Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Zero-day vulnerability 34 found (48 total)

alternate case: zero-day vulnerability

Log4j (3,205 words) [view diff] exact match in snippet view article find links to article

had accumulated since its release in 2013. On December 9, 2021, a zero-day vulnerability involving arbitrary code execution in Log4j 2 was published by the
Log4Shell (3,505 words) [view diff] exact match in snippet view article find links to article
Log4Shell (CVE-2021-44228) is a zero-day vulnerability reported in November 2021 in Log4j, a popular Java logging framework, involving arbitrary code execution
ACropalypse (1,001 words) [view diff] exact match in snippet view article find links to article
version of a screenshot. Following aCropalypse's discovery, a similar zero-day vulnerability was also discovered, affecting Snip & Sketch for Windows 10 and
Tor Mail (610 words) [view diff] exact match in snippet view article find links to article
of the Tor Browser Bundle disabled JavaScript by default. This zero-day vulnerability was exploited during the takedown to send users' IP addresses and
Roundcube (754 words) [view diff] exact match in snippet view article find links to article
attacks Roundcube webmail servers of governments in Europe through zero-day vulnerability". ESET. 2023-10-25. Archived from the original on 2023-10-28. Retrieved
Sandworm (hacker group) (2,240 words) [view diff] exact match in snippet view article
(now Mandiant) discovered a spear-phishing campaign exploiting a zero-day vulnerability via weaponized Microsoft Office documents. The vulnerability, dubbed
IntegraXor (430 words) [view diff] no match in snippet view article find links to article
Security researchers have found numerous vulnerabilities including a Zero Day vulnerability where major manufacturers and industrial companies in the UK, US
Reverse proxy (1,216 words) [view diff] exact match in snippet view article find links to article
daily updates to keep its attack signature database up to date, a zero-day vulnerability can pass through unfiltered, enabling attackers to gain control
Atlassian (3,203 words) [view diff] exact match in snippet view article find links to article
of its workforce. In October 2023, Microsoft identified a severe zero-day vulnerability that can be exploited remotely and anonymously in Atlassian's Confluence
Operation Onymous (1,604 words) [view diff] exact match in snippet view article find links to article
claimed to have been infiltrated led to the speculation that a zero-day vulnerability in the Tor network had been exploited. This possibility was downplayed
Clop (cyber gang) (1,141 words) [view diff] exact match in snippet view article
responsibility for breaching over 130 organizations by exploiting a zero-day vulnerability in the GoAnywhere MFT secure file transfer tool. This security flaw
Benjamin Kunz Mejri (1,925 words) [view diff] exact match in snippet view article find links to article
published for the first time a report about a Secure Sockets Layer zero-day vulnerability in the Mozilla Firefox Browser Engine with the company F-Secure
DarkMatter Group (3,597 words) [view diff] exact match in snippet view article find links to article
phone, or phone number. It apparently achieved this by exploiting a zero-day vulnerability in the device's iMessage app. Project Raven operatives were able
Watering hole attack (1,502 words) [view diff] exact match in snippet view article find links to article
Relations website was found to be infected with malware through a zero-day vulnerability in Microsoft's Internet Explorer. In this attack, the malware was
Positive Hack Days (2,665 words) [view diff] exact match in snippet view article find links to article
hacking contests, and during one of them a participant detected a zero-day vulnerability in Safari for Windows. Among other speakers were experts from Kaspersky
Flame (malware) (2,747 words) [view diff] exact match in snippet view article
that is nearly identical to a Flame module that exploits the same zero-day vulnerability. Iran's CERT described the malware's encryption as having "a special
Trellix (3,745 words) [view diff] exact match in snippet view article find links to article
uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability (CVE-2015–3113). Adobe released a patch for the vulnerability with
