mirror of
https://github.com/gelusus/wxvl.git
synced 2025-07-29 22:14:41 +00:00
224 lines
40 KiB
JSON
224 lines
40 KiB
JSON
{
|
||
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247513636&idx=1&sn=66bc5f0cac446268cb859e38faa2b841": "四个关键漏洞使 HPE Aruba 设备面临 RCE 攻击",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIxMjEzMDkyMA==&mid=2247486384&idx=1&sn=6cded6c301c425146633b7c8e92b9ae2": "用友crm客户关系管理pub∕downloadfile.php接口存在任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247490163&idx=1&sn=0af69d90d567c84ea23336cde986f7a8": "代码审计-某产品高清智能录播系统漏洞分析附未公开POC",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247488062&idx=1&sn=5e3f1e901718ee760c9271676d075758": "【漏洞预警】Apache ActiveMQ Jolokia 和 REST API 未授权访问漏洞CVE-2024-32114",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458553432&idx=1&sn=93377c71147ef00b8e58571093d5ab55": "CVE-2023-4427:ReduceJSLoadPropertyWithEnumeratedKey 中的越界访问",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4OTkwMDc1Mg==&mid=2247484729&idx=1&sn=b2920455891f256e016b74122977490b": "YzmCMS pay_callback.html RCE漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=2&sn=44579672e179f0268bd6daac499832e2": "【漏洞复现】CVE-2024-1512",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=1&sn=5a1e8635a4c0a68a5c58662d47a08f36": "【漏洞复现】CVE-2024-1698",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2OTYzNTExNQ==&mid=2247484965&idx=1&sn=396cceb9cd98393868c20c1876aa8957": "[漏洞复现] CVE-2024-33786 中城科信票务管理平台 任意文件上传",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649791059&idx=1&sn=82bf570f4c7002b524bb4eacc1f7fb0d": "俄罗斯 APT28 利用 Microsoft Outlook 漏洞攻击捷克、德国实体",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4&chksm=e8a5e114dfd268025b28a508644eff19bd5ccf522b270bc7a6e545a340e65e4eb88e83aef43e&scene=58&subscene=0": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494678&idx=1&sn=4cdffd80c296f3df40b773da5943d796": "两个Google Vertex AI平台漏洞曝光:可能导致权限提升与敏感数据外泄",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0NjQ5MTM1MA==&mid=2247492614&idx=1&sn=40f082284e0b14fd77c82d95bbeb9185": "用友漏洞一键探测利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=1&sn=4a47b98c0b29cd4d3e7c4f30685e1247": "【漏洞预警】 用友BIP 数据库配置信息泄露",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=2&sn=adb385b0fccd4af9d9ad9d439bce5640": "【漏洞预警】D-Link-DNS 多款产品未公开接口∕sc_mgr.cgi 存在远程命令执行漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=3&sn=1cdbe6f7a8137e5e2626d4e358c1ef93": "【漏洞预警】 易宝OA-GetProductInv SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=4&sn=e2d16220eb00621420899460b1a95941": "【漏洞预警】易思智能物流无人值守系统SQL注入",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA4NzUwMzc3NQ==&mid=2247496792&idx=1&sn=561979247dfc36401fe9815413c3f88a": "CVE-2024-25600:WordPress Bricks Builder RCE",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652065974&idx=1&sn=d6789e893634a0f2fb9c34b2bfb0a8f9": "【安全圈】打补丁要快!0Day漏洞正在被黑客广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab": "2024年网络安全漏洞研究人才培养交流活动成功举办",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0": "CNNVD ∣ 关于微软多个安全漏洞的通报",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486145&idx=1&sn=06229e2205d5dd9e99716999b4f1aa2e": "LLM大模型安全(4)- 供应链漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyMzI2NzIyMw==&mid=2247488304&idx=1&sn=c0db143fcd6865fdd3482b955dd94abd": "BlockSec和OKX Explorer达成合作,携手提升链上数据安全与合规等级",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI0NjE1NDYyOA==&mid=2247484677&idx=1&sn=bb89036b82c59a0e1e8b06227a9e9768": "【漏洞分享】edu通杀 新中小学智慧校园信息管理系统 Upload 任意文件上传",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485712&idx=1&sn=e15d7dda1a02527db2c340f56df4f3ea": "【漏洞复现】某平台-testdb-info-leak信息泄露漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99": "远程代码执行风险威胁用户安全,Zoom紧急修复多个安全漏洞;颠覆传统安全架构,Zscaler创新发布新型零信任分段方案 ∣ 牛览",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99&chksm=bd15a51f8a622c096ef4441d0b5acb3ee39ef865e5650f4df483a8648b528a3509fe57972cd1&scene=58&subscene=0": "远程代码执行风险威胁用户安全,Zoom紧急修复多个安全漏洞;颠覆传统安全架构,Zscaler创新发布新型零信任分段方案 ∣ 