Posted by Julian Horoszkiewicz via Fulldisclosure on Mar 28
Vulnerability summary: Local Privilege Escalation from regular user to SYSTEM, via conhost.exe hijacking triggered by
MSI installer in repair mode
Affected Products: Intel PowerGadget
Affected Versions: tested on PowerGadget_3.6.msi (a3834b2559c18e6797ba945d685bf174), file signed on Monday, February
1, 2021 9:43:20 PM (this seems to be the latest version), earlier versions might be affected as well.
Affected Platforms: Windows…
More Stories
firefox-126.0-5.fc39
FEDORA-2024-a2c6c8afa9 Packages in this update: firefox-126.0-5.fc39 Update description: new upstream update (126.0) Read More
firefox-126.0-5.fc38
FEDORA-2024-6dd1f32f22 Packages in this update: firefox-126.0-5.fc38 Update description: new upstream update (126.0) New upstream version (125.0.3) Latest upstream release. Read...
firefox-126.0-5.fc40
FEDORA-2024-eabe68b149 Packages in this update: firefox-126.0-5.fc40 Update description: new upstream update (126.0) Read More
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability...
USN-6772-1: strongSwan vulnerability
Jan Schermer discovered that strongSwan incorrectly validated client certificates in certain configurations. A remote attacker could possibly use this issue...
USN-6767-2: Linux kernel (BlueField) vulnerabilities
Chenyuan Yang discovered that the RDS Protocol implementation in the Linux kernel contained an out-of-bounds read vulnerability. An attacker could...