並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 19 件 / 19件

新着順 人気順

0dayの検索結果1 - 19 件 / 19件

タグ検索の該当結果が少ないため、タイトル検索結果を表示しています。

0dayに関するエントリは19件あります。 securityセキュリティbrowser などが関連タグです。 人気エントリには 『「0.0.0.0」へのアクセスを悪用してローカル環境に侵入できる脆弱性「0.0.0.0 Day」が発見される』などがあります。
  • 「0.0.0.0」へのアクセスを悪用してローカル環境に侵入できる脆弱性「0.0.0.0 Day」が発見される

    Chrome、FireFox、Safariといった主要ブラウザにおけるIPアドレス「0.0.0.0」の扱い方に問題があり、問題を悪用することで攻撃者が攻撃対象のローカル環境にアクセスできることが明らかになりました。問題を発見したセキュリティ企業のOligo Securityは、この脆弱(ぜいじゃく)性を「0.0.0.0 Day」と名付けて注意喚起しています。 0.0.0.0 Day: Exploiting Localhost APIs From the Browser | Oligo Security https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser Oligo Securityによると、主要なブラウザでは「『0.0.0.0』へのアクセスを『localhost (12

      「0.0.0.0」へのアクセスを悪用してローカル環境に侵入できる脆弱性「0.0.0.0 Day」が発見される
    • Log4Shell: RCE 0-day exploit found in log4j, a popular Java logging package | LunaTrace

      Originally Posted @ December 9th & Last Updated @ August 1st, 3:30pm PDT Fixing Log4Shell? Claim a free vulnerability scan on our dedicated security platform and generate a detailed report in minutes. What is it?​On Thursday, December 9th a 0-day exploit in the popular Java logging library log4j (version 2), called Log4Shell, was discovered that results in Remote Code Execution (RCE) simply by log

        Log4Shell: RCE 0-day exploit found in log4j, a popular Java logging package | LunaTrace
      • GitHub - h4ckf0r0day/obscura: The headless browser for AI agents and web scraping

        You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

          GitHub - h4ckf0r0day/obscura: The headless browser for AI agents and web scraping
        • Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring | LunaTrace

          Getting Spring to load BinderControllerAdvice may require manual steps to have it load. We'll update this guide with more details about how to do that soon. import org.springframework.core.Ordered; import org.springframework.core.annotation.Order; import org.springframework.web.bind.WebDataBinder; import org.springframework.web.bind.annotation.ControllerAdvice; import org.springframework.web.bind.

            Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring | LunaTrace
          • 0.0.0.0 Day: Exploiting Localhost APIs From the Browser | Oligo Security

            Oligo Security's research team recently disclosed the “0.0.0.0 Day” vulnerability.  This vulnerability allows malicious websites to bypass browser security and interact with services running on an organization’s local network, potentially leading to unauthorized access and remote code execution on local services by attackers outside the network. The issue stems from the inconsistent implementation

              0.0.0.0 Day: Exploiting Localhost APIs From the Browser | Oligo Security
            • SpringShell: Spring Core RCE 0-day Vulnerability

              Update as of 31st March: Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965. Update:- We have some information about the Spring4Shell vulnerability and have shared the details on Spring4Shell: Details and Exploit post. Additionally, the security team fro

                SpringShell: Spring Core RCE 0-day Vulnerability
              • CVE-2021-44228 - Log4j RCE 0-day mitigation

                Update: all three WAF rules have now been configured with a default action of BLOCK. A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on December 9, 2021, that results in remote code execution (RCE). This vulnerability is actively being exploited and anyone using Log4j should update to version 2.15.0 as soon as possible. The latest version can already

                  CVE-2021-44228 - Log4j RCE 0-day mitigation
                • Fuzzing Farm #4: 0-dayエクスプロイトの開発 [CVE-2022-24834]

                  著者:Dronex, ptr-yudai はじめに この記事は、Fuzzing Farmシリーズ全4章のパート4で、パート3の記事「Fuzzing Farm #3: パッチ解析とPoC開発」の続きです。 Fuzzing Farmチームでは、前回の記事で紹介したように、1-dayエクスプロイトだけでなく0-dayエクスプロイトの開発にも取り組んでいます。Fuzzing Farmシリーズ最終章では、弊社エンジニアが発見した0-dayと、そのエクスプロイト開発について解説します。 我々は1年以上前の2022年4月の段階で、CVE-2022-24834に該当するRedisの脆弱性を発見し、RCE(Remote Code Execution; 任意コマンド実行)エクスプロイトの開発を完了していました。ベンダ側も修正を急いでくれましたが、利用者側の対応に時間を要したため、前回パート3の記事から今回の投

                    Fuzzing Farm #4: 0-dayエクスプロイトの開発 [CVE-2022-24834]
                  • Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring | LunaTrace

                    Getting Spring to load BinderControllerAdvice may require manual steps to have it load. We'll update this guide with more details about how to do that soon. import org.springframework.core.Ordered; import org.springframework.core.annotation.Order; import org.springframework.web.bind.WebDataBinder; import org.springframework.web.bind.annotation.ControllerAdvice; import org.springframework.web.bind.

