Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
53 résultats taggé 0-Day  ✕
Chrome 0-Day Flaw Exploited in the Wild to Execute Arbitrary Code https://gbhackers.com/chrome-0-day-security-vulnerability/
01/07/2025 09:48:04
QRCode
archive.org
thumbnail

Google has issued an urgent security update for its Chrome browser, addressing a critical zero-day vulnerability that is being actively exploited by attackers.

The flaw, tracked as CVE-2025-6554, is a type confusion vulnerability in Chrome’s V8 JavaScript engine, which underpins the browser’s ability to process web content across Windows, macOS, and Linux platforms.

The vulnerability was discovered by Clément Lecigne of Google’s Threat Analysis Group (TAG) on June 25, 2025. According to Google, attackers have already developed and deployed exploits targeting this flaw in the wild, prompting the company to act quickly.

gbhackers EN 2025 Chrome 0-Day Flaw Exploited vulnerability CVE-2025-6554
Google Researchers Find New Chrome Zero-Day https://www.securityweek.com/google-researchers-find-new-chrome-zero-day/
03/06/2025 13:38:32
QRCode
archive.org

Google on Monday released a fresh Chrome 137 update to address three vulnerabilities, including a high-severity bug exploited in the wild.

Tracked as CVE-2025-5419, the zero-day is described as an out-of-bounds read and write issue in the V8 JavaScript engine.

“Google is aware that an exploit for CVE-2025-5419 exists in the wild,” the internet giant’s advisory reads. No further details on the security defect or the exploit have been provided.

However, the company credited Clement Lecigne and Benoît Sevens of Google Threat Analysis Group (TAG) for reporting the issue.

TAG researchers previously reported multiple vulnerabilities exploited by commercial surveillance software vendors, including such bugs in Chrome. Flaws in Google’s browser are often exploited by spyware vendors and CVE-2025-5419 could be no different.

According to a NIST advisory, the exploited zero-day “allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page”. It should be noted that the exploitation of out-of-bounds defects often leads to arbitrary code execution.

The latest browser update also addresses CVE-2025-5068, a medium-severity use-after-free in Blink that earned the reporting researcher a $1,000 bug bounty. No reward will be handed out for the zero-day.

The latest Chrome iteration is now rolling out as version 137.0.7151.68/.69 for Windows and macOS, and as version 137.0.7151.68 for Linux.

securityweek EN 2025 Chrome 0-day Zero-Day CVE-2025-5419 google TAG
How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/
26/05/2025 06:43:02
QRCode
archive.org
thumbnail

In this post I’ll show you how I found a zeroday vulnerability in the Linux kernel using OpenAI’s o3 model. I found the vulnerability with nothing more complicated than the o3 API – no scaffolding, no agentic frameworks, no tool use.

Recently I’ve been auditing ksmbd for vulnerabilities. ksmbd is “a linux kernel server which implements SMB3 protocol in kernel space for sharing files over network.“. I started this project specifically to take a break from LLM-related tool development but after the release of o3 I couldn’t resist using the bugs I had found in ksmbd as a quick benchmark of o3’s capabilities. In a future post I’ll discuss o3’s performance across all of those bugs, but here we’ll focus on how o3 found a zeroday vulnerability during my benchmarking. The vulnerability it found is CVE-2025-37899 (fix here), a use-after-free in the handler for the SMB ‘logoff’ command. Understanding the vulnerability requires reasoning about concurrent connections to the server, and how they may share various objects in specific circumstances. o3 was able to comprehend this and spot a location where a particular object that is not referenced counted is freed while still being accessible by another thread. As far as I’m aware, this is the first public discussion of a vulnerability of that nature being found by a LLM.

Before I get into the technical details, the main takeaway from this post is this: with o3 LLMs have made a leap forward in their ability to reason about code, and if you work in vulnerability research you should start paying close attention. If you’re an expert-level vulnerability researcher or exploit developer the machines aren’t about to replace you. In fact, it is quite the opposite: they are now at a stage where they can make you significantly more efficient and effective. If you have a problem that can be represented in fewer than 10k lines of code there is a reasonable chance o3 can either solve it, or help you solve it.

Benchmarking o3 using CVE-2025-37778
Lets first discuss CVE-2025-37778, a vulnerability that I found manually and which I was using as a benchmark for o3’s capabilities when it found the zeroday, CVE-2025-37899.

