FEDORA-2022-ac82a548df
Packages in this update:
python3.10-3.10.7-1.fc35
python3-docs-3.10.7-1.fc35
Update description:
Update to 3.10.7
Contains security fix for CVE-2020-10735
python3.10-3.10.7-1.fc35
python3-docs-3.10.7-1.fc35
Update to 3.10.7
Contains security fix for CVE-2020-10735
python3.10-3.10.7-1.fc37
Update to 3.10.7
Contains security fix for CVE-2020-10735
Don’t use custom installation schemes.
python3.8-3.8.14-1.fc37
Update to 3.8.14
Contains security fix for CVE-2020-10735
python3.8-3.8.14-1.fc35
Update to 3.8.14
Contains security fix for CVE-2020-10735
python3.8-3.8.14-1.fc36
Update to 3.8.14
Contains security fix for CVE-2020-10735
Posted by malvuln on Sep 08
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/d871836f77076eeed87eb0078c1911c7_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Trojan.Win32.Autoit.fhj
Vulnerability: Named Pipe Null DACL
Family: Autoit
Type: PE32
MD5: d871836f77076eeed87eb0078c1911c7
Vuln ID: MVID-2022-0638
Disclosure: 09/06/2022
Description: The malware creates two processes…
Posted by malvuln on Sep 08
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/44aba241dd3f0d156c6ed82a0ab3a9e1.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Trojan-Ransom.Win32.Hive.bv
Vulnerability: Arbitrary Code Execution
Description: Hive Ransomware will load and execute arbitrary .EXE PE files
if a third-party adversary or defender uses the vulnerable naming
convention of…
Posted by malvuln on Sep 08
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/8c0e6ec6b8ac9eb1169e63df71f24456.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Trojan-Spy.Win32.Pophot.bsl
Vulnerability: Insecure Permissions
Description: The malware writes a BATCH file “.bat” to c drive granting
change (C) permissions to the authenticated user group. Standard users can
rename the…
Posted by malvuln on Sep 08
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/121bf601275e2aed0c3a6fe7910f9826.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Hupigon.aspg
Vulnerability: Insecure Service Path
Description: The malware creates a service with an unquoted path. Attackers
who can place an arbitrary executable named “Program.exe” under c: drive
can…
Posted by malvuln on Sep 08
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/5bc5f72d19019a2fa3b75896e82ae1e5.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Winshell.5_0
Vulnerability: Weak Hardcoded Credentials
Description: The malware is UPX packed, listens on TCP port 5277 and
requires authentication for remote access. However, the password
“123456789” is weak…