1分钟
紧急威胁响应
Rapid7’s Impact from OpenSSL Buffer Overflow Vulnerabilities (cve - 2022 - 3786 & cve - 2022 - 3602)
cve - 2022 - 3786 & CVE-2022-3602 vulnerabilities affecting OpenSSL’s 3.0.x versions both rely on a maliciously crafted email address in a certificate.
1分钟
紧急威胁响应
Rapid7’s Impact from Apache Commons Text 脆弱性 (CVE-2022-42889)
CVE-2022-42889 is a vulnerability in the popular Apache Commons Text library that can result in code execution when processing malicious input.
3分钟
紧急威胁响应
cve - 2022 - 3786 和 CVE-2022-3602: Two High-Severity Buffer Overflow Vulnerabilities in OpenSSL Fixed
The Rapid7 research team will update this blog post as we learn more details
about this vulnerability 和 its attack surface area.
OpenSSL [http://www . net.openssl.[Org/]项目发布
[http://www.openssl.org/news/cl30.[Txt]版本3.0.7、2022年11月1日到
地址cve - 2022 - 3786和CVE-2022-3602
[http://www.openssl.org/news/secadv/20221101.Txt],两个高级别
影响OpenSSL的3.0.x version stream discovered 和 reported
由Polar Bear和Viktor Dukhovni创作. OpenSSL
1分钟
风险管理
CVE-2021-39144: VMware Cloud Foundation Unauthenticated Remote Code Execution
10月25日, 2022, VMware published VMSA-2022-0027 on two vulnerabilities in its Cloud Foundation solution. By far the more severe of these is CVE-2021-39144, an unauthenticated remote code execution vulnerability with a CVSSv3 score of 9.8.
3分钟
紧急威胁响应
CVE-2022-42889: Keep Calm 和 Stop Saying "Text4Shell"
UPDATE 10/18/22: A previous version of this blog indicated that five JDK
versions (JDK 15+) were not impacted due to the exclusion of the Nashorn
JavaScript引擎. 但是,更新后的PoC
[http://twitter.com/pwntester/status/1582321752566161409]came out that uses the
作为利用路径的JEXL引擎. 如果存在JEXL,则执行代码
successfully, so this issue can be exploited on any JDK where a relevant engine
可以被杠杆化.
CVE-2022-42889, which some have begun calling “Text4Shell,”
2分钟
紧急威胁响应
CVE-2022-40684: Remote Authentication Bypass 脆弱性 in Fortinet Firewalls, Web Proxies
10月3日, 2022, Fortinet released an update that indicates then-current versions of FortiOS 和 FortiProxy are vulnerable to CVE-2022-40684.
3分钟
紧急威胁响应
Exploitation of Unpatched Zero-Day Remote Code Execution 脆弱性 in Zimbra Collaboration Suite (CVE-2022-41352)
CVE-2022-41352 is an unpatched remote code execution vulnerability in Zimbra Collaboration Suite discovered in the wild due to active exploitation.
5分钟
紧急威胁响应
CVE-2022-41040 和 CVE-2022-41082: Unpatched Zero-Day Vulnerabilities in Microsoft Exchange Server
9月29日, security firm GTSC published information 和 IOCs on what they claim is a pair of unpatched Microsoft Exchange Server vulnerabilities.
2分钟
紧急威胁响应
CVE-2022-36804: Easily Exploitable 脆弱性 in Atlassian Bitbucket Server 和 Data Center
8月24日, 2022, Atlassian published an advisory for Bitbucket Server 和 Data Center alerting users to CVE-2022-36804.
4分钟
紧急威胁响应
Active Exploitation of Multiple Vulnerabilities in Zimbra Collaboration Suite
Five vulnerabilities affecting Zimbra Collaboration Suite have come to our attention, one that is unpatched 和 four that are actively being exploited.
2分钟
紧急威胁响应
Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26138
Exploitation is underway CVE-2022-26138, one of a trio of critical Atlassian vulnerabilities affecting the company's on-premises products.
2分钟
紧急威胁响应
Exploitation of Mitel MiVoice Connect SA CVE-2022-29499
Rapid7 耐多药 analysts have observed a small number of intrusions leveraging CVE-2022-29499, a data validation vulnerability in MiVoice Connect.
1分钟
紧急威胁响应
CVE-2022-27511: Citrix ADM Remote Device Takeover
周一, 6月14日, 2022, Citrix published an advisory on CVE-2022-27511, a critical improper access control vulnerability affecting their ADM product.
11分钟
紧急威胁响应
Active Exploitation of Confluence CVE-2022-26134
6月2日, 2022, Atlassian published an advisory for CVE-2022-26134, a critical unauthenticated RCE vulnerability in Confluence Serve 和 Data Center.
1分钟
紧急威胁响应
CVE-2022-30190: "Follina" Microsoft 支持 Diagnostic Tool 脆弱性
5月30日, 2022, Microsoft published an advisory on CVE-2022-30190, an unpatched vulnerability in the Microsoft 支持 Diagnostic Tool.