CVE-2025-37778 is a use-after-free vulnerability. The issue occurs during the Kerberos authentication path when handling a “session setup” request from a remote client. To save us referring to CVE numbers, I will refer to this vulnerability as the “kerberos authentication vulnerability“.

sean.heelan.io EN 2025 CVE-2025-37899 Linux OpenAI CVE 0-day found implementation o3 vulnerability AI
CV_2025_03_1: Critical Webserver Vulnerability https://documentation.commvault.com/securityadvisories/CV_2025_03_1.html
08/05/2025 09:22:55
QRCode
archive.org

A vulnerability has been identified and remediated in all supported versions of the Commvault software. Webservers can be compromised through bad actors creating and executing webshells.

Exploiting this vulnerability requires a bad actor to have authenticated user credentials within the Commvault Software environment. Unauthenticated access is not exploitable. For software customers, this means your environment must be: (i) accessible via the internet, (ii) compromised through an unrelated avenue, and (iii) accessed leveraging legitimate user credential

commvault EN vulnerability 0-day CVE-2025-3928
Apple Drops Another WebKit Zero-Day Bug https://www.darkreading.com/mobile-security/apple-drops-another-webkit-zero-day-bug
17/03/2025 09:17:49
QRCode
archive.org

For the third time in as many months, Apple has released an emergency patch to fix an already exploited zero-day vulnerability impacting a wide range of its products.

The new vulnerability, identified as CVE-2025-24201, exists in Apple's WebKit open source browser engine for rendering Web pages in Safari and other apps across macOS, iOS, and iPadOS. WebKit is a frequent target for attackers because of how deeply integrated it is with Apple's ecosystem.

darkreading EN 2025 CVE-2025-24201spyware Apple vulnerability 0-day WebKit
Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs https://doublepulsar.com/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773
23/10/2024 09:53:22
QRCode
archive.org

Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do.

doublepulsar EN 2024 FortiJump FortiManager vulnerability 0-day medium
Telegram zero-day allowed sending malicious Android APKs as videos https://www.bleepingcomputer.com/news/security/telegram-zero-day-allowed-sending-malicious-android-apks-as-videos/
23/07/2024 08:23:54
QRCode
archive.org
thumbnail

A Telegram for Android zero-day vulnerability dubbed 'EvilVideo' allowed attackers to send malicious Android APK payloads disguised as video files.

bleepingcomputer EN 2024 0-day Computer APK EvilVideo Telegram Mobile Zero-Day InfoSec Android Vulnerability
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks https://www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/
25/04/2024 07:48:55
QRCode
archive.org
thumbnail

Sources suspect China is behind the targeted exploitation of two zero-day vulnerabilities in Cisco’s security appliances.

wired EN 2024 0-day vulnerabilities security cisco cybersecurity china hacking ArcaneDoor
Release: VM Escape Exploit for Parallels Desktop Hypervisor (Pwn2Own 2021) https://zerodayengineering.com/research/pwn2own-2021-vm-escape.html
25/03/2024 19:11:13
QRCode
archive.org

In April 2021 I participated in Pwn2Own Vancouvver competition as a single player, and successfully demonstrated a 0-day virtual machine escape exploit with code execution on Parallels hypervisor. Today I am finally releasing the exploit source code together with a technical walkthrough video talk that I gave on Zero Day Engineering livestream in November 2021.

zerodayengineering EN 2024 exploit 2021 0-day Parallels Pwn2Own VM escape
CVE-2023-46805 https://attackerkb.com/topics/AdUh6by52K/cve-2023-46805/rapid7-analysis
16/01/2024 14:39:31
QRCode
archive.org
thumbnail

Starting January 10, 2024, multiple parties (Ivanti, Volexity, and Mandiant) disclosed the existence of a zero-day exploit chain affecting Ivanti Connect Secur…

attackerkb EN 2023 CVE-2023-46805 Ivanti 0-day API
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
11/01/2024 08:45:03
QRCode
archive.org
thumbnail

Volexity has uncovered active in-the-wild exploitation of two vulnerabilities allowing unauthenticated remote code execution in Ivanti Connect Secure VPN appliances. An official security advisory and knowledge base article have been released by Ivanti that includes mitigation that should be applied immediately. However, a mitigation does not remedy a past or ongoing compromise. Systems should simultaneously be thoroughly analyzed per details in this post to look for signs of a breach.