牛览",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502432&idx=1&sn=d3405bf69adda60e3be13962d038b6aa&chksm=fe79eef8c90e67eead814333282edff4d7e247d6ba9e9ba1895fff6354e808e4fa84048a0cd1&scene=58&subscene=0": "【已复现】Fortinet FortiManager 身份认证绕过漏洞(CVE-2024-47575)安全风险通告第二次更新",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab&chksm=8b59e9cbbc2e60dd8d6dc37797f6608494298f22b5250c7326cf864063e039f776f4d7dc0847&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0&chksm=8b59e9cbbc2e60dda8a2633578ff2e76d88a3a00e52dba1a54ee0b2b9f554066431871d24cd8&scene=58&subscene=0": "CNNVD ∣ 关于微软多个安全漏洞的通报",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4NTY0MDg1Mg==&mid=2247485595&idx=1&sn=b4c87d04e1659f11fad8f2f125985751&chksm=cfa49360f8d31a76e5d3880e51cd8f9b0ab1df47e86729adf04ea6d1f1202fac72fae5903fbe&scene=58&subscene=0": "大语言语言模型安全攻击以及AI供应链漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521498&idx=1&sn=f0af27f6b0e814c92846ea129bcee155&chksm=ea94a5b0dde32ca62dddf91f42a9fa2b36402ffb856469973f83a6a88e24d6910dcc53072ef4&scene=58&subscene=0": "PostgreSQL 高危漏洞可导致环境变量被利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651388483&idx=1&sn=070fb6976ee52108d263858115ea9bfd&chksm=8d398bcbba4e02ddbe0183f79c2682bbf1cab54e4ba6bb0697fdc56e297e7303aa9eb938b9e6&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
|
||
"https://mp.weixin.qq.com/s/O2Ohp_ceYrTo8hppX09fkw": "(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s/tbEXIAPT-Vumch-WyoGZHQ": "代码审计-某oa任意文件读取(1day)",
|
||
"https://mp.weixin.qq.com/s/73CXvF4ejvgS40OetzXr8A": "(0day)全新优客API接口管理系统代码审计",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4NTg5MDQ0OA==&mid=2247487335&idx=1&sn=c2800f225873a4a1b38711bacba10316": "AI代码审计和POC编写",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA3NTc0MTA1Mg==&mid=2664712071&idx=1&sn=98356c1f6829546d47af1e4d43f89ace": "Fckeditor编辑器漏洞汇集",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517203&idx=2&sn=3074826837ddd653a7d1ae03a600a0b4": "建了个SRC专项漏洞知识库",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487499&idx=1&sn=4ad7e59489c09ab80bee906e929b311a": "【漏洞预警】 用友BIP 数据库配置信息泄露",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487499&idx=3&sn=b3cf1540ab72404aab438e963c5e761d": "【漏洞预警】 易宝OA-GetProductInv SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492449&idx=2&sn=ded00a05c99093340d9c413be00b1a5a": "PostgreSQL数据库存在高危漏洞CVE-2024-10979(8.8)",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247523915&idx=1&sn=0522e35aa0afa2167e0dfd9d5a6954d7": "CVE-2024-28888:福昕阅读器中使用释放后导致远程代码执行",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486133&idx=1&sn=a795a853e80c985de5fceca4309365ce": "(0day)某全新UI自助打印微信小程序系统SQL+RCE漏洞代码审计",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545126&idx=1&sn=b2f2e3d1dba89c587651768a66070b2d": "攻防演练 | 一次近源渗透",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492730&idx=1&sn=4830f7a0e4dfa7e50b8fb0ccc7e0e0b9": "一款java漏洞集合工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307299&idx=1&sn=467809755fdcc647cdde9f67ad9a27a2": "打补丁要快!0Day漏洞正在被黑客广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307299&idx=4&sn=faa8ef20c4f618771d92d2e34863625b": "Velociraptor:一款终端节点可视化与数据收集工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793147&idx=3&sn=c17de8d66d7e37e8209eab45ef7f5654": "Palo Alto Networks 确认存在新的防火墙0day漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650603612&idx=4&sn=1ca7d7d27c71f41ef3992ddac7cda038": "Vcenter图形化漏洞利用工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247488171&idx=1&sn=dbbce680730d50271fcb4e886e029f36": "VulToolsKit一把梭漏洞Exploit合集",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491421&idx=1&sn=653b49f157760ea962f45f3e9471858c": "漏洞预警 | Apache ZooKeeper身份验证绕过漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491421&idx=2&sn=89f3fc90da6871059bb0ea398e1ffb26": "漏洞预警 | XStream栈溢出漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491421&idx=3&sn=eabce5e15b6befff94c2407acd4a5aa9": "漏洞预警 | HPE Aruba Networking Access Points命令注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488371&idx=2&sn=3ad1f97fe2651cfd09c4aa8767ee6a6d": "【漏洞复现】用友YonBIP高级版存在任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486789&idx=1&sn=9e271a3346eed986ecc5b7a4aece7f88": "compiler