seamonkey-2.53.11.1-1.fc34

Read Time:24 Second

FEDORA-2022-3f78aabf8c

Packages in this update:

seamonkey-2.53.11.1-1.fc34

Update description:

Update to 2.53.11.1

Note that since 2.53.11, besides the ordinary builds for the current Fedora and EPEL branches, there is an additional distro-independed build available at https://buc.fedorapeople.org/seamonkey .
So if you have friends who use other Linux distro, but that distro does not provide SeaMonkey yet, you can recommend this build for them.

Read More

seamonkey-2.53.11.1-1.fc35

Read Time:24 Second

FEDORA-2022-6e5d4d48c2

Packages in this update:

seamonkey-2.53.11.1-1.fc35

Update description:

Update to 2.53.11.1

Note that since 2.53.11, besides the ordinary builds for the current Fedora and EPEL branches, there is an additional distro-independed build available at https://buc.fedorapeople.org/seamonkey .
So if you have friends who use other Linux distro, but that distro does not provide SeaMonkey yet, you can recommend this build for them.

Read More

seamonkey-2.53.11.1-1.fc36

Read Time:24 Second

FEDORA-2022-a5d56ec430

Packages in this update:

seamonkey-2.53.11.1-1.fc36

Update description:

Update to 2.53.11.1

Note that since 2.53.11, besides the ordinary builds for the current Fedora and EPEL branches, there is an additional distro-independed build available at https://buc.fedorapeople.org/seamonkey .
So if you have friends who use other Linux distro, but that distro does not provide SeaMonkey yet, you can recommend this build for them.

Read More

[SYSS-2021-058] Razer Synapse – Local Privilege Escalation

Read Time:20 Second

Posted by Oliver Schwarz on Mar 25

Advisory ID: SYSS-2021-058
Product: Razer Synapse
Manufacturer: Razer Inc.
Affected Version(s): Versions prior to 3.7.0228.022817
Tested Version(s): 3.6.0920.091710, 3.6.1010.101113,
3.6.1018.101823,
3.6.1130.111217, 3.6.1201.111814,
3.7.0131.011810
Vulnerability Type: Improper Privilege Management (CWE-269)
Risk Level: Critical
Solution…

Read More

Backdoor.Win32.BirdSpy.b / Weak Hardcoded Credentials

Read Time:19 Second

Posted by malvuln on Mar 25

Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/eba3dd81723ddf33621fd85ded577920.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.BirdSpy.b
Vulnerability: Weak Hardcoded Credentials
Family: BirdSpy
Type: PE32
MD5: eba3dd81723ddf33621fd85ded577920
Vuln ID: MVID-2022-0523
Dropped files: WinSock.exe
Disclosure: 03/21/2022
Description: The malware listens on TCP…

Read More

Backdoor.Win32.Agent.bxxn / Open Proxy

Read Time:21 Second

Posted by malvuln on Mar 25

Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/dcbc237f21839a6514c8321d5fa631a4.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.bxxn
Vulnerability: Open Proxy
Description: The malware listens on TCP port 1080. Third-party attackers
who can connect to the infected system can relay requests from the original
connection to the destination and then back to…

Read More

News, Advisories and much more

Exit mobile version