volexity EN 2023 CVE-2024-21887 Ivanti CVE-2023-46805 PulseSecure VPN 0-day
Chinese Hackers Exploited New Zero-Day in Barracuda's ESG Appliances https://thehackernews.com/2023/12/chinese-hackers-exploited-new-zero-day.html?m=1
30/12/2023 14:06:24
QRCode
archive.org
thumbnail

Chinese threat actors exploited a new zero-day vulnerability in Barracuda's Email Security Gateway (ESG) appliances.

thehackernews EN 2023 0-day network hacker vulnerability ESG CVE-2023-7102 appliance Barracuda
Xfinity waited to patch critical Citrix Bleed 0-day. Now it’s paying the price https://arstechnica.com/security/2023/12/hack-of-unpatched-comcast-servers-results-in-stolen-personal-data-including-passwords/
20/12/2023 20:46:07
QRCode
archive.org
thumbnail

Data for almost 36 million customers now in the hands of unknown hackers.

arstechnica EN 2023 Citrix-Bleed 0-day Xfinity data-breach
Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet | Ars Technica https://arstechnica.com/security/2023/11/thousands-of-routers-and-cameras-vulnerable-to-new-0-day-attacks-by-hostile-botnet/
24/11/2023 13:49:34
QRCode
archive.org
thumbnail

Internet scans show 7,000 devices may be vulnerable. The true number could be higher.

arstechnica EN 2023 0-day routers cameras mirai
Zimbra 0-day used to target international government organizations https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/
16/11/2023 18:01:57
QRCode
archive.org
thumbnail

TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.

blog.google EN 2023 Zimbra 0-day government TAG exploit XSS CVE-2023-37580
SysAid Zero-Day Vulnerability Exploited by Ransomware Group https://www.securityweek.com/sysaid-zero-day-vulnerability-exploited-by-ransomware-group/
09/11/2023 10:56:04
QRCode
archive.org
thumbnail

CVE-2023-47246, a zero-day vulnerability in SysAid IT service management software has been exploited by Cl0p ransomware affiliates.

securityweek EN 2023 SysAid CVE-2023-47246 0-day
ZDI-23-1578 | Zero Day Initiative https://www.zerodayinitiative.com/advisories/ZDI-23-1578/?s=09
04/11/2023 09:38:18
QRCode
archive.org

(0Day) Microsoft Exchange ChainedSerializationBinder Deserialization of Untrusted Data Remote Code Execution Vulnerability

zerodayinitiative EN 2023 0-Day Microsoft Exchange ChainedSerializationBinder Deserialization RCE
Hackers exploit critical flaw in WordPress Royal Elementor plugin https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-flaw-in-wordpress-royal-elementor-plugin/
17/10/2023 21:47:36
QRCode
archive.org
thumbnail

A critical severity vulnerability impacting Royal Elementor Addons and Templates up to version 1.3.78 is reported to be actively exploited by two WordPress security teams.

bleepingcomputer EN 2023 WordPress Zero-Day Elementor 0-Day CVE-2023-5360
CVE: Zero-Day Privilege Escalation in Confluence Server & Data Center https://www.rapid7.com/blog/post/2023/10/04/etr-cve-2023-22515-zero-day-privilege-escalation-in-confluence-server-and-data-center/
04/10/2023 22:04:13
QRCode
archive.org
thumbnail

On 10/4/2023, Atlassian published a security advisory on CVE-2023-22515, a privilege escalation vulnerability affecting Confluence Server & Data Center.

rapid7 EN 2023 Atlassian Confluence cve-2023-22515 0-Day
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware https://thehackernews.com/2023/09/latest-apple-zero-days-used-to-hack.html
23/09/2023 10:30:59
QRCode
archive.org
thumbnail

The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023.

"The targeting took place after Eltantawy publicly stated his plans to run for President in the 2024 Egyptian elections," the Citizen Lab said, attributing the attack with high confidence to the Egyptian government owing to it being a known customer of the commercial spying tool.

thehackernews EN 2023 0-day 0-days Predator Egypt Apple CitizenLab CVE-2023-41991 CVE-2023-41992 CVE-2023-41993
page 1 / 3
4478 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio