546-ADEF8086F8A8", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 36.255.87.228", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **104[.]60.190.163** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **19**.\n First seen: 2020-12-23T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **generic**.\nASN 7018: (First IP 104.48.0.0, Last IP 104.63.255.255).\nASN Name \"ATTINTERNET4\" and Organisation \"ATT Services Inc\".\nASN hosts 176228 domains.\nGEO IP information: City \"Houston\", Country \"United States\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-23T00:00:00", "id": "RST:79C785AE-0980-3389-8546-873443A44A25", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 104.60.190.163", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **176[.]31.182.125** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2019-10-13T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **shellprobe, generic**.\nASN 16276: (First IP 176.31.0.0, Last IP 176.31.255.255).\nASN Name \"OVH\" and Organisation \"\".\nThis IP is a part of \"**ovh**\" address pools.\nASN hosts 8553004 domains.\nGEO IP information: City \"\", Country \"France\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-10-13T00:00:00", "id": "RST:89FEB487-862A-3DDD-8546-B4F1F882F8A8", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 176.31.182.125", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-26T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **198[.]245.61.117** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2020-10-10T03:00:00, Last seen: 2021-01-26T03:00:00.\n IOC tags: **tor_node**.\nASN 16276: (First IP 198.245.48.0, Last IP 198.245.63.255).\nASN Name \"OVH\" and Organisation \"\".\nThis IP is a part of \"**ovh**\" address pools.\nASN hosts 8553004 domains.\nGEO IP information: City \"\", Country \"Canada\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-10-10T00:00:00", "id": "RST:5CCB423B-AC02-3584-8546-B422A62CC85E", "href": "", "published": "2021-01-27T00:00:00", "title": "RST Threat feed. IOC: 198.245.61.117", "type": "rst", "cvss": {}}]}