Posted by malvuln on Feb 24
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/c3e2bbe5dca96687422f2b4e8c80f4ce.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Acropolis.10
Vulnerability: Insecure Permissions
Description: The malware writes a PE file with insecure permissions under c
drive granting change (C) permissions to the authenticated user group.
Standard users can rename the…
More Stories
jupyterlab-4.4.0-1.fc43 python-notebook-7.4.0-1.fc43
FEDORA-2025-7472c8fb5c Packages in this update: jupyterlab-4.4.0-1.fc43 python-notebook-7.4.0-1.fc43 Update description: New jupyterlab and notebook Read More
Windows CLFS Driver Elevation of Privilege
What is the Vulnerability?A zero-day vulnerability has recently been identified in the Common Log File System (CLFS) kernel driver. CLFS...
USN-7432-1: libsoup vulnerabilities
It was discovered that libsoup could be made to read out of bounds. An attacker could possibly use this issue...
chromium-135.0.7049.84-1.fc40
FEDORA-2025-4ad8f5e805 Packages in this update: chromium-135.0.7049.84-1.fc40 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.el10_1
FEDORA-EPEL-2025-d2ac333cd9 Packages in this update: chromium-135.0.7049.84-1.el10_1 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...
chromium-135.0.7049.84-1.el9
FEDORA-EPEL-2025-6930d627d4 Packages in this update: chromium-135.0.7049.84-1.el9 Update description: Update to 135.0.7049.84 * CVE-2025-3066: Use after free in Site Isolation Read...