wxvl/data.json

224 lines
40 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247513636&idx=1&sn=66bc5f0cac446268cb859e38faa2b841": "四个关键漏洞使 HPE Aruba 设备面临 RCE 攻击",
"https://mp.weixin.qq.com/s?__biz=MzIxMjEzMDkyMA==&mid=2247486384&idx=1&sn=6cded6c301c425146633b7c8e92b9ae2": "用友crm客户关系管理pubdownloadfile.php接口存在任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247490163&idx=1&sn=0af69d90d567c84ea23336cde986f7a8": "代码审计-某产品高清智能录播系统漏洞分析附未公开POC",
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247488062&idx=1&sn=5e3f1e901718ee760c9271676d075758": "【漏洞预警】Apache ActiveMQ Jolokia 和 REST API 未授权访问漏洞CVE-2024-32114",
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458553432&idx=1&sn=93377c71147ef00b8e58571093d5ab55": "CVE-2023-4427ReduceJSLoadPropertyWithEnumeratedKey 中的越界访问",
"https://mp.weixin.qq.com/s?__biz=Mzg4OTkwMDc1Mg==&mid=2247484729&idx=1&sn=b2920455891f256e016b74122977490b": "YzmCMS pay_callback.html RCE漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=2&sn=44579672e179f0268bd6daac499832e2": "【漏洞复现】CVE-2024-1512",
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=1&sn=5a1e8635a4c0a68a5c58662d47a08f36": "【漏洞复现】CVE-2024-1698",
"https://mp.weixin.qq.com/s?__biz=Mzg2OTYzNTExNQ==&mid=2247484965&idx=1&sn=396cceb9cd98393868c20c1876aa8957": "[漏洞复现] CVE-2024-33786 中城科信票务管理平台 任意文件上传",
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649791059&idx=1&sn=82bf570f4c7002b524bb4eacc1f7fb0d": "俄罗斯 APT28 利用 Microsoft Outlook 漏洞攻击捷克、德国实体",
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4&chksm=e8a5e114dfd268025b28a508644eff19bd5ccf522b270bc7a6e545a340e65e4eb88e83aef43e&scene=58&subscene=0": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
"https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494678&idx=1&sn=4cdffd80c296f3df40b773da5943d796": "两个Google Vertex AI平台漏洞曝光可能导致权限提升与敏感数据外泄",
"https://mp.weixin.qq.com/s?__biz=Mzk0NjQ5MTM1MA==&mid=2247492614&idx=1&sn=40f082284e0b14fd77c82d95bbeb9185": "用友漏洞一键探测利用",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=1&sn=4a47b98c0b29cd4d3e7c4f30685e1247": "【漏洞预警】 用友BIP 数据库配置信息泄露",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=2&sn=adb385b0fccd4af9d9ad9d439bce5640": "【漏洞预警】D-Link-DNS 多款产品未公开接口sc_mgr.cgi 存在远程命令执行漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=3&sn=1cdbe6f7a8137e5e2626d4e358c1ef93": "【漏洞预警】 易宝OA-GetProductInv SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=4&sn=e2d16220eb00621420899460b1a95941": "【漏洞预警】易思智能物流无人值守系统SQL注入",
"https://mp.weixin.qq.com/s?__biz=MzA4NzUwMzc3NQ==&mid=2247496792&idx=1&sn=561979247dfc36401fe9815413c3f88a": "CVE-2024-25600WordPress Bricks Builder RCE",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652065974&idx=1&sn=d6789e893634a0f2fb9c34b2bfb0a8f9": "【安全圈】打补丁要快0Day漏洞正在被黑客广泛利用",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab": "2024年网络安全漏洞研究人才培养交流活动成功举办",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0": "CNNVD 关于微软多个安全漏洞的通报",
"https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486145&idx=1&sn=06229e2205d5dd9e99716999b4f1aa2e": "LLM大模型安全4- 供应链漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkyMzI2NzIyMw==&mid=2247488304&idx=1&sn=c0db143fcd6865fdd3482b955dd94abd": "BlockSec和OKX Explorer达成合作携手提升链上数据安全与合规等级",
"https://mp.weixin.qq.com/s?__biz=MzI0NjE1NDYyOA==&mid=2247484677&idx=1&sn=bb89036b82c59a0e1e8b06227a9e9768": "【漏洞分享】edu通杀 新中小学智慧校园信息管理系统 Upload 任意文件上传",
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485712&idx=1&sn=e15d7dda1a02527db2c340f56df4f3ea": "【漏洞复现】某平台-testdb-info-leak信息泄露漏洞",
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99": "远程代码执行风险威胁用户安全Zoom紧急修复多个安全漏洞颠覆传统安全架构Zscaler创新发布新型零信任分段方案 牛览",
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99&chksm=bd15a51f8a622c096ef4441d0b5acb3ee39ef865e5650f4df483a8648b528a3509fe57972cd1&scene=58&subscene=0": "远程代码执行风险威胁用户安全Zoom紧急修复多个安全漏洞颠覆传统安全架构Zscaler创新发布新型零信任分段方案 牛览",