explorer 轻松从汇编角度理解代码",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247486789&idx=2&sn=f8617e893d02f1eaca70fb0f9661a3e3": "网太CMS漏洞复现",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247497601&idx=1&sn=1b31fff83d5276667f7ead2ae5de2a6b": "微软2024年11月份于周二补丁日针对90漏洞发布安全补丁",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247497601&idx=2&sn=413b3330c9fde967c520582aefbd4bd6": "2023年最易被利用的漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAwMDQwNTE5MA==&mid=2650247657&idx=1&sn=b0600f03ef9bbffbcaa4fbf1fe0d87f7": "CVE-2024-25600:WordPress Bricks Builder RCE",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0MzI2NzQ5MA==&mid=2247486636&idx=1&sn=5d9cfbe6b8393b15c60b04ca9c2c9588": "phpstudy_2016-2018_rce 漏洞复现",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487499&idx=4&sn=69d6613ba3812956a0388203252d7a8f": "【漏洞预警】易思智能物流无人值守系统SQL注入",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNzUxMjU5OQ==&mid=2247484847&idx=1&sn=ab525f7b54b1842379879fcb44279dfe": "记录日常挖掘漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066024&idx=4&sn=46592438737abae8701b9ba1b7160d86": "【安全圈】俄罗斯黑客利用文件拖放、删除操作触发 Windows 0day 漏洞攻击乌克兰目标",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0MzI2NzQ5MA==&mid=2247486684&idx=1&sn=b88c209774a7a72edb5ffd3d8185da12": "VSFTPD 2.3.4 笑脸漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650603615&idx=3&sn=445a8a9089db3200dfb6c7fcbbe83e1b": "某系统因属性污染导致的RCE漏洞分析",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486126&idx=1&sn=f95aeac1e9863e39388748be5f93f44f": "ViewState反序列化复现踩坑记录",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486146&idx=1&sn=66ebbdd861f6fdcee3f8928dc63a85be": "某全新H5购物商城系统存在前台SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486054&idx=1&sn=29c2f89072a7f181739354113076ea74": "「漏洞复现」金华迪加 现场大屏互动系统 mobile.do.php 任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307300&idx=3&sn=c4876146dad8da82db2e3decbfc57648": "国家密码管理局发布《关键信息基础设施商用密码使用管理规定(征求意见稿)》",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247502886&idx=1&sn=17c6c12516bf55bc03a700f8a47dee89": "应用程序系统中的 SQL 注入 (CVE-2024-50766)",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488389&idx=2&sn=2bea1165ad80d38c1329593ca08c6e55": "【漏洞复现】九思OA dl存在任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066024&idx=4&sn=46592438737abae8701b9ba1b7160d86&chksm=f36e7ca8c419f5be0b5de8218474b566a05a2871e02c5f1b86f0a13769a0651d6087bd35a84d&scene=58&subscene=0": "【安全圈】俄罗斯黑客利用文件拖放、删除操作触发 Windows 0day 漏洞攻击乌克兰目标",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517100&idx=1&sn=f63f4fb28dd9f98701307759287886e3": "原创 | 一文看懂服务器请求伪造漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492480&idx=2&sn=35313ec934a5220db4c34962af10b1b4": "Apache Airflow 漏洞暴露日志中的敏感数据CVE-2024-45784(7.5)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485439&idx=1&sn=3fd7e4cef57edca8e73104f8af38fc05": "分享SRC中后台登录处站点的漏洞挖掘技巧",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524319&idx=2&sn=7e837ef59037b7c182b95ffc6089cb20": "CVE-2024-45784:Apache Airflow 漏洞暴露日志中的敏感数据",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524319&idx=4&sn=f564c214e9b878af89b788239034bd2e": "BrazenBamboo APT利用 FortiClient 漏洞通过 DEEPDATA 窃取 VPN 凭证",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=2&sn=cf11d094cb7fc2770df2100227dc34db": "【安全圈】安全公司曝光黑客利用 Office 已知漏洞散播 Remcos RAT 木马程序",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524319&idx=3&sn=44ca66db05ada0b23d2a24e112e09e93": "Mozilla Firefox 0-day:URL 协议处理程序泄漏 [CVE-2024-9398、CVE-2024-5690]",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492733&idx=1&sn=d41a5ddfe26f0a9dfaa02fedafee911a": "JavaSecLab 一款综合Java漏洞平台",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2MTE0NTE3Mw==&mid=2651147826&idx=1&sn=82db846319ddae363d8ac74312d12f8b": "【资料】美军对我军合成作战旅的认知总结",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=3&sn=628c0be39463e5a5db076252eae42974": "【安全圈】物联网云平台 OvrC 曝一系列漏洞,黑客可远程执行恶意代码",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260164&idx=1&sn=dee2d2d3315798ae2ee404f11f452d9f": "如何将低危的 SSRF 