Lazarus Group (4,980 words) [view diff] exact match in snippet view article find links to article
suggesting that the hackers may have used a previously unknown zero-day vulnerability affecting Chrome for the attack; however, Google stated that they
Zoom (software) (8,699 words) [view diff] exact match in snippet view article
In July 2019, security researcher Jonathan Leitschuh disclosed a zero-day vulnerability allowing any website to force a macOS user to join a Zoom call,
Cisco Talos (1,303 words) [view diff] case mismatch in snippet view article find links to article
March 2022). "Threat Advisory: DoubleZero". Retrieved 2022-08-10. "Zero-Day Vulnerability & Disclosed Vulnerabilities Reports || Cisco Talos Intelligence
Denial-of-service attack (11,517 words) [view diff] case mismatch in snippet view article find links to article
US-CERT. 8 July 2014. Retrieved 8 July 2014. "CVE-2022-26143: A Zero-Day vulnerability for launching UDP amplification DDoS attacks". Cloudflare Blog.
I2P (4,956 words) [view diff] exact match in snippet view article find links to article
against certain versions of this type of attack to some extent. A zero-day vulnerability was discovered for I2P in 2014, and was exploited to de-anonymize
Vault 7 (8,400 words) [view diff] case mismatch in snippet view article find links to article
was secretly exploiting a..." (Tweet) – via Twitter. "Cisco Finds Zero-Day Vulnerability in 'Vault 7' Leak | SecurityWeek.Com". www.securityweek.com. 20
Hewlett-Packard (12,110 words) [view diff] case mismatch in snippet view article find links to article
net-zero energy data centre". The Times of India. May 31, 2012. "Zero-Day Vulnerability Found in The Server Monitoring Software of HP". voiceofgreyhat.com
Security of the Java software platform (2,034 words) [view diff] exact match in snippet view article find links to article
seen as a move by Apple to distance OS X from Java. In January, a zero-day vulnerability was found in all versions of Java 7, including the latest version
2023 MOVEit data breach (876 words) [view diff] case mismatch in snippet view article find links to article
Zaveri, Nader; Kennelly, Jeremy; Stark, Genevieve (June 2, 2023). "Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft". Retrieved June 2,
Fancy Bear (8,093 words) [view diff] exact match in snippet view article find links to article
On October 31, 2016, Google's Threat Analysis Group revealed a zero-day vulnerability in most Microsoft Windows versions that is the subject of active
Apple–FBI encryption dispute (9,199 words) [view diff] exact match in snippet view article find links to article
matter", the FBI had instead paid "professional hackers" who used a zero-day vulnerability in the iPhone's software to bypass its ten-try limitation, and did
List of security hacking incidents (14,480 words) [view diff] exact match in snippet view article find links to article
November 24, Chen Zhaojun of Alibaba's Cloud Security Team reported a zero-day vulnerability (later dubbed Log4Shell) involving the use of arbitrary code execution
Glossary of video game terms (32,227 words) [view diff] exact match in snippet view article find links to article
opponents. zero-day patch A software security patch that fixes a Zero-day vulnerability. See: Zero-day and 0-day warez. zero-player game A game that has
Market for zero-day exploits (2,883 words) [view diff] case mismatch in snippet view article find links to article
TIK, ETH Zurich, Tech. Rep, 302. Fidler, Mailyn. "Regulating the Zero-Day Vulnerability Trade: A Preliminary Analysis". I/S: A Journal of Law and Policy
Rclone (4,226 words) [view diff] exact match in snippet view article find links to article
An April 2021, cybersecurity investigation into SonicWall VPN zero-day vulnerability SNWLID-2021-0001 by FireEye's Mandiant team established attackers
2020 United States federal government data breach (13,608 words) [view diff] exact match in snippet view article find links to article
found that a "likely Russian government-backed actor" exploited a zero-day vulnerability in fully-updated iPhones to steal authentication credentials by
2015 San Bernardino attack (19,480 words) [view diff] exact match in snippet view article find links to article
reported that the FBI instead paid "professional hackers" who used a zero-day vulnerability in the iPhone's software to bypass its ten-try limitation, and did