[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
all.html malware-in-online-conferencing.html proprietary.html pro...
From: |
Diff Report |
Subject: |
all.html malware-in-online-conferencing.html proprietary.html pro... |
Date: |
Sat, 17 Apr 2021 00:05:30 -0400 |
Modified:
all.html
malware-in-online-conferencing.html
proprietary.html
proprietary-insecurity.html
diff -rNU2 all.html all.html
--- all.html 2021-04-16 04:04:03.166152304 +0000
+++ all.html 2021-04-17 04:05:28.609336304 +0000
@@ -48,4 +48,13 @@
<ul class="blurbs">
+<!--#set var='ADD' value='2021-04-16' --><!--#set var='PUB' value='2021-04-09'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<!--#set var='ADD' value='2021-04-11' --><!--#set var='PUB' value='2021-02-16'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
<p>Google <a
@@ -2142,5 +2151,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 20:09:31 $
+$Date: 2021/04/16 20:16:22 $
<!-- timestamp end -->
</p>
diff -rNU2 malware-in-online-conferencing.html
malware-in-online-conferencing.html
--- malware-in-online-conferencing.html 2021-04-16 04:04:03.186152304 +0000
+++ malware-in-online-conferencing.html 2021-04-17 04:05:28.629326304 +0000
@@ -66,4 +66,15 @@
<ul class="blurbs">
+ <li id="M202104090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<li id="M202012190">
<!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
@@ -203,5 +214,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/15 11:09:51 $
+$Date: 2021/04/16 17:20:11 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary.html proprietary.html
--- proprietary.html 2021-04-16 04:04:03.218152304 +0000
+++ proprietary.html 2021-04-17 04:05:28.661310304 +0000
@@ -187,4 +187,15 @@
<ul class="blurbs">
+ <li id="M202104090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<li id="M202102160">
<!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
@@ -243,17 +254,4 @@
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>”.</small></p>
</li>
-
- <li id="M202010282">
- <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
- --><!--#echo encoding="none" var="DATE" -->
- <p>TV manufacturers are turning to produce only
- “Smart” TV sets (which include spyware) that <a
- href="https://frame.work/blog/in-defense-of-dumb-tvs">it's now very
- hard to find a TV that doesn't spy on you</a>.</p>
-
- <p>It appears that those manufacturers business model is not to produce
- TV and sell them for money, but to collect your personal data and
- (possibly) hand over them to others for benefit.</p>
- </li>
</ul>
@@ -318,5 +316,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/04/15 18:49:25 $
+$Date: 2021/04/16 17:20:11 $
<!-- timestamp end -->
</p>
diff -rNU2 proprietary-insecurity.html proprietary-insecurity.html
--- proprietary-insecurity.html 2021-04-16 04:04:03.222152304 +0000
+++ proprietary-insecurity.html 2021-04-17 04:05:28.665308303 +0000
@@ -77,4 +77,15 @@
<ul class="blurbs">
+ <li id="M202104090">
+ <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+ --><!--#echo encoding="none" var="DATE" -->
+ <p>A zero-day vulnerability in Zoom which <a
+
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/">can
+ be used to launch remote code execution (RCE) attacks</a> has been
+ disclosed by researchers. The researchers demonstrated a three-bug
+ attack chain that caused an RCE on a target machine, and all without
+ any form of user interaction.</p>
+ </li>
+
<li id="M202103090">
<!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
@@ -1077,5 +1088,5 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/03/16 18:06:36 $
+$Date: 2021/04/16 17:20:11 $
<!-- timestamp end -->
</p>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- all.html malware-in-online-conferencing.html proprietary.html pro...,
Diff Report <=