盲注升级为严重漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247489038&idx=1&sn=38d1bc56bfc8d56f1a6522b3081164f1": "记一次某SRC的漏洞挖掘过程|挖洞技巧",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247504511&idx=2&sn=02a617bd236ecf22b9f4b7d6b25c7f9a": "严重的身份验证绕过漏洞影响 400 万个网站",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247492738&idx=1&sn=e1471dab8f567dbf0f4e83c999b1527b": "masscan全端口扫描==>httpx探测WEB服务==>nuclei&xray漏洞扫描 | 解放双手",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxMzIwNTY1OA==&mid=2247509142&idx=1&sn=7a9bf881915c113f53359c76b2c10c49": "密码破解的尽头是 “哥 ,来根……”",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491444&idx=1&sn=14608727477b5a267d3f75284547dcc7": "漏洞预警 | RabbitMQ权限验证绕过漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491444&idx=2&sn=871000243b3a84ba1157944f0f8fdbee": "漏洞预警 | 宏景HCM任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491444&idx=3&sn=2d1c03adab2dcae92301e0c62550c2c9": "漏洞预警 | 蓝凌OA SSRF漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247509326&idx=1&sn=570638ea0ce6a3b289d77d2247e5d57c": "BrazenBamboo APT 利用 FortiClient 零日漏洞窃取用户凭证 |China APT",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxMTUwOTY1MA==&mid=2247489498&idx=1&sn=49ceb0446f31d62653ef7dd2505388c0": "[渗透工具]XXL-JOB漏洞利用工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxMTUwOTY1MA==&mid=2247489498&idx=2&sn=433215d4f66547bb871b6d516c154124": "【必刷靶场】JavaSecLab-Java漏洞平台",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488410&idx=1&sn=00d2155ead01651c376774f463157bf3": "【未公开】某公司SRM智联云采系统inquiry存在SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=2&sn=cf11d094cb7fc2770df2100227dc34db&chksm=f36e7cb8c419f5ae9268e1d2eb9675ef94bccbcfe66627cb209b0883944215f205a8d17b7028&scene=58&subscene=0": "【安全圈】安全公司曝光黑客利用 Office 已知漏洞散播 Remcos RAT 木马程序",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066040&idx=3&sn=628c0be39463e5a5db076252eae42974&chksm=f36e7cb8c419f5ae9694e18d60dde2a26e6a3cdec1633acf1fe266e96be9e59868eaad6f37a5&scene=58&subscene=0": "【安全圈】物联网云平台 OvrC 曝一系列漏洞,黑客可远程执行恶意代码",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486157&idx=1&sn=0eb5b289e5d313ff2f2ad3df252a5d5f": "某全新H5购物商城系统存在前台任意文件上传漏洞(RCE)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492765&idx=1&sn=e18518b6eba34c7864e6d957cd37ff5f": "僵尸网络利用GeoVision零日漏洞入侵已停产设备",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492765&idx=2&sn=e224f07a4c556302ed2013bcdf25a5f1": "Palo Alto Networks确认近期披露的零日漏洞正在被积极利用",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247492765&idx=3&sn=01d577e47672144123dfd3940c1da101": "NSO 集团在 Meta 所有公司起诉后仍然使用 WhatsApp 漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNDAyNTY2NA==&mid=2247519321&idx=2&sn=dc8716f9fcab81c2277f69ca05988f6b": "工具 | 集成高危漏洞exp的实用性渗透工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499683&idx=1&sn=23b5001cd5e4272d908cf85c0d71263d": "一键检测 17 个蓝凌 OA 历史漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247489220&idx=1&sn=e2a2c434a0097ee0fb4fb89b17b1fc15": "ArcGIS 地理信息系统 任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzMDQ0NzQwNA==&mid=2247485612&idx=1&sn=b87343f522578525738b25e651a30307": "CVE-2016-2183 windows漏洞修复指南",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIxNTIzNTExMQ==&mid=2247490413&idx=1&sn=6ca7f49ea787ea876726f5c8f4be6c46": "ViewState反序列化复现踩坑记录",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0MDQzNzY5NQ==&mid=2247493031&idx=1&sn=21ad65e6ba6fa690057bf1b717d89cab": "【OSCP-Medium】adria",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484315&idx=1&sn=f4aa02a7e95ecbc0b1052e97591654d0": "【漏洞复现】英飞达医学影像存档与通信系统webservices接口存在信息泄露漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517121&idx=1&sn=d93187139204f6dd92101f34c4cb0981": "aiohttp路径遍历漏洞分析(XCE-2024-1472)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507405&idx=1&sn=724c4f04b89e17186e10643a70168151": "速修!宝兰德BES中间件远程代码执行漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2MDg0ODg1NQ==&mid=2247534105&idx=2&sn=b8ad0236e78d31c7e936fa98d5b2f0db": "打补丁要快!0Day漏洞正在被黑客广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyNDUxNTQ2Mw==&mid=2247485556&idx=1&sn=eaa0ff13c10fad4d5418731121ca9ca2": "安全公司曝光黑客利用 Office 已知漏洞散播 Remcos RAT 木马程序",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484440&idx=1&sn=f7f42cf480466e7eb9a5349ff68579a9": "大华智慧园区综合管理平台hasSubsystem接口处存在文件上传漏洞【漏洞复现|附nuclei-POC】",
|
||
"https://mp.weixin.qq.com/s/-BgJHt-dDT-u28TM90Mz8w": "Linux 反弹shell",
|
||
"https://mp.weixin.qq.com/s/1CKfcUXNkkVjEPiXFxSqHw": "vulnhub之Escalate的实践",
|
||
"https://mp.weixin.qq.com/s/vzUt1EO-EnR5ywMz2PjQuQ": "通达OA前台任意用户登录漏洞复现",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=1&sn=368d74c4f6e7a4f2639d84ec46bf77c7": "CNVD漏洞周报2024年第46期",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIwOTc4MTE4Nw==&mid=2247500623&idx=1&sn=8ed503a44a8900cf66d4714383856900": "鼎信安全 | 网络安全一周资讯",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI5MzU4ODE5Mw==&mid=2247485533&idx=1&sn=38dacc8d7d5dbb5e91a43eaccbd37140": "【漏洞预警】东胜物流软件-certupload-任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486063&idx=1&sn=87764d2ed6eef32705e262f8515eda5b": "「漏洞复现」九思OA dl.jsp 任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545196&idx=1&sn=e5148186ab9f420c71d23cdca8da92f7": "Edusrc | 某证书站漏洞挖掘-绕过验证机制",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg3ODkzNjU4NA==&mid=2247485564&idx=1&sn=f6351c3df7a5ddd3f073a0a0e52ff363": "2024年20 大网络钓鱼工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650603664&idx=4&sn=ad840681e2c7bc6414397ec84b0c5741": "一款集成高危漏洞exp的实用性工具",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485716&idx=1&sn=e8a0ad47c5069485e9f60071d1e43025": "【漏洞复现】某平台-down-sql注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0MzI2NzQ5MA==&mid=2247486685&idx=1&sn=d196cb28fb4aaa74c58a8614abf54875": "通达OA前台任意用户登录漏洞复现",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU1OTUxNTI1NA==&mid=2247591507&idx=1&sn=4613e1c63793b9eee694aa3d5296ab43": "中国信通院胡坚波:以链式转型加快推进中小企业数字化赋能",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307356&idx=1&sn=42438d895a7baec5b6656688cca7431d": "Palo Alto Networks确认0Day漏洞正在被黑客利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247540683&idx=1&sn=986bdc0a543ecda7828e984aa6189af2": "物联网云平台 OvrC 曝一系列漏洞,黑客可远程执行恶意代码",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzA5NDc0MA==&mid=2649291855&idx=1&sn=2416adb9a530214ddc5b1cf128c156f8": "安全卫士 | 魔方安全漏洞周报",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502439&idx=1&sn=89c13a88c1429733d4d3372418dda64d": "安全热点周报:俄罗斯黑客利用 Windows 零日漏洞乌克兰实体进行持续攻击",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458583194&idx=1&sn=f14c98ad2f40cba90ed7a487cb12384e": "“看雪漏洞小组”集结!组团挖洞,一起冲击华为漏洞更高奖励",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458583194&idx=3&sn=045ec214a07d23eaaaf909f9ee0f186f": "WordPress安全插件“Really Simple Security”惊现严重漏洞,数百万网站面临风险",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487501&idx=1&sn=39d247b0248d6134a3936531fc0ee647": "【漏洞预警】东胜物流软件-certupload-任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=1&sn=b60ee79ea2fbcfeaae560373faa7a2cf": "12年来最严重的 WordPress 漏洞,可大规模接管管理员权限",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=2&sn=667b6f9c61b6f2d2077659cd4d4cdc70": "僵尸网络利用 GeoVision 0day 安装 Mirai 恶意软件",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247567418&idx=2&sn=19577506ffdc9228b4214d195638595a": "有关漏洞挖掘的一些总结",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNzY5OTg2Ng==&mid=2247500244&idx=2&sn=2c043ef6f5f2a73220f5442c0a23ba95": "【漏洞通告】Apache OFBiz远程代码执行漏洞(CVE-2024-47208)",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5MTAwNzUzNQ==&mid=2650510921&idx=1&sn=e4934351ec2c8cb6dbc0aeca15104b40": "倒计时2天!“智效融合,安全护航”·深圳站 第七期「度安讲」 技术沙龙开放报名",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492528&idx=2&sn=12ed7293c2d58a8ff8af2eee52151e30": "【poc】Fortinet FortiManager 中0day CVE-2024-47575 的 PoC 发布",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492528&idx=3&sn=ca32f8d2a6f6e69a0d8f6cb1c3cc86ed": "【poc】TP-Link 中的 DHCP 漏洞可让攻击者远程接管路由器 - PoC 发布",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=2&sn=4f47a0a0b8cf7c2347c48af444867c9c": "上周关注度较高的产品安全漏洞(20241111-20241117)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MzU3MTcwNg==&mid=2247486025&idx=1&sn=57b3564d52b3979909e7c4ce558cb424": "简单逻辑漏洞学习",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489173&idx=1&sn=38cddcc7195393081437dda1b20e81f5": "【漏洞预警】Apache OFBiz远程代码执行漏洞CVE-2024-47208",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489173&idx=2&sn=8b54bc7f5eac3e68aa9c1b50d0bfe0f0": "【漏洞预警】Apache HertzBeat < 1.6.1 消息通知模版注入漏洞CVE-2024-41151",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247632327&idx=4&sn=48bfb50af682460d968c919e508846b6": "Palo Alto Networks确认0Day漏洞正在被黑客利用",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MDY1MzUzNw==&mid=2247497926&idx=1&sn=26eb4132f92f9aed012a93735a6b3879": "fastjson < 1.2.66 正则表达式拒绝服务漏洞REDOS",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNTc1MzQyNw==&mid=2247488223&idx=1&sn=179f23ace36083dd36a1f5052b4c6018": "红日靶场(七)WHOAMI Penetration(一)",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524352&idx=2&sn=840f79721a30962446402beb9e179f45": "Redis CVE-2024-31449:如何重现和缓解漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxNTYwOTU1Mw==&mid=2650092449&idx=1&sn=ccafc6e2e300c5176b01f01455f66820": "远程代码执行风险威胁用户安全,Zoom紧急修复多个安全漏洞;颠覆传统安全架构,Zscaler创新发布新型零信任分段方案 | 牛览",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517127&idx=1&sn=61549ef4ef11bf847690be40502fd256": "紧急:关键 WordPress 插件漏洞暴露了超过 400 万个网站",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&mid=2649787425&idx=1&sn=6f9cdcc47fe2971c8f27491559a54cb3": "WordPress安全警报:400万网站面临严重认证绕过漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwODM3NjIxOQ==&mid=2247502147&idx=1&sn=6d2c1227899943ee29dc7f1a17b1cf53": "12年来最严重的 WordPress 漏洞,可大规模接管管理员权限",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUzNjkxODE5MA==&mid=2247487438&idx=1&sn=57b059b3e23609293878846b57fd3d2d": "网络安全认知科普(五):业务本身也可能就是漏洞,就是风险",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485505&idx=1&sn=13147a3d93fed1ed458e589239c7dc56": "EDUSRC漏洞挖掘技巧汇总+信息收集各种姿势",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MDYwNDc5Nw==&mid=2247486363&idx=1&sn=85f3185c117796238c0285ce1443bbea": "Water Barghest组织利用IoT设备漏洞迅速变现的策略",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491445&idx=1&sn=3b3bf547593b9c83bd8067fa2f85da0b": "漏洞预警 | Laravel环境变量注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491445&idx=2&sn=ba14df01b2e491cc6546173a72e6c2dc": "漏洞预警 | D-Link NAS设备远程代码执行漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491445&idx=3&sn=9a49aa4947b71d328766002dc7f115d0": "漏洞预警 | 海信智能公交企业管理系统SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzODY2ODA0OA==&mid=2247485900&idx=1&sn=4a1c0f14751627a29534c3c7f13a1354": "【未公开】百择唯供应链存在RankingGoodsList2 SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3MjU4MjM3MQ==&mid=2247488426&idx=1&sn=8ca95cf35ca24bc8ba0c40172f5dacb5": "【0day 漏洞预警】某统一通信平台存在任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499683&idx=1&sn=23b5001cd5e4272d908cf85c0d71263d&chksm=ec1dcf8bdb6a469da30be3bb9de87a5e11415411c58b37eb85060e943ea7b097ccecc2f9f16e&scene=58&subscene=0": "一键检测 17 个蓝凌 OA 历史漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=1&sn=368d74c4f6e7a4f2639d84ec46bf77c7&chksm=fd74df9bca03568d70f915369a15335bfc87733f37f2443259f039b6d3f497061fb698fe7a2b&scene=58&subscene=0": "CNVD漏洞周报2024年第46期",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247495506&idx=2&sn=4f47a0a0b8cf7c2347c48af444867c9c&chksm=fd74df9bca03568d4907affed4138435656b4dbb7b298e4dea297fd24796880708c0ffec6763&scene=58&subscene=0": "上周关注度较高的产品安全漏洞(20241111-20241117)",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=1&sn=b60ee79ea2fbcfeaae560373faa7a2cf&chksm=ea94a583dde32c95779d3ac2afec31953b99e514551aec14bfc515de9ced953efb77c5563092&scene=58&subscene=0": "12年来最严重的 WordPress 漏洞,可大规模接管管理员权限",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521513&idx=2&sn=667b6f9c61b6f2d2077659cd4d4cdc70&chksm=ea94a583dde32c95f18dabad1da69d1c1444aebf79a867a8ada6e4d24e51a03b28c8eb27076a&scene=58&subscene=0": "僵尸网络利用 GeoVision 0day 安装 Mirai 恶意软件",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5OTI3MTE5MQ==&mid=2247485409&idx=1&sn=17c225d46e6c41ea0b6cf9459af70bee": "【Exp】- CVE-2024-10924 WordPress插件Really Simple Security认证绕过漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502450&idx=1&sn=a1fc8665dfbb9c1703fef3c40ff25310": "【在野利用】Palo Alto Networks PAN-OS 身份认证绕过漏洞(CVE-2024-0012)安全风险通告",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492559&idx=3&sn=bd55e8894a88011691ba63e3f45929e2": "Apache Kafka 漏洞将用户数据暴露给潜在攻击者",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492559&idx=4&sn=fc31cfbd66ffb7b1e4867fca91821f2e": "VMware 漏洞(CVE-2024-38812 和 CVE-2024-38813)被广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg5OTg5NzkwNw==&mid=2247485563&idx=1&sn=6403f9b8b5403d8a7a696a8e0e17a046": "CVE-2024-45216 Authentication bypass in Apache Solr",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzMjE5MTY5NQ==&mid=2247502473&idx=3&sn=fc0115150597e30c84b5c8ecb1d968ba": "Palo Alto警告,防火墙管理界面RCE漏洞被攻击者利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247489264&idx=1&sn=2375259ae986fae83ca35293b7b7dc21": "易思智能物流无人值守系统 PhoneLogin SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485720&idx=1&sn=3bd82b6a8f0001ce306efba3c499f6bf": "【漏洞复现】某平台-Sc-TaskMonitoring-search-sql注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247496762&idx=1&sn=835c3bf727a87fe1aad3ea5806d22f61": "【漏洞通告】Apache OFBiz多个远程代码执行漏洞安全风险通告",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI4MjA1MzkyNA==&mid=2655348005&idx=1&sn=4c930728fafc77e04d44557a763f493e": "Palo Alto警告,防火墙管理界面RCE漏洞被攻击者利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491091&idx=1&sn=d0c7ebe7f059cc62b3719c8bfb99d69d": "记录日常挖掘漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3Mjk2NDU2Nw==&mid=2247492453&idx=1&sn=4edaf9b04b271a1782f16bcf085d3e2c": "黑盒乱锤某专属SRC到0day代码分析",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyOTcwOTMwMQ==&mid=2247484473&idx=1&sn=6a7b9607e939dfc9b833e01adfc8571f": "灵当CRM系统multipleUpload.php接口处存在文件上传漏洞【漏洞复现|附nuclei-POC】",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507405&idx=1&sn=724c4f04b89e17186e10643a70168151&chksm=cfcabed9f8bd37cf08699147911e05b802a7367ecb0fd5122c5c60647403f1c7ad261c992be5&scene=58&subscene=0": "速修!宝兰德BES中间件远程代码执行漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxODI4NDg3Nw==&mid=2247484718&idx=1&sn=8502b1cb852caa8ce0e23e3847b944b6": "Cuppa CMS-任意文件读取CVE-2022-25401",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0NTY5Nzc1OA==&mid=2247484111&idx=1&sn=1d68bc0bb4221a6de04c1b1dc818eafa": "一文读懂SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNzY5OTg2Ng==&mid=2247500250&idx=2&sn=23d9e2dfb43ea4293d20489c3cbccb9e": "【漏洞通告】Palo Alto Networks PAN-OS身份验证绕过漏洞(CVE-2024-0012)",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIwNDk0MDgxMw==&mid=2247499470&idx=2&sn=d9bbe418f8309153c86b2c38bdb82f17": "上周关注度较高的产品安全漏洞(20241111-20241117)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247486183&idx=1&sn=b38113b15e2fada33cf26c95c9c07714": "【0day】某微信万能门店小程序系统存在任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4MzE1MTQzNw==&mid=2247491024&idx=1&sn=00be4948643b40e24a2b0cca5c99edfc": "专题解读 | 图基础模型最新研究进展",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614168&idx=1&sn=ca9f354a96fac70ba3dfb1e6840380db": "Bypass Cloudflare实现账户接管:密码重置投毒漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793181&idx=1&sn=bcfe157d05c93fa6fc18591227dae4da": "DeepData 恶意软件框架被发现利用尚未修补的 Windows 0day漏洞、Fortinet VPN 客户端",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2ODg3NzExNw==&mid=2247488361&idx=1&sn=e560e27ced52b442b1d41ac709a876ff": "黑盒乱锤某专属SRC到0day代码分析",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNjIzMjM5Ng==&mid=2247489988&idx=1&sn=86427522d5972cadf175076db1b99d71": "防火墙管理界面RCE漏洞被攻击者利用,Palo Alto发出警告",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxMzczNTA4MQ==&mid=2247483895&idx=1&sn=3da0b8ac30f8d6f1da127c9216651fe0": "一个很强的漏洞库",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307419&idx=1&sn=99e73003e60b59000267419ee4068108": "美国饮用水系统存在300多个漏洞,影响1.1亿人",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307419&idx=2&sn=1ccab95bd62ccdb6da0bf494f77e858d": "VMware vCenter Server远程代码执行漏洞正被黑客广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247524360&idx=2&sn=b5804cee2025c7d7c53030217988d02b": "Java(Script)Drive-By,无需0day攻击",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066082&idx=3&sn=45c8dff3a066a1615c872523d972e645": "【安全圈】美国饮用水系统存在300多个漏洞,影响1.1亿人",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652066082&idx=4&sn=c7244d3c2cda936e8c968cf0a2ade6d0": "【安全圈】VMware vCenter Server远程代码执行漏洞正被黑客广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521523&idx=1&sn=286f99df03f25ebd1cb1fb497f991b21": "补丁不给力,VMware vCenter 严重RCE漏洞遭利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458583218&idx=1&sn=f5b184e32e1592dc41e78b9934e7c670": "SDC2024 议题回顾 | ExpAttack:大语言模型越狱风险持续追踪框架",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI4NDY2MDMwMw==&mid=2247513105&idx=1&sn=db4c2c400bfc1b8ac9c2e39ffcc2d0f8": "美全国水务系统存在大量漏洞,可致使上亿人供水中断",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3OTAyODk4MQ==&mid=2247490987&idx=1&sn=aa4712f028a5b83328bf471fc49512b2": "顺丰安全漏洞评分规则更新公告",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515427&idx=1&sn=fb8b05f7d8f4fef283c82153244d0dca": "【漏洞复现】D-Link NAS设备 sc_mgr.cgi 未授权RCE漏洞复现",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjY2MTIzMw==&mid=2650619819&idx=2&sn=e0594a7fbc40c3e7038dfb867b72a41b": "高危!Laravel参数注入漏洞安全风险通告",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNDUxOTk2Mw==&mid=2247495150&idx=1&sn=7dbdf94f68382feb66892595971d54dc": "【论文速读】| 通过良性数据镜像对大语言模型进行隐蔽越狱攻击",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523853&idx=1&sn=09a7e2c49e4d18c988053c13b775aa17": "【漏洞通告】Palo Alto Networks PAN-OS 身份验证绕过漏洞(CVE-2024-0012)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523853&idx=2&sn=44f939a81178afad27dca90a02dfbfc6": "【漏洞通告】Apache OFBiz远程代码执行漏洞(CVE-2024-47208)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247523853&idx=3&sn=fab3ee466334a0022b2df23ab6a23217": "上周关注度较高的产品安全漏洞(20241111-20241117)",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247490175&idx=1&sn=8a88f13080b38ee937638a6ab1a1a319": "【风险通告】Palo Alto Networks PAN-OS存在身份验证绕过漏洞(CVE-2024-0012)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507416&idx=1&sn=6eb8217321fbe1a5361675058bc55882": "已知漏洞!宝兰德最新漏洞绕过补丁黑名单,速修",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU3NzY3MzYzMw==&mid=2247498607&idx=2&sn=2e4002dc2db4869990ee4fa3d38f1f43": "渗透测试 -- 漏洞百解",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247632338&idx=3&sn=287c0b4f0cfbdbc1d11e7f8b67787249": "美国饮用水系统存在300多个漏洞,影响1.1亿人",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUzMDUxNTE1Mw==&mid=2247508728&idx=1&sn=50e200ae59cd278b496fa675d916a377": "微软2024年11月补丁日重点漏洞安全预警",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489184&idx=1&sn=04ec9cf838fb1a5cf5cc4c8c93a8bf30": "【漏洞预警】Apache Kafka Clients权限管理不当漏洞可致信息泄露",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489184&idx=2&sn=6674f470ab506ed8239b4103f4d11218": "【漏洞预警】Palo Alto Networks PAN-OS Web管理界面身份验证缺陷漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489184&idx=3&sn=22ce05bbdff66ec1bf477e37c429c327": "【漏洞预警】Apache Tomcat资源控制不当漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4NzgyODEzNQ==&mid=2247488403&idx=3&sn=9914510e560c5eec5ad6282278ab6577": "「人脑替代计划-6」LLM是什么?",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2ODYxMzY3OQ==&mid=2247517233&idx=1&sn=af475bf0f3de0493fd24dcdc37463e5a": "漏洞挖掘|电子商城类漏洞挖掘案例灵感复现",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyNDY3MTY3MA==&mid=2247486072&idx=1&sn=7558c8a2becda935fa6b7237363f864e": "「漏洞复现」D-Link NAS设备 sc_mgr.cgi 未授权漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2Mjc3NTMxOA==&mid=2247515356&idx=1&sn=202c8573e3a77824edf45e865b30e051": "漏洞预警|Apache OFBiz远程代码执行漏洞(CVE-2024-47208)",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2Mjc3NTMxOA==&mid=2247515356&idx=2&sn=d677b50ea4f958d207cd6a3c772fe0b8": "漏洞预警|Palo Alto Networks PAN-OSS身份验证绕过等多个漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIwMzI1MDg2Mg==&mid=2649945063&idx=1&sn=e933d8e9d2243641c8f007c652caad48": "YAK 亮相2024年世界互联网大会!携手中国联通共塑网络安全新生态",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651307419&idx=3&sn=9f3e2546a68551118a2b2bc765b70ab3": "关键的WordPress插件漏洞导致超400万网站暴露",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484334&idx=1&sn=bfd4f94e969ee9f8e7ec653c0feae32a": "【漏洞复现】D-Link NAS 远程命令执行漏洞(CVE-2024-3273)"
|
||
} |