Security News > 2024 > September > Windows vulnerability abused braille “spaces” in zero-day attacks
2024-09-15 18:16
A recently fixed "Windows MSHTML spoofing vulnerability" tracked under CVE-2024-43461 is now marked as previously exploited after it was used in attacks by the Void Banshee APT hacking group. [...]
News URL
Related news
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days (source)
- Versa fixes Director zero-day vulnerability exploited in attacks (source)
- Google fixes Android kernel zero-day exploited in targeted attacks (source)
- Windows Update downgrade attack "unpatches" fully-updated systems (source)
- Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities (source)
- Microsoft fixes 6 zero-days under active attack (source)
- New Windows SmartScreen bypass exploited as zero-day since March (source)
- New Windows IPv6 Zero-Click Vulnerability (source)
- Windows driver zero-day exploited by Lazarus hackers to install rootkit (source)
- CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-10 | CVE-2024-43461 | Unspecified vulnerability in Microsoft products Windows MSHTML Platform Spoofing Vulnerability | 8.8 |