Posted by malvuln on Apr 07
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/837ec70bfb305b5c862ff9b04e70a318_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Wisell
Vulnerability: Stack Buffer Overflow (SEH)
Description: The malware listens on TCP port 5277. Attackers who can reach
the infected system can send a specially crafted packet triggering a stack
buffer overflow overwriting…
More Stories
cacti-1.2.30-1.el8 cacti-spine-1.2.30-1.el8
FEDORA-EPEL-2025-ba03a05138 Packages in this update: cacti-1.2.30-1.el8 cacti-spine-1.2.30-1.el8 Update description: Update cacti and cacti-spine to version 1.2.30. This includes the upstream...
cacti-1.2.30-1.el9 cacti-spine-1.2.30-1.el9
FEDORA-EPEL-2025-19d7286f00 Packages in this update: cacti-1.2.30-1.el9 cacti-spine-1.2.30-1.el9 Update description: Update cacti and cacti-spine to version 1.2.30. This includes the upstream...
USN-7437-1: CImg library vulnerabilities
It was discovered that the CImg library did not properly check the size of images before loading them. An attacker...
mujs-1.0.9-2.el8
FEDORA-EPEL-2025-141926b526 Packages in this update: mujs-1.0.9-2.el8 Update description: Backport upstream fix for CVE-2021-33796. https://nvd.nist.gov/vuln/detail/CVE-2021-33796 Read More
USN-7436-1: WebKitGTK vulnerabilities
Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a...
USN-7435-1: Protocol Buffers vulnerability
It was discovered that Protocol Buffers incorrectly handled memory when receiving malicious input using the Java bindings. An attacker could...