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502432&idx=1&sn=d3405bf69adda60e3be13962d038b6aa&chksm=fe79eef8c90e67eead814333282edff4d7e247d6ba9e9ba1895fff6354e808e4fa84048a0cd1&scene=58&subscene=0": "【已复现】Fortinet FortiManager 身份认证绕过漏洞(CVE-2024-47575)安全风险通告第二次更新",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab&chksm=8b59e9cbbc2e60dd8d6dc37797f6608494298f22b5250c7326cf864063e039f776f4d7dc0847&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0&chksm=8b59e9cbbc2e60dda8a2633578ff2e76d88a3a00e52dba1a54ee0b2b9f554066431871d24cd8&scene=58&subscene=0": "CNNVD 关于微软多个安全漏洞的通报",
"https://mp.weixin.qq.com/s?__biz=Mzg4NTY0MDg1Mg==&mid=2247485595&idx=1&sn=b4c87d04e1659f11fad8f2f125985751&chksm=cfa49360f8d31a76e5d3880e51cd8f9b0ab1df47e86729adf04ea6d1f1202fac72fae5903fbe&scene=58&subscene=0": "大语言语言模型安全攻击以及AI供应链漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521498&idx=1&sn=f0af27f6b0e814c92846ea129bcee155&chksm=ea94a5b0dde32ca62dddf91f42a9fa2b36402ffb856469973f83a6a88e24d6910dcc53072ef4&scene=58&subscene=0": "PostgreSQL 高危漏洞可导致环境变量被利用",
"https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651388483&idx=1&sn=070fb6976ee52108d263858115ea9bfd&chksm=8d398bcbba4e02ddbe0183f79c2682bbf1cab54e4ba6bb0697fdc56e297e7303aa9eb938b9e6&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
"https://mp.weixin.qq.com/s/O2Ohp_ceYrTo8hppX09fkw": "(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞",
"https://mp.weixin.qq.com/s/tbEXIAPT-Vumch-WyoGZHQ": "代码审计-某oa任意文件读取(1day)",
"https://mp.weixin.qq.com/s/73CXvF4ejvgS40OetzXr8A": "(0day)全新优客API接口管理系统代码审计",
"https://mp.weixin.qq.com/s?__biz=Mzg4NTg5MDQ0OA==&mid=2247487335&idx=1&sn=c2800f225873a4a1b38711bacba10316": "AI代码审计和POC编写",
"https://mp.weixin.qq.com/s?__biz=MzA3NTc0MTA1Mg==&mid=2664712071&idx=1&sn=98356c1f6829546d47af1e4d43f89ace": "Fckeditor编辑器漏洞汇集",
"https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517203&idx=2&sn=3074826837ddd653a7d1ae03a600a0b4": "建了个SRC专项漏洞知识库",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487499&idx=1&sn=4ad7e59489c09ab80bee906e929b311a": "【漏洞预警】 用友BIP 数据库配置信息泄露",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487499&idx=3&sn=b3cf1540ab72404aab438e963c5e761d": "【漏洞预警】 易宝OA-GetProductInv SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492449&idx=2&sn=ded00a05c99093340d9c413be00b1a5a": "PostgreSQL数据库存在高危漏洞CVE-2024-109798.8",
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247523915&idx=1&sn=0522e35aa0afa2167e0dfd9d5a6954d7": "CVE-2024-28888福昕阅读器中使用释放后导致远程代码执行",
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486133&idx=1&sn=a795a853e80c985de5fceca4309365ce": "(0day)某全新UI自助打印微信小程序系统SQL+RCE漏洞代码审计",
"https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545126&idx=1&sn=b2f2e3d1dba89c587651768a66070b2d": "攻防演练 | 一次近源渗透",
"https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492730&idx=1&sn=4830f7a0e4dfa7e50b8fb0ccc7e0e0b9": "一款java漏洞集合工具",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307299&idx=1&sn=467809755fdcc647cdde9f67ad9a27a2": "打补丁要快0Day漏洞正在被黑客广泛利用",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307299&idx=4&sn=faa8ef20c4f618771d92d2e34863625b": "Velociraptor一款终端节点可视化与数据收集工具",
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793147&idx=3&sn=c17de8d66d7e37e8209eab45ef7f5654": "Palo Alto Networks 确认存在新的防火墙0day漏洞",
"https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650603612&idx=4&sn=1ca7d7d27c71f41ef3992ddac7cda038": "Vcenter图形化漏洞利用工具",
"https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488171&idx=1&sn=dbbce680730d50271fcb4e886e029f36": "VulToolsKit一把梭漏洞Exploit合集",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491421&idx=1&sn=653b49f157760ea962f45f3e9471858c": "漏洞预警 | Apache ZooKeeper身份验证绕过漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491421&idx=2&sn=89f3fc90da6871059bb0ea398e1ffb26": "漏洞预警 | XStream栈溢出漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491421&idx=3&sn=eabce5e15b6befff94c2407acd4a5aa9": "漏洞预警 | HPE Aruba Networking Access Points命令注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488371&idx=2&sn=3ad1f97fe2651cfd09c4aa8767ee6a6d": "【漏洞复现】用友YonBIP高级版存在任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486789&idx=1&sn=9e271a3346eed986ecc5b7a4aece7f88": "compiler explorer 轻松从汇编角度理解代码",
