Posted by malvuln on Apr 07
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/837ec70bfb305b5c862ff9b04e70a318_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Wisell
Vulnerability: Stack Buffer Overflow (SEH)
Description: The malware listens on TCP port 5277. Attackers who can reach
the infected system can send a specially crafted packet triggering a stack
buffer overflow overwriting…
More Stories
USN-7417-1: libdbd-mysql-perl vulnerabilities
It was discovered that libdbd-mysql-perl did not correctly handle certain SQL queries. An attacker could possibly use this issue to...
USN-7416-1: Kamailio vulnerabilities
Stelios Tsampas discovered that Kamailio did not correctly handle certain memory operations, which could lead to a buffer overflow. A...
podman-tui-1.5.0-1.fc42
FEDORA-2025-8a7d23116e Packages in this update: podman-tui-1.5.0-1.fc42 Update description: release 1.5.0 Read More
podman-tui-1.5.0-1.el10_1
FEDORA-EPEL-2025-6618927fc5 Packages in this update: podman-tui-1.5.0-1.el10_1 Update description: release 1.5.0 Read More
podman-tui-1.5.0-1.fc41
FEDORA-2025-f1d2ae375e Packages in this update: podman-tui-1.5.0-1.fc41 Update description: release 1.5.0 Read More
rust-below-0.9.0-1.el8
FEDORA-EPEL-2025-ae12e02519 Packages in this update: rust-below-0.9.0-1.el8 Update description: A privilege escalation vulnerability existed in the Below service prior to v0.9.0...