ID | Votes | Profile Description |
---|
ID | Type | Votes | Profile Description |
---|---|---|---|
Raspberry Robin | Unspecified | 1 | Raspberry Robin is a sophisticated malware that has been designed to exploit and damage computer systems. This malicious software infiltrates the system through suspicious downloads, emails, or websites, often unbeknownst to the user. Once embedded, Raspberry Robin can steal personal information, di |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
CVE-2020-1054 | Unspecified | 1 | CVE-2020-1054 is a software vulnerability that lies in the design and implementation of Microsoft's Win32k component. It specifically exploits a flaw in the win32k window object, enabling it to write data beyond its intended boundaries. This vulnerability is significant because it allows malicious a |
Proxyshell | Unspecified | 1 | ProxyShell is a critical vulnerability affecting Microsoft Exchange email servers. Identified as CVE-2021-34473, it is a flaw in software design or implementation that can be exploited by attackers to gain unauthorized access to systems. The vulnerability was actively exploited by threat actors, cau |
Proxynotshell | Unspecified | 1 | ProxyNotShell is a software vulnerability, specifically a flaw in the design or implementation of Microsoft Exchange Server. It was first identified and exploited through CVE-2022-41082, as reported by Palo Alto Networks' Unit 42. The ProxyNotShell exploit method leveraged an AutoDiscover endpoint t |
Follina | Unspecified | 1 | Follina, also known as CVE-2022-30190, is a notable software vulnerability that was discovered and exploited in the first half of 2022. This flaw, found in the Microsoft Windows Support Diagnostic Tool (MSDT), was weaponized by TA413, a cyber threat actor group with suspected ties to China. The grou |
Source | CreatedAt | Title |
---|---|---|
DARKReading | 5 months ago | Raspberry Robin Jumps on 1-Day Bugs to Nest Deep in Windows Networks |
Checkpoint | 5 months ago | Raspberry Robin Keeps Riding the Wave of Endless 1-Days - Check Point Research |
Securityaffairs | a year ago | In 2022, more than 40% of zero-day exploits used in the wild were variations of previous issues |
Unit42 | a year ago | Inside Win32k Exploitation: Analysis of CVE-2022-21882 and CVE-2021-1732 |
Unit42 | a year ago | Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies |
Checkpoint | a year ago | Raspberry Robin: Anti-Evasion How-To & Exploit Analysis - Check Point Research |
InfoSecurity-magazine | a year ago | Raspberry Robin Adopts Unique Evasion Techniques |
CERT-EU | a year ago | 24th April – Threat Intelligence Report - Check Point Research |