"https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486789&idx=2&sn=f8617e893d02f1eaca70fb0f9661a3e3": "网太CMS漏洞复现",
"https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247497601&idx=1&sn=1b31fff83d5276667f7ead2ae5de2a6b": "微软2024年11月份于周二补丁日针对90漏洞发布安全补丁",
"https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247497601&idx=2&sn=413b3330c9fde967c520582aefbd4bd6": "2023年最易被利用的漏洞",
"https://mp.weixin.qq.com/s?__biz=MzAwMDQwNTE5MA==&mid=2650247657&idx=1&sn=b0600f03ef9bbffbcaa4fbf1fe0d87f7": "CVE-2024-25600WordPress Bricks Builder RCE",
"https://mp.weixin.qq.com/s?__biz=Mzk0MzI2NzQ5MA==&mid=2247486636&idx=1&sn=5d9cfbe6b8393b15c60b04ca9c2c9588": "phpstudy_2016-2018_rce 漏洞复现",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487499&idx=4&sn=69d6613ba3812956a0388203252d7a8f": "【漏洞预警】易思智能物流无人值守系统SQL注入",
"https://mp.weixin.qq.com/s?__biz=MzkxNzUxMjU5OQ==&mid=2247484847&idx=1&sn=ab525f7b54b1842379879fcb44279dfe": "记录日常挖掘漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066024&idx=4&sn=46592438737abae8701b9ba1b7160d86": "【安全圈】俄罗斯黑客利用文件拖放、删除操作触发 Windows 0day 漏洞攻击乌克兰目标",
"https://mp.weixin.qq.com/s?__biz=Mzk0MzI2NzQ5MA==&mid=2247486684&idx=1&sn=b88c209774a7a72edb5ffd3d8185da12": "VSFTPD 2.3.4 笑脸漏洞",
"https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650603615&idx=3&sn=445a8a9089db3200dfb6c7fcbbe83e1b": "某系统因属性污染导致的RCE漏洞分析",
"https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486126&idx=1&sn=f95aeac1e9863e39388748be5f93f44f": "ViewState反序列化复现踩坑记录",
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486146&idx=1&sn=66ebbdd861f6fdcee3f8928dc63a85be": "某全新H5购物商城系统存在前台SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486054&idx=1&sn=29c2f89072a7f181739354113076ea74": "「漏洞复现」金华迪加 现场大屏互动系统 mobile.do.php 任意文件上传漏洞",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307300&idx=3&sn=c4876146dad8da82db2e3decbfc57648": "国家密码管理局发布《关键信息基础设施商用密码使用管理规定(征求意见稿)》",
"https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247502886&idx=1&sn=17c6c12516bf55bc03a700f8a47dee89": "应用程序系统中的 SQL 注入 CVE-2024-50766",
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488389&idx=2&sn=2bea1165ad80d38c1329593ca08c6e55": "【漏洞复现】九思OA dl存在任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066024&idx=4&sn=46592438737abae8701b9ba1b7160d86&chksm=f36e7ca8c419f5be0b5de8218474b566a05a2871e02c5f1b86f0a13769a0651d6087bd35a84d&scene=58&subscene=0": "【安全圈】俄罗斯黑客利用文件拖放、删除操作触发 Windows 0day 漏洞攻击乌克兰目标",
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517100&idx=1&sn=f63f4fb28dd9f98701307759287886e3": "原创 | 一文看懂服务器请求伪造漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492480&idx=2&sn=35313ec934a5220db4c34962af10b1b4": "Apache Airflow 漏洞暴露日志中的敏感数据CVE-2024-457847.5",
"https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485439&idx=1&sn=3fd7e4cef57edca8e73104f8af38fc05": "分享SRC中后台登录处站点的漏洞挖掘技巧",
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524319&idx=2&sn=7e837ef59037b7c182b95ffc6089cb20": "CVE-2024-45784Apache Airflow 漏洞暴露日志中的敏感数据",
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524319&idx=4&sn=f564c214e9b878af89b788239034bd2e": "BrazenBamboo APT利用 FortiClient 漏洞通过 DEEPDATA 窃取 VPN 凭证",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=2&sn=cf11d094cb7fc2770df2100227dc34db": "【安全圈】安全公司曝光黑客利用 Office 已知漏洞散播 Remcos RAT 木马程序",
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524319&idx=3&sn=44ca66db05ada0b23d2a24e112e09e93": "Mozilla Firefox 0-dayURL 协议处理程序泄漏 [CVE-2024-9398、CVE-2024-5690]",
"https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492733&idx=1&sn=d41a5ddfe26f0a9dfaa02fedafee911a": "JavaSecLab 一款综合Java漏洞平台",
"https://mp.weixin.qq.com/s?__biz=MzI2MTE0NTE3Mw==&mid=2651147826&idx=1&sn=82db846319ddae363d8ac74312d12f8b": "【资料】美军对我军合成作战旅的认知总结",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=3&sn=628c0be39463e5a5db076252eae42974": "【安全圈】物联网云平台 OvrC 曝一系列漏洞,黑客可远程执行恶意代码",
"https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260164&idx=1&sn=dee2d2d3315798ae2ee404f11f452d9f": "如何将低危的 SSRF 盲注升级为严重漏洞",
