A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability.
Questions tagged [zero-day]
105 questions
2
votes
2 answers
Security Practices by Employees in a Corporate Environment
Consider the following situation :
1. Somehow my boss's system got infected with a malware ( He visited one of the Java exploits website).
2. He sends a PDF document containing the requirement document of a new project coming up ( the malware…
![](../../users/profiles/6862.webp)
Novice User
- 2,088
- 7
- 26
- 38
2
votes
1 answer
How disable Java in Chrome 23?
Well in case someone doesn't know yet... there is a new Java zero day.
I'm trying to disable it on Chrome but I can't find any option. Google searches says that the option for deactivate it is on chrome://plugins however I don't see such option…
![](../../users/profiles/15194.webp)
The Illusive Man
- 10,487
- 16
- 56
- 88
2
votes
1 answer
Blocking outbound connections to mitigate CVE-2021-44228 log4j?
As I understand it, a successful exploit requires a connection to an external server to download a payload. If a device can't be patched or otherwise mitigated, does restricting its outbound access prevent a successful exploit?
Assuming this is an…
![](../../users/profiles/7186.webp)
poke
- 365
- 1
- 3
- 11
2
votes
4 answers
Virus won't be picked up by Antivirus tools
Today we found a virus / trojan on our network which has thus far:
Hidden all files and folders
Replaced the hidden files and folders with executables of itself, with matching icons, and renamed itself to those files.
Kaspersky picks it up, and is…
![](../../users/profiles/16248.webp)
BOMEz
- 123
- 5
2
votes
3 answers
Can I tell which applications embed Internet Explorer at a command prompt?
A recently discovered vulnerability affects Internet Explorer versions up to version 9, running on Windows XP, Vista, and Windows 7.
This arstechnica article quotes HD Moore as saying,
Just keep in mind that even if you don't use IE for day-to-day
…
2
votes
2 answers
What approaches are used to discover zero-day vulnerabilities?
As a developer of multiple standalone apps (Web-/Native apps) I am wondering, what things I should keep in mind / what are typical approaches of a blackhat (besides of these scriptkiddies checking for sql injection etc.) to identify such…
![](../../users/profiles/177773.webp)
0x2E5
- 21
- 1
2
votes
1 answer
How does malware such as Stuxnet and Flamer propagate through USB memory sticks?
The best explanation I found is from this article but it still is unclear to me. Apparently a new vulnerability has been found involving .lnk files where when a folder on the memory stick containing the .lnk file is viewed any file on the stick can…
![](../../users/profiles/10714.webp)
Celeritas
- 10,039
- 22
- 77
- 144
2
votes
2 answers
Is CVE-2017-5428 (mfsa2017-08) a zero-day?
CVE-2017-5428 aka MFSA-2017-08 is an integer overflow vulnerability in Mozilla Firefox. It was reported through the Pwn2Own contest, and corrected in Firefox 52.0.1.
This article describes it as a zero-day vulnerability, but I thought Pwn2Own used…
![](../../users/profiles/47469.webp)
Harry Johnston
- 1,667
- 10
- 14
2
votes
1 answer
How to justify a Vulnerability Research function at a company
From a business standpoint, how would you express the need for a vulnerability research team?
In the end, would it be infeasible from a business standpoint unless said business chalked it up as a marketing cost (to promote other services) or sold…
![](../../users/profiles/61140.webp)
grepNstepN
- 610
- 4
- 15
1
vote
1 answer
Clarification about the post: Russian hackers use ‘zero-day’ to hack NATO, Ukraine in cyber-spy campaign
I have encountered the following article on Washington post:
Russian hackers use ‘zero-day’ to hack NATO, Ukraine in cyber-spy campaign.
As always in such kind of articles the publication sounds too scary. There is almost no information to…
![](../../users/profiles/15912.webp)
Salvador Dali
- 1,745
- 1
- 19
- 32
1
vote
0 answers
What is known about recent zero day flaw with Tails up to this point in time and is Tails able to keep us anonymous from a global adversary?
Following is a excerpt from COMPUTERWORLD
Yesterday, in talking about the zero-day vulnerability in Tails,
Exodus Intelligence wrote:
"We publicized the fact that we’ve discovered these issues for a very simple reason: no user should put…
![](../../users/profiles/42504.webp)
Roya
- 129
- 7
1
vote
1 answer
Are updated iOS devices vulnerable to NSO Pegasus?
The Trident memory zero-day, zero-click vulnerabilities (exploits critical to NSO Pegasus success) were supposedly patched on iOS by Apple:
CVE-2016-4657
CVE-2016-4655
CVE-2016-4656
Android phones are presumably still vulnerable. And since 1000s…
![](../../users/profiles/27045.webp)
hobs
- 161
- 6
1
vote
1 answer
How likely are Evince, XReader or Adobe Reader with scripts disabled, to be exploited by a malicious file?
PDFs are very commonly found on the web, and I carefully either view them on the browsers, or use readers without the capability to run the scripts that may come with them (shitty design choice) like Evince or XReader, or, on Windows, disable the…
![](../../users/profiles/219123.webp)
memememe
- 121
- 1
1
vote
1 answer
Does every modern buffer overflow require multiple exploits in end user devices to be utilized?
On modern user oriented devices, such as Android phones, iPhones, PCs(Windows, MacOS, Linux), if there is a remote buffer overflow 0 day, are they only exploitable with the aid of multiple vulnerabilities? An example of this is the need to bypass…
![](../../users/profiles/209062.webp)
john doe
- 648
- 4
- 15
1
vote
0 answers
Is this 0-day RCE Exploit for Chrome fake?
I found this guy claiming that he has a 0-day Exploit for Chrome, Firefox and Windows 10, but to me it seems to be fake...
Video - 0day RCE Exploit for Google Chrome 59.0.3071.86
Here is video for newer version of Chrome…
![](../../users/profiles/134969.webp)
user134969
- 1,298
- 4
- 15
- 24