CVE-2024-11477: 7-Zip Vulnerability Allows Remote Code Execution, Update Now! ð Access to This Vulnerability Report Requires Support This article is available to verified supporters only - contribute to read the full report
ã»ãã¥ãªãã£ä¼æ¥Rapid7ã®ã¹ãã£ã¼ãã³ã»ãã¥ã¼ã¢æ°ï¼ããªã³ã·ãã«ã»ã»ãã¥ãªãã£ãªãµã¼ãã£ã¼ï¼ã®ããã°æç¨¿ã«ããã¨ï¼æ³¨1ï¼ãç ç©¶è ãã¡ãåç¾ããSolarWindsã®ãã¡ã¤ã«è»¢éãµã¼ãã¹ãServ-Uãã®èå¼±ï¼ãããããï¼æ§ã¯ãéå¸¸ã«æªç¨ããããé大ãªãã®ã ã¨ãããåæ°ã¯ã2024å¹´6æ11æ¥ï¼ç¾å°æéã以ä¸åï¼ã«ã伿¥ã¯ãã®èå¼±æ§ã«ç´ã¡ã«ããããå½ã¦ãã¹ãã ãã¨ä¸»å¼µããã Sunburstã®æªå¤¢åã³ï¼ãSolarWindsã®ãã¡ã¤ã«è»¢éãµã¼ãã¹ã«é大ãªèå¼±æ§ ãã£ã¬ã¯ããªãã©ãã¼ãµã«ã®èå¼±æ§ã§ãããCVE-2024-28995ãã¯ï¼æ³¨2ï¼ãèªè¨¼ããã¦ããªãæ»æè ããµã¼ãã®æ©å¯ãã¡ã¤ã«ãèªã¿åããã¨ãå¯è½ã«ããããã®èå¼±æ§ã®å ±éèå¼±æ§è©ä¾¡ã·ã¹ãã ï¼CVSSï¼ã«ãããã¹ã³ã¢ã¯8.6ã ã åèå¼±æ§ã®æªç¨ã¯ç¾ç¶ç¢ºèªããã¦ããªãããRapid7ã®ç ç©¶è ã¯ãç¶æ³ã¯ããã«ã§ãå¤ããå¯è½æ§ããããã¨è¦
Fortinetã®è¤æ°è£½åã«ããã管çç»é¢ã®èå¼±æ§ï¼CVE-2022-40684ï¼ã話é¡ãéãã¦ãã¾ããæ¢ã«ãµã¤ãã¼æ»æã«ã¤ãã¦ã®PoCãå ¬éããã¦ãããããå«ç·ã®å¯¾çãæ±ãããã¦ãã¾ãã伿¥ãä»ããã§ãããã¨ã¨ã¯ä½ã§ããããã ãæ»æè ã®è¦ç¹ã«ç«ã¤ããã¨ã¯ãã»ãã¥ãªãã£å¯¾çã®ç¬¬ä¸æ©ã ã¨æã£ã¦ãã¾ããæ»æè ã¯ç¡é§ãªãã¨ããããããæå¹ã§ããããããæ»æã仿ãã¦ããã¯ãã§ãã®ã§ãã®è¦ç¹ã§å¯¾çãèããå¿ è¦ãããã§ãããã æ»æå´ã¯æéãé¸ã°ããè±å¯ãªãã·ã³ãªã½ã¼ã¹ã¨ããããææ®µã§æ»æã仿ãã¦ãã¾ããè¿å¹´ã¯ãRaaSãï¼Ransomware as a Serviceï¼ã¨ãã£ããµã¤ãã¼æ»æç¨ã«æé©åããããã©ãããã©ã¼ã ãåºåã£ã¦ãããã¹ãã«ããªãã¦ã容æã«æ»æãå®è¡ã§ããããã«ãªã£ã¦ãã¦ãã¾ãã ã¤ã¾ããIPã¢ãã¬ã¹ã®ç«¯ãã端ã¾ã§ãµã¤ãã¼æ»æãå®è¡ãããã®ä¸ã®ä¸ã¤ã§ãæ»æã«æåããã°ãããã
