{"id":19240,"date":"2022-06-03T06:20:06","date_gmt":"2022-06-03T14:20:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/06\/03\/news-12973\/"},"modified":"2022-06-03T06:20:06","modified_gmt":"2022-06-03T14:20:06","slug":"news-12973","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/06\/03\/news-12973\/","title":{"rendered":"Threat Advisory: CVE-2022-30190 \u2018Follina\u2019 \u2013 Severe Zero-day Vulnerability discovered in MSDT"},"content":{"rendered":"<p><strong>Credit to Author: Quickheal| Date: Fri, 03 Jun 2022 13:21:20 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt\/\" target=\"bwo\" >http:\/\/blogs.quickheal.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Quickheal| Date: Fri, 03 Jun 2022 13:21:20 +0000<\/strong><\/p>\n<p><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Follina-1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" loading=\"lazy\" style=\"float:left; margin:0 15px 15px 0;\" srcset=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Follina-1-150x150.jpg 150w, https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Follina-1-70x70.jpg 70w, https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Follina-1-80x81.jpg 80w, https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2022\/06\/Follina-1-45x45.jpg 45w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 \u201cFOLLINA\u201d in Microsoft Windows&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blogs.quickheal.com\/threat-advisory-cve-2022-30190-follina-severe-zero-day-vulnerability-discovered-in-msdt\/\">Threat Advisory: CVE-2022-30190 \u2018Follina\u2019 \u2013 Severe Zero-day Vulnerability discovered in MSDT<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blogs.quickheal.com\">Quick Heal Blog | Latest computer security news, tips, and advice<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10459,10378],"tags":[26405,24576,174,26337,6272,10516,3495,666,10467],"class_list":["post-19240","post","type-post","status-publish","format-standard","hentry","category-quickheal","category-security","tag-secureitright","tag-zeroday","tag-cyberattack","tag-follina","tag-hackers","tag-microsoft","tag-microsoft-windows","tag-uncategorized","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19240"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19240\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}