PwC claims fewer than 50% of businesses involve their CISOs in strategic planning on cyber
Monthly Archives: September 2024
perl-App-cpanminus-1.7047-4.fc40
FEDORA-2024-aaa468ae4f
Packages in this update:
perl-App-cpanminus-1.7047-4.fc40
Update description:
Patch the code to use https instead of http (CVE-2024-45321)
perl-App-cpanminus-1.7047-5.fc41
FEDORA-2024-ef9db8b16d
Packages in this update:
perl-App-cpanminus-1.7047-5.fc41
Update description:
Patch the code to use https instead of http (CVE-2024-45321)
UK and US Warn of Growing Iranian Spear Phishing Threat
Security agencies from the UK and US are urging individuals with Middle East links to beware of Iranian spear phishing attacks
logiops-0.3.5-1.fc39
FEDORA-2024-69ce052378
Packages in this update:
logiops-0.3.5-1.fc39
Update description:
Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This allows all users on the system to remap a key unexpectedly to a potentially malicious sequence
logiops-0.3.5-1.fc40
FEDORA-2024-326390f033
Packages in this update:
logiops-0.3.5-1.fc40
Update description:
Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This allows all users on the system to remap a key unexpectedly to a potentially malicious sequence
logiops-0.3.5-1.fc41
FEDORA-2024-1a9b10c921
Packages in this update:
logiops-0.3.5-1.fc41
Update description:
Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This allows all users on the system to remap a key unexpectedly to a potentially malicious sequence
Backdoor.Win32.Benju.a / Unauthenticated Remote Command Execution
Posted by malvuln on Sep 28
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/88922242e8805bfbc5981e55fdfadd71.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln
Threat: Backdoor.Win32.Benju.a
Vulnerability: Unauthenticated Remote Command Execution
Family: Benju
Type: PE32
MD5: 88922242e8805bfbc5981e55fdfadd71
SHA256: 7d34804173e09d0f378dfc8c9212fe77ff51f08c9d0b73d00a19b7045ddc1f0e
Vuln ID: MVID-2024-0700…
Backdoor.Win32.Prorat.jz / Remote Stack Buffer Overflow (SEH)
Posted by malvuln on Sep 28
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/277f9a4db328476300c4da5f680902ea.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln
Threat: Backdoor.Win32.Prorat.jz
Vulnerability: Remote Stack Buffer Overflow (SEH)
Description: The RAT listens on TCP ports 51100,5112,5110 and runs an
FTP service. Prorat uses a vulnerable component in a secondary malware
it drops on the victim…
Backdoor.Win32.Amatu.a / Remote Arbitrary File Write (RCE)
Posted by malvuln on Sep 28
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024
Original source:
https://malvuln.com/advisory/1e2d0b90ffc23e00b743c41064bdcc6b.txt
Contact: malvuln13 () gmail com
Media: x.com/malvuln
Threat: Backdoor.Win32.Amatu.a
Vulnerability: Remote Arbitrary File Write (RCE)
Family: Amatu
Type: PE32
MD5: 1e2d0b90ffc23e00b743c41064bdcc6b
SHA256: 77fff9931013ab4de6d4be66ca4fda47be37b6f706a7062430ee8133c7521297
Vuln ID: MVID-2024-0698
Dropped…