mirror of
https://github.com/gelusus/wxvl.git
synced 2025-06-19 17:30:19 +00:00
40 lines
7.5 KiB
JSON
40 lines
7.5 KiB
JSON
{
|
||
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247513636&idx=1&sn=66bc5f0cac446268cb859e38faa2b841": "四个关键漏洞使 HPE Aruba 设备面临 RCE 攻击",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIxMjEzMDkyMA==&mid=2247486384&idx=1&sn=6cded6c301c425146633b7c8e92b9ae2": "用友crm客户关系管理pub∕downloadfile.php接口存在任意文件读取漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247490163&idx=1&sn=0af69d90d567c84ea23336cde986f7a8": "代码审计-某产品高清智能录播系统漏洞分析附未公开POC",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247488062&idx=1&sn=5e3f1e901718ee760c9271676d075758": "【漏洞预警】Apache ActiveMQ Jolokia 和 REST API 未授权访问漏洞CVE-2024-32114",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458553432&idx=1&sn=93377c71147ef00b8e58571093d5ab55": "CVE-2023-4427:ReduceJSLoadPropertyWithEnumeratedKey 中的越界访问",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4OTkwMDc1Mg==&mid=2247484729&idx=1&sn=b2920455891f256e016b74122977490b": "YzmCMS pay_callback.html RCE漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=2&sn=44579672e179f0268bd6daac499832e2": "【漏洞复现】CVE-2024-1512",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=1&sn=5a1e8635a4c0a68a5c58662d47a08f36": "【漏洞复现】CVE-2024-1698",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg2OTYzNTExNQ==&mid=2247484965&idx=1&sn=396cceb9cd98393868c20c1876aa8957": "[漏洞复现] CVE-2024-33786 中城科信票务管理平台 任意文件上传",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649791059&idx=1&sn=82bf570f4c7002b524bb4eacc1f7fb0d": "俄罗斯 APT28 利用 Microsoft Outlook 漏洞攻击捷克、德国实体",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4&chksm=e8a5e114dfd268025b28a508644eff19bd5ccf522b270bc7a6e545a340e65e4eb88e83aef43e&scene=58&subscene=0": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494678&idx=1&sn=4cdffd80c296f3df40b773da5943d796": "两个Google Vertex AI平台漏洞曝光:可能导致权限提升与敏感数据外泄",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzk0NjQ5MTM1MA==&mid=2247492614&idx=1&sn=40f082284e0b14fd77c82d95bbeb9185": "用友漏洞一键探测利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkxNzY0MzE2NQ==&mid=2247483950&idx=1&sn=f1b198ac63084dea04a2ad4503124b5a": ".md",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=1&sn=4a47b98c0b29cd4d3e7c4f30685e1247": "【漏洞预警】 用友BIP 数据库配置信息泄露",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=2&sn=adb385b0fccd4af9d9ad9d439bce5640": "【漏洞预警】D-Link-DNS 多款产品未公开接口∕sc_mgr.cgi 存在远程命令执行漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=3&sn=1cdbe6f7a8137e5e2626d4e358c1ef93": "【漏洞预警】 易宝OA-GetProductInv SQL注入漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=4&sn=e2d16220eb00621420899460b1a95941": "【漏洞预警】易思智能物流无人值守系统SQL注入",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA4NzUwMzc3NQ==&mid=2247496792&idx=1&sn=561979247dfc36401fe9815413c3f88a": "CVE-2024-25600:WordPress Bricks Builder RCE",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652065974&idx=1&sn=d6789e893634a0f2fb9c34b2bfb0a8f9": "【安全圈】打补丁要快!0Day漏洞正在被黑客广泛利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab": "2024年网络安全漏洞研究人才培养交流活动成功举办",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0": "CNNVD ∣ 关于微软多个安全漏洞的通报",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486145&idx=1&sn=06229e2205d5dd9e99716999b4f1aa2e": "LLM大模型安全(4)- 供应链漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkyMzI2NzIyMw==&mid=2247488304&idx=1&sn=c0db143fcd6865fdd3482b955dd94abd": "BlockSec和OKX Explorer达成合作,携手提升链上数据安全与合规等级",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI0NjE1NDYyOA==&mid=2247484677&idx=1&sn=bb89036b82c59a0e1e8b06227a9e9768": "【漏洞分享】edu通杀 新中小学智慧校园信息管理系统 Upload 任意文件上传",
|
||
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485712&idx=1&sn=e15d7dda1a02527db2c340f56df4f3ea": "【漏洞复现】某平台-testdb-info-leak信息泄露漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99": "远程代码执行风险威胁用户安全,Zoom紧急修复多个安全漏洞;颠覆传统安全架构,Zscaler创新发布新型零信任分段方案 ∣ 牛览",
|
||
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99&chksm=bd15a51f8a622c096ef4441d0b5acb3ee39ef865e5650f4df483a8648b528a3509fe57972cd1&scene=58&subscene=0": "远程代码执行风险威胁用户安全,Zoom紧急修复多个安全漏洞;颠覆传统安全架构,Zscaler创新发布新型零信任分段方案 ∣ 牛览",
|
||
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502432&idx=1&sn=d3405bf69adda60e3be13962d038b6aa&chksm=fe79eef8c90e67eead814333282edff4d7e247d6ba9e9ba1895fff6354e808e4fa84048a0cd1&scene=58&subscene=0": "【已复现】Fortinet FortiManager 身份认证绕过漏洞(CVE-2024-47575)安全风险通告第二次更新",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab&chksm=8b59e9cbbc2e60dd8d6dc37797f6608494298f22b5250c7326cf864063e039f776f4d7dc0847&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
|
||
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0&chksm=8b59e9cbbc2e60dda8a2633578ff2e76d88a3a00e52dba1a54ee0b2b9f554066431871d24cd8&scene=58&subscene=0": "CNNVD ∣ 关于微软多个安全漏洞的通报",
|
||
"https://mp.weixin.qq.com/s?__biz=Mzg4NTY0MDg1Mg==&mid=2247485595&idx=1&sn=b4c87d04e1659f11fad8f2f125985751&chksm=cfa49360f8d31a76e5d3880e51cd8f9b0ab1df47e86729adf04ea6d1f1202fac72fae5903fbe&scene=58&subscene=0": "大语言语言模型安全攻击以及AI供应链漏洞",
|
||
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521498&idx=1&sn=f0af27f6b0e814c92846ea129bcee155&chksm=ea94a5b0dde32ca62dddf91f42a9fa2b36402ffb856469973f83a6a88e24d6910dcc53072ef4&scene=58&subscene=0": "PostgreSQL 高危漏洞可导致环境变量被利用",
|
||
"https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651388483&idx=1&sn=070fb6976ee52108d263858115ea9bfd&chksm=8d398bcbba4e02ddbe0183f79c2682bbf1cab54e4ba6bb0697fdc56e297e7303aa9eb938b9e6&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
|
||
"https://mp.weixin.qq.com/s/O2Ohp_ceYrTo8hppX09fkw": "(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞",
|
||
"https://mp.weixin.qq.com/s/tbEXIAPT-Vumch-WyoGZHQ": "代码审计-某oa任意文件读取(1day)",
|
||
"https://mp.weixin.qq.com/s/73CXvF4ejvgS40OetzXr8A": "(0day)全新优客API接口管理系统代码审计"
|
||
} |