www-malware-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

all.html malware-in-online-conferencing.html proprietary.html pro...


From: Diff Report
Subject: all.html malware-in-online-conferencing.html proprietary.html pro...
Date: Sat, 17 Apr 2021 00:05:30 -0400

Modified:

    all.html
    malware-in-online-conferencing.html
    proprietary.html
    proprietary-insecurity.html

diff -rNU2 all.html all.html
--- all.html    2021-04-16 04:04:03.166152304 +0000
+++ all.html    2021-04-17 04:05:28.609336304 +0000
@@ -48,4 +48,13 @@
 
 <ul class="blurbs">
+<!--#set var='ADD' value='2021-04-16' --><!--#set var='PUB' value='2021-04-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
 <!--#set var='ADD' value='2021-04-11' --><!--#set var='PUB' value='2021-02-16' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
     <p>Google <a
@@ -2142,5 +2151,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/04/15 20:09:31 $
+$Date: 2021/04/16 20:16:22 $
 <!-- timestamp end -->
 </p>
diff -rNU2 malware-in-online-conferencing.html 
malware-in-online-conferencing.html
--- malware-in-online-conferencing.html 2021-04-16 04:04:03.186152304 +0000
+++ malware-in-online-conferencing.html 2021-04-17 04:05:28.629326304 +0000
@@ -66,4 +66,15 @@
 
 <ul class="blurbs">
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
   <li id="M202012190">
     <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
@@ -203,5 +214,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/03/15 11:09:51 $
+$Date: 2021/04/16 17:20:11 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html    2021-04-16 04:04:03.218152304 +0000
+++ proprietary.html    2021-04-17 04:05:28.661310304 +0000
@@ -187,4 +187,15 @@
 
 <ul class="blurbs">
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
   <li id="M202102160">
     <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
@@ -243,17 +254,4 @@
     
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
   </li>
-
-  <li id="M202010282">
-    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>TV manufacturers are turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware) that <a
-    href="https://frame.work/blog/in-defense-of-dumb-tvs";>it's now very
-    hard to find a TV that doesn't spy on you</a>.</p>
-
-    <p>It appears that those manufacturers business model is not to produce
-    TV and sell them for money, but to collect your personal data and
-    (possibly) hand over them to others for benefit.</p>
-  </li>
 </ul>
 
@@ -318,5 +316,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/04/15 18:49:25 $
+$Date: 2021/04/16 17:20:11 $
 <!-- timestamp end -->
 </p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2021-04-16 04:04:03.222152304 +0000
+++ proprietary-insecurity.html 2021-04-17 04:05:28.665308303 +0000
@@ -77,4 +77,15 @@
 
 <ul class="blurbs">
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
   <li id="M202103090">
     <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
@@ -1077,5 +1088,5 @@
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/03/16 18:06:36 $
+$Date: 2021/04/16 17:20:11 $
 <!-- timestamp end -->
 </p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]