"https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247489038&idx=1&sn=38d1bc56bfc8d56f1a6522b3081164f1": "记一次某SRC的漏洞挖掘过程|挖洞技巧",
"https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247504511&idx=2&sn=02a617bd236ecf22b9f4b7d6b25c7f9a": "严重的身份验证绕过漏洞影响 400 万个网站",
"https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492738&idx=1&sn=e1471dab8f567dbf0f4e83c999b1527b": "masscan全端口扫描==>httpx探测WEB服务==>nuclei&xray漏洞扫描 | 解放双手",
"https://mp.weixin.qq.com/s?__biz=MzkxMzIwNTY1OA==&mid=2247509142&idx=1&sn=7a9bf881915c113f53359c76b2c10c49": "密码破解的尽头是 “哥 ,来根……”",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491444&idx=1&sn=14608727477b5a267d3f75284547dcc7": "漏洞预警 | RabbitMQ权限验证绕过漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491444&idx=2&sn=871000243b3a84ba1157944f0f8fdbee": "漏洞预警 | 宏景HCM任意文件上传漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491444&idx=3&sn=2d1c03adab2dcae92301e0c62550c2c9": "漏洞预警 | 蓝凌OA SSRF漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247509326&idx=1&sn=570638ea0ce6a3b289d77d2247e5d57c": "BrazenBamboo APT 利用 FortiClient 零日漏洞窃取用户凭证 |China APT",
"https://mp.weixin.qq.com/s?__biz=MzkxMTUwOTY1MA==&mid=2247489498&idx=1&sn=49ceb0446f31d62653ef7dd2505388c0": "[渗透工具]XXL-JOB漏洞利用工具",
"https://mp.weixin.qq.com/s?__biz=MzkxMTUwOTY1MA==&mid=2247489498&idx=2&sn=433215d4f66547bb871b6d516c154124": "【必刷靶场】JavaSecLab-Java漏洞平台",
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488410&idx=1&sn=00d2155ead01651c376774f463157bf3": "【未公开】某公司SRM智联云采系统inquiry存在SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=2&sn=cf11d094cb7fc2770df2100227dc34db&chksm=f36e7cb8c419f5ae9268e1d2eb9675ef94bccbcfe66627cb209b0883944215f205a8d17b7028&scene=58&subscene=0": "【安全圈】安全公司曝光黑客利用 Office 已知漏洞散播 Remcos RAT 木马程序",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=3&sn=628c0be39463e5a5db076252eae42974&chksm=f36e7cb8c419f5ae9694e18d60dde2a26e6a3cdec1633acf1fe266e96be9e59868eaad6f37a5&scene=58&subscene=0": "【安全圈】物联网云平台 OvrC 曝一系列漏洞,黑客可远程执行恶意代码",
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486157&idx=1&sn=0eb5b289e5d313ff2f2ad3df252a5d5f": "某全新H5购物商城系统存在前台任意文件上传漏洞(RCE)",
"https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492765&idx=1&sn=e18518b6eba34c7864e6d957cd37ff5f": "僵尸网络利用GeoVision零日漏洞入侵已停产设备",
"https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492765&idx=2&sn=e224f07a4c556302ed2013bcdf25a5f1": "Palo Alto Networks确认近期披露的零日漏洞正在被积极利用",
"https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492765&idx=3&sn=01d577e47672144123dfd3940c1da101": "NSO 集团在 Meta 所有公司起诉后仍然使用 WhatsApp 漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkxNDAyNTY2NA==&mid=2247519321&idx=2&sn=dc8716f9fcab81c2277f69ca05988f6b": "工具 | 集成高危漏洞exp的实用性渗透工具",
"https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499683&idx=1&sn=23b5001cd5e4272d908cf85c0d71263d": "一键检测 17 个蓝凌 OA 历史漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247489220&idx=1&sn=e2a2c434a0097ee0fb4fb89b17b1fc15": "ArcGIS 地理信息系统 任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzMDQ0NzQwNA==&mid=2247485612&idx=1&sn=b87343f522578525738b25e651a30307": "CVE-2016-2183 windows漏洞修复指南",
"https://mp.weixin.qq.com/s?__biz=MzIxNTIzNTExMQ==&mid=2247490413&idx=1&sn=6ca7f49ea787ea876726f5c8f4be6c46": "ViewState反序列化复现踩坑记录",
"https://mp.weixin.qq.com/s?__biz=Mzk0MDQzNzY5NQ==&mid=2247493031&idx=1&sn=21ad65e6ba6fa690057bf1b717d89cab": "【OSCP-Medium】adria",
"https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484315&idx=1&sn=f4aa02a7e95ecbc0b1052e97591654d0": "【漏洞复现】英飞达医学影像存档与通信系统webservices接口存在信息泄露漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517121&idx=1&sn=d93187139204f6dd92101f34c4cb0981": "aiohttp路径遍历漏洞分析(XCE-2024-1472)",
"https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507405&idx=1&sn=724c4f04b89e17186e10643a70168151": "速修宝兰德BES中间件远程代码执行漏洞",
"https://mp.weixin.qq.com/s?__biz=Mzg2MDg0ODg1NQ==&mid=2247534105&idx=2&sn=b8ad0236e78d31c7e936fa98d5b2f0db": "打补丁要快0Day漏洞正在被黑客广泛利用",
"https://mp.weixin.qq.com/s?__biz=MzkyNDUxNTQ2Mw==&mid=2247485556&idx=1&sn=eaa0ff13c10fad4d5418731121ca9ca2": "安全公司曝光黑客利用 Office 已知漏洞散播 Remcos RAT 木马程序",
"https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484440&idx=1&sn=f7f42cf480466e7eb9a5349ff68579a9": "大华智慧园区综合管理平台hasSubsystem接口处存在文件上传漏洞【漏洞复现|附nuclei-POC】",
"https://mp.weixin.qq.com/s/-BgJHt-dDT-u28TM90Mz8w": "Linux 反弹shell",
"https://mp.weixin.qq.com/s/1CKfcUXNkkVjEPiXFxSqHw": "vulnhub之Escalate的实践",
"https://mp.weixin.qq.com/s/vzUt1EO-EnR5ywMz2PjQuQ": "通达OA前台任意用户登录漏洞复现",
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=1&sn=368d74c4f6e7a4f2639d84ec46bf77c7": "CNVD漏洞周报2024年第46期",
"https://mp.weixin.qq.com/s?__biz=MzIwOTc4MTE4Nw==&mid=2247500623&idx=1&sn=8ed503a44a8900cf66d4714383856900": "鼎信安全 | 网络安全一周资讯",
"https://mp.weixin.qq.com/s?__biz=MzI5MzU4ODE5Mw==&mid=2247485533&idx=1&sn=38dacc8d7d5dbb5e91a43eaccbd37140": "【漏洞预警】东胜物流软件-certupload-任意文件上传漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486063&idx=1&sn=87764d2ed6eef32705e262f8515eda5b": "「漏洞复现」九思OA dl.jsp 任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545196&idx=1&sn=e5148186ab9f420c71d23cdca8da92f7": "Edusrc | 某证书站漏洞挖掘-绕过验证机制",
"https://mp.weixin.qq.com/s?__biz=Mzg3ODkzNjU4NA==&mid=2247485564&idx=1&sn=f6351c3df7a5ddd3f073a0a0e52ff363": "2024年20 大网络钓鱼工具",
"https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650603664&idx=4&sn=ad840681e2c7bc6414397ec84b0c5741": "一款集成高危漏洞exp的实用性工具",
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485716&idx=1&sn=e8a0ad47c5069485e9f60071d1e43025": "【漏洞复现】某平台-down-sql注入漏洞",
"https://mp.weixin.qq.com/s?__biz=Mzk0MzI2NzQ5MA==&mid=2247486685&idx=1&sn=d196cb28fb4aaa74c58a8614abf54875": "通达OA前台任意用户登录漏洞复现",
"https://mp.weixin.qq.com/s?__biz=MzU1OTUxNTI1NA==&mid=2247591507&idx=1&sn=4613e1c63793b9eee694aa3d5296ab43": "中国信通院胡坚波:以链式转型加快推进中小企业数字化赋能",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307356&idx=1&sn=42438d895a7baec5b6656688cca7431d": "Palo Alto Networks确认0Day漏洞正在被黑客利用",
"https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247540683&idx=1&sn=986bdc0a543ecda7828e984aa6189af2": "物联网云平台 OvrC 曝一系列漏洞,黑客可远程执行恶意代码",
"https://mp.weixin.qq.com/s?__biz=MzI3NzA5NDc0MA==&mid=2649291855&idx=1&sn=2416adb9a530214ddc5b1cf128c156f8": "安全卫士 | 魔方安全漏洞周报",
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502439&idx=1&sn=89c13a88c1429733d4d3372418dda64d": "安全热点周报:俄罗斯黑客利用 Windows 零日漏洞乌克兰实体进行持续攻击",
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458583194&idx=1&sn=f14c98ad2f40cba90ed7a487cb12384e": "“看雪漏洞小组”集结!组团挖洞,一起冲击华为漏洞更高奖励",
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458583194&idx=3&sn=045ec214a07d23eaaaf909f9ee0f186f": "WordPress安全插件“Really Simple Security”惊现严重漏洞数百万网站面临风险",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487501&idx=1&sn=39d247b0248d6134a3936531fc0ee647": "【漏洞预警】东胜物流软件-certupload-任意文件上传漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=1&sn=b60ee79ea2fbcfeaae560373faa7a2cf": "12年来最严重的 WordPress 漏洞,可大规模接管管理员权限",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=2&sn=667b6f9c61b6f2d2077659cd4d4cdc70": "僵尸网络利用 GeoVision 0day 安装 Mirai 恶意软件",
"https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247567418&idx=2&sn=19577506ffdc9228b4214d195638595a": "有关漏洞挖掘的一些总结",
"https://mp.weixin.qq.com/s?__biz=MzkzNzY5OTg2Ng==&mid=2247500244&idx=2&sn=2c043ef6f5f2a73220f5442c0a23ba95": "【漏洞通告】Apache OFBiz远程代码执行漏洞CVE-2024-47208",
"https://mp.weixin.qq.com/s?__biz=MjM5MTAwNzUzNQ==&mid=2650510921&idx=1&sn=e4934351ec2c8cb6dbc0aeca15104b40": "倒计时2天“智效融合安全护航”·深圳站 第七期「度安讲」 技术沙龙开放报名",
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492528&idx=2&sn=12ed7293c2d58a8ff8af2eee52151e30": "【poc】Fortinet FortiManager 中0day CVE-2024-47575 的 PoC 发布",
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492528&idx=3&sn=ca32f8d2a6f6e69a0d8f6cb1c3cc86ed": "【poc】TP-Link 中的 DHCP 漏洞可让攻击者远程接管路由器 - PoC 发布",
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=2&sn=4f47a0a0b8cf7c2347c48af444867c9c": "上周关注度较高的产品安全漏洞(20241111-20241117)",
"https://mp.weixin.qq.com/s?__biz=Mzg4MzU3MTcwNg==&mid=2247486025&idx=1&sn=57b3564d52b3979909e7c4ce558cb424": "简单逻辑漏洞学习",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489173&idx=1&sn=38cddcc7195393081437dda1b20e81f5": "【漏洞预警】Apache OFBiz远程代码执行漏洞CVE-2024-47208",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489173&idx=2&sn=8b54bc7f5eac3e68aa9c1b50d0bfe0f0": "【漏洞预警】Apache HertzBeat < 1.6.1 消息通知模版注入漏洞CVE-2024-41151",
"https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247632327&idx=4&sn=48bfb50af682460d968c919e508846b6": "Palo Alto Networks确认0Day漏洞正在被黑客利用",
"https://mp.weixin.qq.com/s?__biz=Mzg4MDY1MzUzNw==&mid=2247497926&idx=1&sn=26eb4132f92f9aed012a93735a6b3879": "fastjson < 1.2.66 正则表达式拒绝服务漏洞REDOS",
"https://mp.weixin.qq.com/s?__biz=MzkxNTc1MzQyNw==&mid=2247488223&idx=1&sn=179f23ace36083dd36a1f5052b4c6018": "红日靶场WHOAMI Penetration",
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524352&idx=2&sn=840f79721a30962446402beb9e179f45": "Redis CVE-2024-31449如何重现和缓解漏洞",
"https://mp.weixin.qq.com/s?__biz=MzAxNTYwOTU1Mw==&mid=2650092449&idx=1&sn=ccafc6e2e300c5176b01f01455f66820": "远程代码执行风险威胁用户安全Zoom紧急修复多个安全漏洞颠覆传统安全架构Zscaler创新发布新型零信任分段方案 | 牛览",
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517127&idx=1&sn=61549ef4ef11bf847690be40502fd256": "紧急:关键 WordPress 插件漏洞暴露了超过 400 万个网站",
"https://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&mid=2649787425&idx=1&sn=6f9cdcc47fe2971c8f27491559a54cb3": "WordPress安全警报400万网站面临严重认证绕过漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwODM3NjIxOQ==&mid=2247502147&idx=1&sn=6d2c1227899943ee29dc7f1a17b1cf53": "12年来最严重的 WordPress 漏洞,可大规模接管管理员权限",
"https://mp.weixin.qq.com/s?__biz=MzUzNjkxODE5MA==&mid=2247487438&idx=1&sn=57b059b3e23609293878846b57fd3d2d": "网络安全认知科普(五):业务本身也可能就是漏洞,就是风险",
"https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485505&idx=1&sn=13147a3d93fed1ed458e589239c7dc56": "EDUSRC漏洞挖掘技巧汇总+信息收集各种姿势",
"https://mp.weixin.qq.com/s?__biz=Mzg4MDYwNDc5Nw==&mid=2247486363&idx=1&sn=85f3185c117796238c0285ce1443bbea": "Water Barghest组织利用IoT设备漏洞迅速变现的策略",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491445&idx=1&sn=3b3bf547593b9c83bd8067fa2f85da0b": "漏洞预警 | Laravel环境变量注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491445&idx=2&sn=ba14df01b2e491cc6546173a72e6c2dc": "漏洞预警 | D-Link NAS设备远程代码执行漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491445&idx=3&sn=9a49aa4947b71d328766002dc7f115d0": "漏洞预警 | 海信智能公交企业管理系统SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzODY2ODA0OA==&mid=2247485900&idx=1&sn=4a1c0f14751627a29534c3c7f13a1354": "【未公开】百择唯供应链存在RankingGoodsList2 SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488426&idx=1&sn=8ca95cf35ca24bc8ba0c40172f5dacb5": "【0day 漏洞预警】某统一通信平台存在任意文件上传漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499683&idx=1&sn=23b5001cd5e4272d908cf85c0d71263d&chksm=ec1dcf8bdb6a469da30be3bb9de87a5e11415411c58b37eb85060e943ea7b097ccecc2f9f16e&scene=58&subscene=0": "一键检测 17 个蓝凌 OA 历史漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=1&sn=368d74c4f6e7a4f2639d84ec46bf77c7&chksm=fd74df9bca03568d70f915369a15335bfc87733f37f2443259f039b6d3f497061fb698fe7a2b&scene=58&subscene=0": "CNVD漏洞周报2024年第46期",
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=2&sn=4f47a0a0b8cf7c2347c48af444867c9c&chksm=fd74df9bca03568d4907affed4138435656b4dbb7b298e4dea297fd24796880708c0ffec6763&scene=58&subscene=0": "上周关注度较高的产品安全漏洞(20241111-20241117)",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=1&sn=b60ee79ea2fbcfeaae560373faa7a2cf&chksm=ea94a583dde32c95779d3ac2afec31953b99e514551aec14bfc515de9ced953efb77c5563092&scene=58&subscene=0": "12年来最严重的 WordPress 漏洞,可大规模接管管理员权限",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=2&sn=667b6f9c61b6f2d2077659cd4d4cdc70&chksm=ea94a583dde32c95f18dabad1da69d1c1444aebf79a867a8ada6e4d24e51a03b28c8eb27076a&scene=58&subscene=0": "僵尸网络利用 GeoVision 0day 安装 Mirai 恶意软件",
"https://mp.weixin.qq.com/s?__biz=MzA5OTI3MTE5MQ==&mid=2247485409&idx=1&sn=17c225d46e6c41ea0b6cf9459af70bee": "【Exp】- CVE-2024-10924 WordPress插件Really Simple Security认证绕过漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502450&idx=1&sn=a1fc8665dfbb9c1703fef3c40ff25310": "【在野利用】Palo Alto Networks PAN-OS 身份认证绕过漏洞(CVE-2024-0012)安全风险通告",
