0-Day Vulnerability

Windows Kernel cng.sys Privilege Escalation 0-day Vulnerability CVE-2020-17087 Threat Alert

novembro 17, 2020


Recently, Google Project Zero published an article about the Windows cng.sys privilege escalation vulnerability (CVE-2020-17087). The vulnerability allows attackers without authentication to trick users into running crafted malicious programs to escalate privileges.

At present, this vulnerability has been exploited in the wild, and Microsoft has not released patches to fix it. Users are advised to stay tuned and avoid running programs from unidentifiable sources.


Apache Axis Remote Code Execution 0-Day Vulnerability Handling Guide

junho 21, 2019

  1. Vulnerability Overview

Recently, by using the Attack Trend Monitoring system (ATM), the NSFOCUS security team has discovered an Apache Axis remote command execution vulnerability, which allows attackers to obtain privileges of the target server and remotely execute commands without authorization by sending a crafted HTTP-POST request. (mais…)

Internet Explorer and Edge Browsers 0-Day Vulnerability Threat Alert

abril 4, 2019


Recently, a foreign researcher announced a 0-day vulnerability with Microsoft Edge and Internet Explorer (IE). Enticing a user to click a malicious link, an attacker could exploit this vulnerability to bypass the same-origin policy of the two kinds of browsers to launch a universal cross-site scripting (UXSS) attack to steal the user’s sensitive information. (mais…)

Chrome PDF File Parsing 0-Day Vulnerability Threat Alert

março 12, 2019

1 Vulnerability Overview On February 28, 2019, a security vendor outside of China spotted a 0-day vulnerability in Google’s Chrome browser, which could lead to information disclosure upon a user’s opening of a malicious PDF file using Chrome. Up to now, a number of malicious samples have been found to exploit this vulnerability in the […]

Windows Arbitrary File Read 0-Day Vulnerability Handling Guide

janeiro 7, 2019

1 Vulnerability Overview

Recently, a security researcher with Twitter alias SandboxEscaper, once again, published proof-of-concept (PoC) code for a new 0-day vulnerability affecting Windows. This is the third Windows 0-day vulnerability published by this same researcher since August 2018. The vulnerability made known to the public this time could lead to arbitrary file read. Specifically, it allows low-privileged users or malicious programs to read, but not write into, arbitrary files on a targeted Windows host. Before an official patch is released by Microsoft, all Windows users will be affected by this vulnerability. (mais…)


Inscreva-se no Blog da NSFOCUS