å®¶å ·å¤§æã®ãããªã¯9æ20æ¥ãã¹ãã¼ããã©ã³ã¢ããªããããªã¢ããªãã«ããã¦ä¸æ£ã¢ã¯ã»ã¹ãçºçããã¨çºè¡¨ãããç´13ä¸2000ã¢ã«ã¦ã³ãã䏿£ãã°ã¤ã³ãåããå人æ å ±ã®ä¸é¨ãæµåºããå¯è½æ§ãããã¨ãã¦ããã 䏿£ãã°ã¤ã³ã¯9æ15æ¥ãã20æ¥ã¾ã§çºçã19æ¥ã«æµåºã夿ããã¨ããã対象ã¦ã¼ã¶ã¼ã¯ããããªãããï¼ãããªã¢ããªï¼ã·ããã¢ããªã§ä¼å¡ç»é²ããã¦ã¼ã¶ã¼ã®ä»ãã·ãããããã§ãããªãã¤ã³ãã®å©ç¨æç¶ããããã¦ã¼ã¶ã¼ã æ»æææ³ã¯ããããªä»¥å¤ã®ãµã¼ãã¹ããæµåºããã¦ã¼ã¶ã¼IDã¨ãã¹ã¯ã¼ãã使ã£ã¦ä¸æ£ãã°ã¤ã³ã仿ããããªã¹ãåã¢ã«ã¦ã³ããããã³ã°ãï¼ãªã¹ãåæ»æï¼ã¨æ¨æ¸¬ããããªãããã®ãããªã¢ããªèªè¨¼ããã°ã©ã ã«å¯¾ãã¦ä»æããããã¨ããã æµåºããå¯è½æ§ã®ããå人æ å ±ã¯ãã¡ã¼ã«ã¢ãã¬ã¹ããã¹ã¯ã¼ããä¼å¡çªå·ãæ°åã使ãé»è©±çªå·ãæ§å¥ãçå¹´ææ¥ã建ç©ç¨®å¥ï¼æ¸å»ºï¼éåä½å® ï¼ãã¨ã¬ãã¼ã¿ã¼ã®æç¡
Two days ago, on May 27th 2022, Nao_sec identified an odd looking Word document in the wild, uploaded from an IP address in Belarus. This turned out to be a zero day vulnerability in Office and/or Windows. The document uses the Word remote template feature to retrieve a HTML file from a remote webserver, which in turn uses the ms-msdt MSProtocol URI scheme to load some code and execute some PowerS
MELSEC iQ-Fã·ãªã¼ãº FX5U(C) CPUã¦ããã å ¨æ©ç¨® å ¨ãã¼ã¸ã§ã³ FX5UJ CPUã¦ããã å ¨æ©ç¨® å ¨ãã¼ã¸ã§ã³ MELSEC iQ-Rã·ãªã¼ãº R00/01/02CPU å ¨ãã¼ã¸ã§ã³ R04/08/16/32/120(EN)CPU å ¨ãã¼ã¸ã§ã³ R08/16/32/120SFCPU å ¨ãã¼ã¸ã§ã³ R08/16/32/120PCPU å ¨ãã¼ã¸ã§ã³ R08/16/32/120PSFCPU å ¨ãã¼ã¸ã§ã³ R16/32/64MTCPU å ¨ãã¼ã¸ã§ã³ RJ71GN11-T2 å ¨ãã¼ã¸ã§ã³ RJ71GN11-EIP å ¨ãã¼ã¸ã§ã³ RJ71C24(-R2/R4) å ¨ãã¼ã¸ã§ã³ RJ71EN71 å ¨ãã¼ã¸ã§ã³ RJ71GF11-T2 å ¨ãã¼ã¸ã§ã³ RJ71GP21(S)-SX å ¨ãã¼ã¸ã§ã³ RJ72GF15-T2 å ¨ãã¼ã¸ã§ã³ MELSEC Qã·ãªã¼ãº Q03UDECPUãQ04/
Exploit code for Spring core RCE aka Spring4Shell dropped online. Update as of 31st March: Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965. Initially, it was started on 30th March, the first notification of the vulnerability was hinted at by the leade
IoTãç£æ¥ç¨ããã¤ã¹åãã«ã»ãã¥ãªãã£ã½ãªã¥ã¼ã·ã§ã³ãæä¾ããForescoutãããNAMEï¼WRECKãã¨å¼ã°ããæ°ç¾ä¸å°ã®IoTãç£æ¥ç¨ããã¤ã¹ã«å½±é¿ãããã¼ãå¯è½æ§ã®ããèå¼±æ§ã®åå¨ãå ±åãã¦ãã¾ãã NAME:WRECK - Forescout https://www.forescout.com/research-labs/namewreck/ NAME:WRECK vulnerabilities impact millions of smart and industrial devices | The Record by Recorded Future https://therecord.media/namewreck-vulnerabilities-impact-millions-of-smart-and-industrial-devices/ How the NAME:W
Linuxãã£ã¹ããªãã¥ã¼ã·ã§ã³ã¨ãã¦ãããã·ã§ã¢ãèªãUbuntuã«ãæ¨æºã¦ã¼ã¶ã¼ããç¹æ¨©ã¦ã¼ã¶ã¼ãç°¡åã«ä½æã§ãã¦ãã¾ãèå¼±æ§ãè¦ã¤ããã¾ããã How to get root on Ubuntu 20.04 by pretending nobodyâs /home - GitHub Security Lab https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE Ubuntu fixes bugs that standard users could use to become root | Ars Technica https://arstechnica.com/information-technology/2020/11/ubuntu-fixes-bugs-that-standard-users
Appleããã°å ±é ¬éããã°ã©ã ãå ¨ã¦ã¼ã¶ã¼ã«å ¬éãå ±é ¬ã¯æå¤§1å6,000ä¸å 2019 12/21 Apple製åã®æªçºè¦ã®èå¼±æ§ãè¦ã¤ããã¨å ±é ¬éãããããAppleã®ãã°å ±é ¬éããã°ã©ã ã¯ãããã¾ã§æå¾ å¶ã¨ãªã£ã¦ãã¾ãããã誰ã§ããã°ã®å ±åãè¡ããå ±é ¬ãããããããã«ãªãã¾ãããããã°ã©ã ã®å¯¾è±¡ã¨ãªã£ã¦ããã®ã¯ãæ¨æºæ§æã®iOSãiPadOSãmacOSãtvOSãwatchOSã¨ãä¸è¬åãã«è²©å£²ããã¦ããææ°ã®ãã¼ãã¦ã§ã¢ã§ãã ç¹å®ã®ãã¼ã¿çå ã®ãã°çºè¦ã«ã¯å ±é ¬ã50%å¢ Appleã®ã»ãã¥ãªãã£å ±é ¬éãåãåãã«ã¯ãæ¬¡ã®æ¡ä»¶ãå¿ è¦ã¨ãªãã¾ãã ãã®èå¼±æ§ã®ãApple製åã»ãã¥ãªãã£ï¼Apple Product Securityï¼ã¸ã®ç¬¬ä¸å ±åè ã§ããã㨠修æ£ããã¦ããªãèå¼±æ§ã®è¨¼æãå«ãæç¢ºãªå ±åæ¸ãæåºããã㨠Appleããã°ä¿®æ£ã®ããã®é¢é£ã¢ãããã¼ããå«ãã»ãã¥ãªã
JPCERT-AT-2019-0033 JPCERT/CC 2019-09-02(æ°è¦) 2019-09-06(æ´æ°) I. æ¦è¦JPCERT/CC ã§ã¯ãè¤æ°ã® SSL VPN 製åã®èå¼±æ§ã«ã¤ãã¦ãèå¼±æ§ã«å¯¾ããå®è¨¼ã³ã¼ããªã©ã®è©³ç´°ãªæ å ±ãå ¬è¡¨ããã¦ãããã¨ã確èªãã¦ãã¾ãã - Palo Alto Networks (CVE-2019-1579) - Fortinet (CVE-2018-13379) - Pulse Secure (CVE-2019-11510) ãããã®èå¼±æ§ãæªç¨ãããå ´åã«ãæ»æè ããªã¢ã¼ãããä»»æã®ã³ã¼ããå®è¡ã§ããå¯è½æ§ (CVE-2019-1579) ããä»»æã®ãã¡ã¤ã«ãèªã¿åããèªè¨¼æ å ±ãªã©ã®æ©å¾®ãªæ å ±ãåå¾ããå¯è½æ§ (CVE-2018-13379, CVE-2019-11510) ãããã¾ãããªããèå¼±æ§ã®å ±åè ããã¯ãããããã®è£½åã«ã¤ãã¦ãä¸è¨
Fossbytesã¯7æ25æ¥(ç±³å½æé)ãã1 Million+ ProFTPD Servers Vulnerable To Remote Code Execution Attacksãã«ããã¦ãFTPãµã¼ããProFTPdãã«èå¼±æ§ãåå¨ããã¨ä¼ããã ãã¤ãã®ã»ãã¥ãªãã£ç ç©¶è ã§ããTobias Madelæ°ããmod_copyã¢ã¸ã¥ã¼ã«ã«èå¼±æ§ãåå¨ãã¦ãããæ¸ãè¾¼ã¿æ¨©éãæã£ã¦ããªãã¦ã¼ã¶ã¼ã権éãè¶ ããæä½ãã§ãã¦ãã¾ããã¨ãæããã«ããããèå¼±æ§ã«é¢ããæ å ±ã¯æ¬¡ã®ãã¼ã¸ã«ã¾ã¨ã¾ã£ã¦ããã ProFTPd CVE-2019-12815 - tbspace.de ProFTPd CVE-2019-12815 - tbspace.de ProFTPdã¯äººæ°ã®é«ãFTPãµã¼ãã®1ã¤ã§ãããã©ã«ãã®FTPãµã¼ãã¨ãã¦å«ã¾ãã¦ãããã¨ãå¤ããã¾ããèå¼±æ§ãåå¨ããã¨ãããmod_copy
ITU-Tãå®ããFAXéä¿¡è¦æ ¼ãT.30ãã«åå¨ããèå¼±æ§ãå©ç¨ããã°ãã¿ã¼ã²ããã®FAXçªå·ãç¥ã£ã¦ããã ãã§ãããã¡ãªã¼ãã¼ããã¼ãå¼ãèµ·ããããã¸ã¿ã«è¤åæ©ï¼MFPï¼ãä¹ã£åããã¨ãã§ãããããã«ã©ã³ãµã ã¦ã§ã¢ãWannaCryãã§ã使ãããèå¼±æ§æ»æãã¼ã«ãªã©ãçµã¿åãããã°ãè¤åæ©ãè¸ã¿å°ã«ãã¦ãªãã£ã¹ãããã¯ã¼ã¯å ã®PCããµã¼ãã¼ã«ãä¾µå ¥ãæ¡å¤§ããæ©å¯ãã¼ã¿ãçã¿åºããã¨ãªã©ãå¯è½ã«ãªãââã 2018å¹´8æ12æ¥ãç±³å½ã©ã¹ãã¬ã¹ã§éå¬ãããããã«ã¼ã¤ãã³ããDEF CON 26ãã§ã¯ãããããæ»æææ³ãç´¹ä»ããè¬æ¼ãWhat the Fax!?ããè¡ãããï¼è¬æ¼ã¿ã¤ãã«ã¯ãããã¹ã©ã³ã°ãWTFï¼What the Fuckãã®ãããã ï¼ãè¬æ¼ãè¡ã£ãCheck Point Software Technologiesã®ã»ãã¥ãªãã£ãªãµã¼ãã£ã¼ãã¤ããã»ãã«ãã¹æ°ã¨ã¨ã¤ã¤ã«ã»ã¤ã
èå¼±æ§è¨ºæãã¼ã«ãOWASP ZAPãã¯ãèå¼±æ§ã ããã®Webã¢ããªã±ã¼ã·ã§ã³ãEasyBuggyãã®èå¼±æ§ãã©ã®ç¨åº¦æ¤åºã§ããã§ããããï¼ ä»åã¯æ¬¡ã®åºæ¬çãªæ©è½ã§æ¤è¨¼ãã¦ã¿ã¾ããã ç°¡æã¹ãã£ã³ï¼Webã¢ããªã±ã¼ã·ã§ã³ã®ã«ã¼ãã®URLãå ¥åããã¨ãOWASP ZAPããã®é ä¸ãã¯ãã¼ã«ãã¦èå¼±æ§ãããã診æããã éçã¹ãã£ã³ï¼ãã©ã¦ã¶ä¸ã§Webã¢ããªã±ã¼ã·ã§ã³ã®åºæ¬çãªæ©è½ãä¸éãæä½æ¥ã§åããã¨ãOWASP ZAPãã¬ã¹ãã³ã¹ã®å 容ãªã©ãæ¤æ»ããã åçã¹ãã£ã³ï¼éçã¹ãã£ã³ã§è¡ã£ãæä½ããOWASP ZAPããªã¯ã¨ã¹ããã©ã¡ã¼ã¿ãå¤ãããªã©ãã¦åå®è¡ãã診æããã ãªããæ¤è¨¼ã§è¡ã£ã使¥å 容ããã®ãã¼ã¸è¼ãã¦ãã¾ãã®ã§ãOWASP ZAPã試ãã¦ã¿ããæ¹ã¯åèã«ãã¦ã¿ã¦ä¸ããã ã¯ããã« OWASP ZAPã¨ã¯ ãã®åã«OWASP ZAPã«ã¤ãã¦ç°¡åã«èª¬æãã¦ããã¾ãããOWAS
Huaweiï¼ãã¡ã¼ã¦ã§ã¤ï¼ã®ã«ã¼ã¿ãæ¨çã¨ãã¦å®è¡å¯è½ãªã¨ã¯ã¹ããã¤ãã³ã¼ãããããããã«ã¼ã«ãã£ã¦ããªãã¼ã·ã¼ãºã³ä¸ã«å ¬éãããããã®ã³ã¼ãã¯ãåã«ã¼ã¿ãæ¨çã«ãããããããã¯ãããã®ãããã¯ã¼ã¯ãå¢å¼·ãããã¨èãã¦ãããµã¤ãã¼æ»æè ã«å¯¾ãã¦ç¡åã§å ¬éããããåã³ã¼ãã¯ãSatoriãããããããã«ãã£ã¦å®éã«å©ç¨ããã¦ããã NewSky Securityã®ããªã³ã·ãã«ãªãµã¼ãã£ã¼ã§ããAnkit Anubhavæ°ã«ããã¨ããã®ã¨ã¯ã¹ããã¤ãã³ã¼ãã¯ããªãã¼ã·ã¼ãºã³ä¸ã«Pastebinã«æç¨¿ãããã¨ããã Miraiã®ä¸è¬çãªäºç¨®ã¯ãIoTæ©å¨ã®èå¼±æ§ãã¹ãã£ã³ããããã©ã«ãã®èªè¨¼æ å ±ãç¨ãã䏿¹ãSatoriã¯Huaweiã®æ©å¨ã«åå¨ãããCVE-2017-17215ããå«ãæ¢ç¥ã®èå¼±æ§ãæªç¨ããã NewSky Securityã«ããã¨ãåãã«ã¦ã§ã¢ã³ã¼ãã¯Satoriããããã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}