ZDI-25-773: (0Day) Google Drive File Sharing Mark-of-the-Web Bypass Vulnerability This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of Google Drive. User interaction is... 06/08/2025 Zero-Day Initiative
ZDI-25-772: Trend Micro Apex One Console Command Injection Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex One. Authentication is not... 06/08/2025 Zero-Day Initiative
ZDI-25-771: Trend Micro Apex One Console Command Injection Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex One. Authentication is not... 06/08/2025 Zero-Day Initiative
ZDI-25-770: Microsoft Skype Chromium Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Skype. User interaction is required to... 02/08/2025 Zero-Day Initiative
ZDI-25-769: NI LabVIEW VI File Parsing Memory Corruption Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI LabVIEW. User interaction is required to... 02/08/2025 Zero-Day Initiative
ZDI-25-768: NI LabVIEW VI File Parsing Memory Corruption Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI LabVIEW. User interaction is required to... 02/08/2025 Zero-Day Initiative
ZDI-25-767: (0Day) (Pwn2Own) Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Alpine iLX-507 devices. User interaction is required to exploit... 02/08/2025 Zero-Day Initiative
ZDI-25-766: (0Day) (Pwn2Own) Alpine iLX-507 Command Injection Remote Code Execution This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required... 02/08/2025 Zero-Day Initiative
ZDI-25-765: (0Day) (Pwn2Own) Alpine iLX-507 TIDAL Improper Certificate Validation Vulnerability This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required... 02/08/2025 Zero-Day Initiative
ZDI-25-764: (0Day) (Pwn2Own) Alpine iLX-507 AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required... 02/08/2025 Zero-Day Initiative