openexr-3.1.4-1.fc36
FEDORA-2022-18e14f460c Packages in this update: openexr-3.1.4-1.fc36 Update description: New upstream release 3.1.4 Read More
openexr-3.1.4-1.fc35
FEDORA-2022-5cdfa7faa5 Packages in this update: openexr-3.1.4-1.fc35 Update description: New upstream release 3.1.4 Read More
USN-5320-1: Expat vulnerabilities and regression
USN-5288-1 fixed several vulnerabilities in Expat. For CVE-2022-25236 it caused a regression and an additional patch was required. This update address this regression and several...
FBI Releases Updated Indicators of Compromise for RagnarLocker Ransomware
FortiGuard Labs is aware that the U.S. Federal Bureau of Investigation (FBI) released the updated indicators of compromise (IOCs) for RagnarLocker (Ragnar_Locker) Ransomware on March...
MicroBackdoor Used in Attacks Against Ukraine Organizations
FortiGuard Labs is aware of a report from CERT-UA that Ukrainian organizations are under cyberattacks that aim to install a publicly available backdoor named "MicroBackdoor."...
DSA-5099 tryton-proteus – security update
Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service. Read More
DSA-5098 tryton-server – security update
Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service. Read More
CVE-2021-22783
A CWE-200: Information Exposure vulnerability exists which could allow a session hijack when the door panel is communicating with the door. Affected Product: Ritto Wiser...
Loki RAT (Relapse) / SQL Injection
Posted by malvuln on Mar 09 Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/aabb54951546132e70a8e9f02bf8b5ba_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat:...
Loki RAT (Relapse) / Directory Traversal – Arbitrary File Delete
Posted by malvuln on Mar 09 Discovery / credits: Malvuln - malvuln.com (c) 2022 Original source: https://malvuln.com/advisory/aabb54951546132e70a8e9f02bf8b5ba.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat:...