                      Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring | LunaTrace
                    • log4jの0-day exploitを動かして理解する

                      これはKCS AdventCalendar2021 10日目の記事です。 ←9日目|11日目→ どうもyapattaです。最近アドベントカレンダー用の技術記事を書こうと思っていたが書きたい技術が思い浮かばなかった。 そんなときである!本日(投稿したときには前日)幸か不幸かインターネット上でApache-log4jのゼロデイ・エクスプロイト(CVE-2021-44228)が話題を賑わせた。 せっかくだし流行に乗って、実際に動かして理解を深めた。セキュリティ啓発になったら幸いということでこの記事を書く。 急いで書いてかつ自分の知識が不十分であるため、誤りなどが存在する可能性があるがそのときは指摘して頂けるとありがたい。 あとこれが重要、絶対に悪用しないで下さい。 では本題。 log4j RCE 0-day exploitとは 概要 サーバ内でApache log4jのバージョンが2.0以上2.

                        log4jの0-day exploitを動かして理解する
                      • Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program

                        Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program I want to share my frustrating experience participating in Apple Security Bounty program. I've reported four 0-day vulnerabilities this year between March 10 and May 4, as of now three of them are still present in the latest iOS version (15.0) and one was fixed in 14.7, but Apple decided to cover it up and

                          Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program
                        • From XSS to RCE (dompdf 0day) | Positive Security

                          -- MARKDOWN -- - The popular PHP library [dompdf](https://github.com/dompdf/dompdf) (used for rendering PDFs from HTML) suffers from a vulnerability that allows Remote Code Execution in certain configurations - By injecting CSS into the data processed by dompdf, it can be tricked into storing a malicious font with a `.php` file extension in its font cache, which can later be executed by accessing

                            From XSS to RCE (dompdf 0day) | Positive Security
                          • WARNING: NEW ATTACK CAMPAIGN UTILIZED A NEW 0-DAY RCE VULNERABILITY ON MICROSOFT EXCHANGE SERVER

                            BlogWARNING: NEW ATTACK CAMPAIGN UTILIZED A NEW 0-DAY RCE VULNERABILITY ON MICROSOFT EXCHANGE SERVER Circa the beginning of August 2022, while doing security monitoring & incident response services, GTSC SOC team discovered that a critical infrastructure was being attacked, specifically to their Microsoft Exchange application. During the investigation, GTSC Blue Team experts determined that the at

                              WARNING: NEW ATTACK CAMPAIGN UTILIZED A NEW 0-DAY RCE VULNERABILITY ON MICROSOFT EXCHANGE SERVER
                            • How we protect users from 0-day attacks

                              Zero-day vulnerabilities are unknown software flaws. Until they’re identified and fixed, they can be exploited by attackers. Google’s Threat Analysis Group (TAG) actively works to detect hacking attempts and influence operations to protect users from digital attacks, this includes hunting for these types of vulnerabilities because they can be particularly dangerous when exploited and have a high r

                                How we protect users from 0-day attacks
                              • Microsoft discovers threat actor targeting SolarWinds Serv-U software with 0-day exploit | Microsoft Security Blog

                                Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. The Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out of China, based on observed victimology, tactics, and procedures. The vulnerability being exploited is CVE-2021-35211, which

                                  Microsoft discovers threat actor targeting SolarWinds Serv-U software with 0-day exploit | Microsoft Security Blog
                                • FortiGate admins report active exploitation 0-day. Vendor isn’t talking.

                                  Fortinet, a maker of network security software, has kept a critical vulnerability under wraps for more than a week amid reports that attackers are using it to execute malicious code on servers used by sensitive customer organizations. Fortinet representatives didn’t respond to emailed questions and have yet to release any sort of public advisory detailing the vulnerability or the specific software

                                    FortiGate admins report active exploitation 0-day. Vendor isn’t talking.
                                  • コロナ陽性日記 DAY0~DAY5 - シンガポールで人生の休暇を謳歌する、ふねさんの日記

                                    ついに流行り病・コロナに感染しました(ワクチン3回接種済)。 自宅療養中で、症状は落ち着いてきた模様。 パンデミック初期の頃ならもっと焦っていたと思いますが、周りにも感染経験のある人がたくさんいるので、「あ、ついに罹っちゃったか~」というくらいの気持ちです。 症状は個人差がありますので、あくまで体験記として読んでいただければと思います。 DAY0 DAY1 シンガポールのコロナ事情 DAY2 DAY3~DAY4 DAY5 DAY0 喉の痛みと熱っぽさ(38度台)あり。週末が演奏会続きで疲れていたのもあり、風邪かコロナか、判断つかず。 シンガポールでは薬局にARTキット(抗原検査)が売られており、各家庭常備しています。(政府から何箱か送られてきたことも) 1回分がS$4くらい(≒400円)で、人によって高いか安いか判断が分かれそうなラインです。 こちらを使って検査すると… 「陰性」でした。

                                      コロナ陽性日記 DAY0~DAY5 - シンガポールで人生の休暇を謳歌する、ふねさんの日記
                                    • RCE 0-day exploit found in log4j, a popular Java logging package · Issue #81618 · elastic/elasticsearch

                                      You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert

                                        RCE 0-day exploit found in log4j, a popular Java logging package · Issue #81618 · elastic/elasticsearch
                                      • Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits | Microsoft Security Blog

                                        April 2023 update – Microsoft Threat Intelligence has shifted to a new threat actor naming taxonomy aligned around the theme of weather. KNOTWEED is now tracked as Denim Tsunami. To learn about how the new taxonomy represents the origin, unique traits, and impact of threat actors, and to get a complete mapping of threat actor names, read this blog: Microsoft shifts to a new threat actor naming tax

                                          Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits | Microsoft Security Blog
                                        1

                                        新着記事