ZDI-22-717: Zoom Client Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Zoom Client. An attacker must first obtain the ability to execute low-privileged code...
ZDI-22-716: Zoom Client Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Zoom Client. An attacker must first obtain the ability to execute low-privileged code...
DSA-5133 qemu – security update
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service or the execution of arbitrary code. Read...
CImg-3.1.0-1.fc35 gmic-3.1.0-1.fc35
FEDORA-2022-eca0926460 Packages in this update: CImg-3.1.0-1.fc35 gmic-3.1.0-1.fc35 Update description: bump version Read More
CVE-2018-25033
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. Read More
Ransom.Satana / Code Execution
Posted by malvuln on May 07 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/46bfd4f1d581d7c0121d2b19a005d3df.txt Contact: malvuln13 () gmail com Media:...
Ransom.Conti / Code Execution
Posted by malvuln on May 07 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/20f0c736a966142de88dee06a2e4a5b1.txt Contact: malvuln13 () gmail com Media:...
Ransom.Petya / Code Execution
Posted by malvuln on May 07 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/8ed9a60127aee45336102bf12059a850.txt Contact: malvuln13 () gmail com Media:...
Ransom.Cryakl / Code Execution
Posted by malvuln on May 07 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/2aea3b217e6a3d08ef684594192cafc8.txt Contact: malvuln13 () gmail com Media:...
Trojan-Ransom.Radamant / Code Execution
Posted by malvuln on May 07 Discovery / credits: Malvuln - (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/6152709e741c4d5a5d793d35817b4c3d.txt Contact: malvuln13 () gmail com...