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492559&idx=3&sn=bd55e8894a88011691ba63e3f45929e2": "Apache Kafka 漏洞将用户数据暴露给潜在攻击者",
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492559&idx=4&sn=fc31cfbd66ffb7b1e4867fca91821f2e": "VMware 漏洞CVE-2024-38812 和 CVE-2024-38813被广泛利用",
"https://mp.weixin.qq.com/s?__biz=Mzg5OTg5NzkwNw==&mid=2247485563&idx=1&sn=6403f9b8b5403d8a7a696a8e0e17a046": "CVE-2024-45216 Authentication bypass in Apache Solr",
"https://mp.weixin.qq.com/s?__biz=MzkzMjE5MTY5NQ==&mid=2247502473&idx=3&sn=fc0115150597e30c84b5c8ecb1d968ba": "Palo Alto警告防火墙管理界面RCE漏洞被攻击者利用",
"https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247489264&idx=1&sn=2375259ae986fae83ca35293b7b7dc21": "易思智能物流无人值守系统 PhoneLogin SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485720&idx=1&sn=3bd82b6a8f0001ce306efba3c499f6bf": "【漏洞复现】某平台-Sc-TaskMonitoring-search-sql注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247496762&idx=1&sn=835c3bf727a87fe1aad3ea5806d22f61": "【漏洞通告】Apache OFBiz多个远程代码执行漏洞安全风险通告",
"https://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655348005&idx=1&sn=4c930728fafc77e04d44557a763f493e": "Palo Alto警告防火墙管理界面RCE漏洞被攻击者利用",
"https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491091&idx=1&sn=d0c7ebe7f059cc62b3719c8bfb99d69d": "记录日常挖掘漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU3Mjk2NDU2Nw==&mid=2247492453&idx=1&sn=4edaf9b04b271a1782f16bcf085d3e2c": "黑盒乱锤某专属SRC到0day代码分析",
"https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484473&idx=1&sn=6a7b9607e939dfc9b833e01adfc8571f": "灵当CRM系统multipleUpload.php接口处存在文件上传漏洞【漏洞复现|附nuclei-POC】",
"https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507405&idx=1&sn=724c4f04b89e17186e10643a70168151&chksm=cfcabed9f8bd37cf08699147911e05b802a7367ecb0fd5122c5c60647403f1c7ad261c992be5&scene=58&subscene=0": "速修宝兰德BES中间件远程代码执行漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkxODI4NDg3Nw==&mid=2247484718&idx=1&sn=8502b1cb852caa8ce0e23e3847b944b6": "Cuppa CMS-任意文件读取CVE-2022-25401",
"https://mp.weixin.qq.com/s?__biz=Mzk0NTY5Nzc1OA==&mid=2247484111&idx=1&sn=1d68bc0bb4221a6de04c1b1dc818eafa": "一文读懂SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkzNzY5OTg2Ng==&mid=2247500250&idx=2&sn=23d9e2dfb43ea4293d20489c3cbccb9e": "【漏洞通告】Palo Alto Networks PAN-OS身份验证绕过漏洞CVE-2024-0012",
"https://mp.weixin.qq.com/s?__biz=MzIwNDk0MDgxMw==&mid=2247499470&idx=2&sn=d9bbe418f8309153c86b2c38bdb82f17": "上周关注度较高的产品安全漏洞(20241111-20241117)",
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486183&idx=1&sn=b38113b15e2fada33cf26c95c9c07714": "【0day】某微信万能门店小程序系统存在任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=Mzg4MzE1MTQzNw==&mid=2247491024&idx=1&sn=00be4948643b40e24a2b0cca5c99edfc": "专题解读 | 图基础模型最新研究进展",
"https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614168&idx=1&sn=ca9f354a96fac70ba3dfb1e6840380db": "Bypass Cloudflare实现账户接管密码重置投毒漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793181&idx=1&sn=bcfe157d05c93fa6fc18591227dae4da": "DeepData 恶意软件框架被发现利用尚未修补的 Windows 0day漏洞、Fortinet VPN 客户端",
"https://mp.weixin.qq.com/s?__biz=Mzg2ODg3NzExNw==&mid=2247488361&idx=1&sn=e560e27ced52b442b1d41ac709a876ff": "黑盒乱锤某专属SRC到0day代码分析",
"https://mp.weixin.qq.com/s?__biz=MzkzNjIzMjM5Ng==&mid=2247489988&idx=1&sn=86427522d5972cadf175076db1b99d71": "防火墙管理界面RCE漏洞被攻击者利用Palo Alto发出警告",
"https://mp.weixin.qq.com/s?__biz=MzkxMzczNTA4MQ==&mid=2247483895&idx=1&sn=3da0b8ac30f8d6f1da127c9216651fe0": "一个很强的漏洞库",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307419&idx=1&sn=99e73003e60b59000267419ee4068108": "美国饮用水系统存在300多个漏洞影响1.1亿人",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307419&idx=2&sn=1ccab95bd62ccdb6da0bf494f77e858d": "VMware vCenter Server远程代码执行漏洞正被黑客广泛利用",
