On March 4th, Avast antivirus was alerted to a vulnerability in its JavaScript emulation engine by researcher Tavis Ormandy. Just a few days later, Ormandy released a tool on GitHub that made analyzing the engine easier. Avast’s JavaScript engine ran with SYSTEM level privileges while processing untrusted JavaScript by design which makes it an attractive target for attackers to attempt remote code execution exploits. On March 11th, the antivirus company announced on Twitter that it had decided to disable the emulator for all users globally.
Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is