News
In March, the user Notselwyn published a proof-of-concept exploit that demonstrates the exploitation of the vulnerability to gain root privileges with a high degree of reliability.
Qualys said it has been able to independently verify the vulnerability, develop an exploit, and obtain full root privileges on default installations of Ubuntu, Debian, Fedora, and CentOS.
Security Two Linux vulnerabilities give exploiters root privileges Howard Solomon July 21, 2021 Source: WhataWin | Getty Images ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results