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524360&idx=2&sn=b5804cee2025c7d7c53030217988d02b": "JavaScriptDrive-By无需0day攻击",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066082&idx=3&sn=45c8dff3a066a1615c872523d972e645": "【安全圈】美国饮用水系统存在300多个漏洞影响1.1亿人",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066082&idx=4&sn=c7244d3c2cda936e8c968cf0a2ade6d0": "【安全圈】VMware vCenter Server远程代码执行漏洞正被黑客广泛利用",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521523&idx=1&sn=286f99df03f25ebd1cb1fb497f991b21": "补丁不给力VMware vCenter 严重RCE漏洞遭利用",
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458583218&idx=1&sn=f5b184e32e1592dc41e78b9934e7c670": "SDC2024 议题回顾 | ExpAttack:大语言模型越狱风险持续追踪框架",
"https://mp.weixin.qq.com/s?__biz=MzI4NDY2MDMwMw==&mid=2247513105&idx=1&sn=db4c2c400bfc1b8ac9c2e39ffcc2d0f8": "美全国水务系统存在大量漏洞,可致使上亿人供水中断",
"https://mp.weixin.qq.com/s?__biz=MzU3OTAyODk4MQ==&mid=2247490987&idx=1&sn=aa4712f028a5b83328bf471fc49512b2": "顺丰安全漏洞评分规则更新公告",
"https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515427&idx=1&sn=fb8b05f7d8f4fef283c82153244d0dca": "【漏洞复现】D-Link NAS设备 sc_mgr.cgi 未授权RCE漏洞复现",
"https://mp.weixin.qq.com/s?__biz=MjM5NjY2MTIzMw==&mid=2650619819&idx=2&sn=e0594a7fbc40c3e7038dfb867b72a41b": "高危Laravel参数注入漏洞安全风险通告",
"https://mp.weixin.qq.com/s?__biz=MzkzNDUxOTk2Mw==&mid=2247495150&idx=1&sn=7dbdf94f68382feb66892595971d54dc": "【论文速读】| 通过良性数据镜像对大语言模型进行隐蔽越狱攻击",
"https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523853&idx=1&sn=09a7e2c49e4d18c988053c13b775aa17": "【漏洞通告】Palo Alto Networks PAN-OS 身份验证绕过漏洞(CVE-2024-0012)",
"https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523853&idx=2&sn=44f939a81178afad27dca90a02dfbfc6": "【漏洞通告】Apache OFBiz远程代码执行漏洞(CVE-2024-47208)",
"https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523853&idx=3&sn=fab3ee466334a0022b2df23ab6a23217": "上周关注度较高的产品安全漏洞(20241111-20241117)",
"https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247490175&idx=1&sn=8a88f13080b38ee937638a6ab1a1a319": "【风险通告】Palo Alto Networks PAN-OS存在身份验证绕过漏洞CVE-2024-0012",
"https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507416&idx=1&sn=6eb8217321fbe1a5361675058bc55882": "已知漏洞!宝兰德最新漏洞绕过补丁黑名单,速修",
"https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247498607&idx=2&sn=2e4002dc2db4869990ee4fa3d38f1f43": "渗透测试 -- 漏洞百解",
"https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247632338&idx=3&sn=287c0b4f0cfbdbc1d11e7f8b67787249": "美国饮用水系统存在300多个漏洞影响1.1亿人",
"https://mp.weixin.qq.com/s?__biz=MzUzMDUxNTE1Mw==&mid=2247508728&idx=1&sn=50e200ae59cd278b496fa675d916a377": "微软2024年11月补丁日重点漏洞安全预警",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489184&idx=1&sn=04ec9cf838fb1a5cf5cc4c8c93a8bf30": "【漏洞预警】Apache Kafka Clients权限管理不当漏洞可致信息泄露",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489184&idx=2&sn=6674f470ab506ed8239b4103f4d11218": "【漏洞预警】Palo Alto Networks PAN-OS Web管理界面身份验证缺陷漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489184&idx=3&sn=22ce05bbdff66ec1bf477e37c429c327": "【漏洞预警】Apache Tomcat资源控制不当漏洞",
"https://mp.weixin.qq.com/s?__biz=Mzg4NzgyODEzNQ==&mid=2247488403&idx=3&sn=9914510e560c5eec5ad6282278ab6577": "「人脑替代计划-6」LLM是什么",
"https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517233&idx=1&sn=af475bf0f3de0493fd24dcdc37463e5a": "漏洞挖掘|电子商城类漏洞挖掘案例灵感复现",
"https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486072&idx=1&sn=7558c8a2becda935fa6b7237363f864e": "「漏洞复现」D-Link NAS设备 sc_mgr.cgi 未授权漏洞",
"https://mp.weixin.qq.com/s?__biz=Mzg2Mjc3NTMxOA==&mid=2247515356&idx=1&sn=202c8573e3a77824edf45e865b30e051": "漏洞预警Apache OFBiz远程代码执行漏洞(CVE-2024-47208)",
"https://mp.weixin.qq.com/s?__biz=Mzg2Mjc3NTMxOA==&mid=2247515356&idx=2&sn=d677b50ea4f958d207cd6a3c772fe0b8": "漏洞预警Palo Alto Networks PAN-OSS身份验证绕过等多个漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIwMzI1MDg2Mg==&mid=2649945063&idx=1&sn=e933d8e9d2243641c8f007c652caad48": "YAK 亮相2024年世界互联网大会携手中国联通共塑网络安全新生态",
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307419&idx=3&sn=9f3e2546a68551118a2b2bc765b70ab3": "关键的WordPress插件漏洞导致超400万网站暴露",
"https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484334&idx=1&sn=bfd4f94e969ee9f8e7ec653c0feae32a": "【漏洞复现】D-Link NAS 远程命令执行漏洞(CVE-2024-3273)"
}