Firm admits temporary disruption to operations
Monthly Archives: May 2022
mingw-freetype-2.12.1-1.fc36
FEDORA-2022-7ece4f6d74
Packages in this update:
mingw-freetype-2.12.1-1.fc36
Update description:
Update to 2.12.1.
Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406
Ponzi Scheme Suspect Deported to China After $36m Bust
libxml2-2.9.14-1.fc35
FEDORA-2022-be6d83642a
Packages in this update:
libxml2-2.9.14-1.fc35
Update description:
Update to 2.9.14
Fix CVE-2022-29824: Integer overflow in xmlBuf and xmlBuffer
libxml2-2.9.14-1.fc36
FEDORA-2022-9136d646e4
Packages in this update:
libxml2-2.9.14-1.fc36
Update description:
Update to 2.9.14
Fix CVE-2022-29824: Integer overflow in xmlBuf and xmlBuffer
firefox-100.0-2.fc36
FEDORA-2022-2c4ed935d1
Packages in this update:
firefox-100.0-2.fc36
Update description:
New upstream version (100.0)
Fix mozbz#1759137 (ffmpeg crash)
firefox-100.0-1.fc35
FEDORA-2022-63b1344b6d
Packages in this update:
firefox-100.0-1.fc35
Update description:
New upstream version (100.0)
firefox-100.0-1.fc34
FEDORA-2022-d2d1fd90df
Packages in this update:
firefox-100.0-1.fc34
Update description:
New upstream version (100.0)
Syxsense launches vulnerability monitoring and remediation solution
Syxsense has announced a new security and endpoint management solution that delivers vulnerability monitoring and remediation across devices and network environments. The IT management and endpoint security vendor stated that the platform – Syxsense Enterprise – delivers a unified solution that scans and manages all endpoints, resolves problems in real-time, and reduces the risks associated with system misconfigurations, enabling organizations to better predict, identify, and remediate vulnerabilities in desktop, laptop, server, and mobile devices. The release comes shortly after a global cybersecurity advisory highlighted the importance of timely vulnerability management as attackers continue to target internet-facing systems to exploit vulnerabilities both old and new.
Ransom.AvosLocker / Code Execution
Posted by malvuln on May 02
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/40f2238875fcbd2a92cfefc4846a15a8.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Ransom.AvosLocker
Vulnerability: Code Execution
Description: The ransomware looks for and executes DLLs in its current
directory. Therefore, we can potentially hijack a vuln DLL execute our
own code, control and terminate the malware…