贴有“紧急威胁响应”标签的帖子

1分钟 紧急威胁响应

Rapid7’s Impact from Apache Commons Text 脆弱性 (CVE-2022-42889)

CVE-2022-42889 is a vulnerability in the popular Apache Commons Text library that can result in code execution when processing malicious input.

3分钟 紧急威胁响应

CVE-2022-3786 和 CVE-2022-3602: Two High-Severity Buffer Overflow Vulnerabilities in OpenSSL Fixed

The Rapid7 research team will update this blog post as we learn more details about this vulnerability 和 its attack surface area. OpenSSL [http://www . net.openssl.[Org/]项目发布 [http://www.openssl.org/news/cl30.[Txt]版本3.0.7、2022年11月1日到 address CVE-2022-3786 和 CVE-2022-3602 [http://www.openssl.org/news/secadv/20221101.Txt],两个高级别 影响OpenSSL的3.0.x version stream discovered 和 reported 由Polar Bear和Viktor Dukhovni创作. OpenSSL

1分钟 风险管理

CVE-2021-39144: VMware Cloud Foundation Unauthenticated Remote Code Execution

10月25日, 2022, VMware published VMSA-2022-0027 on two vulnerabilities in its Cloud Foundation solution. By far the more severe of these is CVE-2021-39144, an unauthenticated remote code execution vulnerability with a CVSSv3 score of 9.8.

3分钟 紧急威胁响应

CVE-2022-42889: Keep Calm 和 Stop Saying "Text4Shell"

UPDATE 10/18/22: A previous version of this blog indicated that five JDK versions (JDK 15+) were not impacted due to the exclusion of the Nashorn JavaScript引擎. 但是,更新后的PoC [http://twitter.com/pwntester/status/1582321752566161409]came out that uses the 作为利用路径的JEXL引擎. If JEXL is present, the code executes successfully, so this issue can be exploited on any JDK where a relevant engine 可以被杠杆化. CVE-2022-42889, which some have begun calling “Text4Shell,”

2分钟 紧急威胁响应

CVE-2022-40684: Remote Authentication Bypass 脆弱性 in Fortinet Firewalls, Web Proxies

10月3日, 2022, Fortinet released an update that indicates then-current versions of FortiOS 和 FortiProxy are vulnerable to CVE-2022-40684.

3分钟 紧急威胁响应

Exploitation of Unpatched Zero-Day Remote Code Execution 脆弱性 in Zimbra Collaboration Suite (CVE-2022-41352)

CVE-2022-41352 is an unpatched remote code execution vulnerability in Zimbra Collaboration Suite discovered in the wild due to active exploitation.

5分钟 紧急威胁响应

CVE-2022-41040 和 CVE-2022-41082: Unpatched Zero-Day Vulnerabilities in Microsoft Exchange Server

9月29日, security firm GTSC published information 和 IOCs on what they claim is a pair of unpatched Microsoft Exchange Server vulnerabilities.

2分钟 紧急威胁响应

CVE-2022-36804: Easily Exploitable 脆弱性 in Atlassian Bitbucket Server 和 Data Center

8月24日, 2022, Atlassian published an advisory for Bitbucket Server 和 Data Center alerting users to CVE-2022-36804.

4分钟 紧急威胁响应

Active Exploitation of Multiple Vulnerabilities in Zimbra Collaboration Suite

Five vulnerabilities affecting Zimbra Collaboration Suite have come to our attention, one that is unpatched 和 four that are actively being exploited.

2分钟 紧急威胁响应

Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26138

Exploitation is underway CVE-2022-26138, one of a trio of critical Atlassian vulnerabilities affecting the company's on-premises products.

2分钟 紧急威胁响应

Exploitation of Mitel MiVoice Connect SA CVE-2022-29499

Rapid7 耐多药 analysts have observed a small number of intrusions leveraging CVE-2022-29499, a data validation vulnerability in MiVoice Connect.

1分钟 紧急威胁响应

CVE-2022-27511: Citrix ADM Remote Device Takeover

周一, 6月14日, 2022, Citrix published an advisory on CVE-2022-27511, a critical improper access control vulnerability affecting their ADM product.

11分钟 紧急威胁响应

Active Exploitation of Confluence CVE-2022-26134

6月2日, 2022, Atlassian published an advisory for CVE-2022-26134, a critical unauthenticated RCE vulnerability in Confluence Serve 和 Data Center.

1分钟 紧急威胁响应

CVE-2022-30190: "Follina" Microsoft 支持 Diagnostic Tool 脆弱性

5月30日, 2022, Microsoft published an advisory on CVE-2022-30190, an unpatched vulnerability in the Microsoft 支持 Diagnostic Tool.

2分钟 紧急威胁响应

CVE-2022-22972: Critical Authentication Bypass in VMware Workspace ONE Access, 身份管理器, 和vRealize自动化

5月18日, 2022, VMware published an advisory on CVE-2022-22972, a critical authentication bypass affecting multiple solutions.