wxvl/data.json

40 lines
7.5 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247513636&idx=1&sn=66bc5f0cac446268cb859e38faa2b841": "四个关键漏洞使 HPE Aruba 设备面临 RCE 攻击",
"https://mp.weixin.qq.com/s?__biz=MzIxMjEzMDkyMA==&mid=2247486384&idx=1&sn=6cded6c301c425146633b7c8e92b9ae2": "用友crm客户关系管理pubdownloadfile.php接口存在任意文件读取漏洞",
"https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247490163&idx=1&sn=0af69d90d567c84ea23336cde986f7a8": "代码审计-某产品高清智能录播系统漏洞分析附未公开POC",
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247488062&idx=1&sn=5e3f1e901718ee760c9271676d075758": "【漏洞预警】Apache ActiveMQ Jolokia 和 REST API 未授权访问漏洞CVE-2024-32114",
"https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458553432&idx=1&sn=93377c71147ef00b8e58571093d5ab55": "CVE-2023-4427ReduceJSLoadPropertyWithEnumeratedKey 中的越界访问",
"https://mp.weixin.qq.com/s?__biz=Mzg4OTkwMDc1Mg==&mid=2247484729&idx=1&sn=b2920455891f256e016b74122977490b": "YzmCMS pay_callback.html RCE漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=2&sn=44579672e179f0268bd6daac499832e2": "【漏洞复现】CVE-2024-1512",
"https://mp.weixin.qq.com/s?__biz=MzkwNTE4Mzc2Mg==&mid=2247485256&idx=1&sn=5a1e8635a4c0a68a5c58662d47a08f36": "【漏洞复现】CVE-2024-1698",
"https://mp.weixin.qq.com/s?__biz=Mzg2OTYzNTExNQ==&mid=2247484965&idx=1&sn=396cceb9cd98393868c20c1876aa8957": "[漏洞复现] CVE-2024-33786 中城科信票务管理平台 任意文件上传",
"https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649791059&idx=1&sn=82bf570f4c7002b524bb4eacc1f7fb0d": "俄罗斯 APT28 利用 Microsoft Outlook 漏洞攻击捷克、德国实体",
"https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247494519&idx=1&sn=cd24e7e546ec5cd027e8ca018f499bf4&chksm=e8a5e114dfd268025b28a508644eff19bd5ccf522b270bc7a6e545a340e65e4eb88e83aef43e&scene=58&subscene=0": "漏洞挖掘之众测厂商 第三方登录RedirectUrl劫持漏洞",
"https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494678&idx=1&sn=4cdffd80c296f3df40b773da5943d796": "两个Google Vertex AI平台漏洞曝光可能导致权限提升与敏感数据外泄",
"https://mp.weixin.qq.com/s?__biz=Mzk0NjQ5MTM1MA==&mid=2247492614&idx=1&sn=40f082284e0b14fd77c82d95bbeb9185": "用友漏洞一键探测利用",
"https://mp.weixin.qq.com/s?__biz=MzkxNzY0MzE2NQ==&mid=2247483950&idx=1&sn=f1b198ac63084dea04a2ad4503124b5a": ".md",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=1&sn=4a47b98c0b29cd4d3e7c4f30685e1247": "【漏洞预警】 用友BIP 数据库配置信息泄露",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=2&sn=adb385b0fccd4af9d9ad9d439bce5640": "【漏洞预警】D-Link-DNS 多款产品未公开接口sc_mgr.cgi 存在远程命令执行漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=3&sn=1cdbe6f7a8137e5e2626d4e358c1ef93": "【漏洞预警】 易宝OA-GetProductInv SQL注入漏洞",
"https://mp.weixin.qq.com/s?__biz=MzIyNjk0ODYxMA==&mid=2247487497&idx=4&sn=e2d16220eb00621420899460b1a95941": "【漏洞预警】易思智能物流无人值守系统SQL注入",
"https://mp.weixin.qq.com/s?__biz=MzA4NzUwMzc3NQ==&mid=2247496792&idx=1&sn=561979247dfc36401fe9815413c3f88a": "CVE-2024-25600WordPress Bricks Builder RCE",
"https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652065974&idx=1&sn=d6789e893634a0f2fb9c34b2bfb0a8f9": "【安全圈】打补丁要快0Day漏洞正在被黑客广泛利用",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab": "2024年网络安全漏洞研究人才培养交流活动成功举办",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0": "CNNVD 关于微软多个安全漏洞的通报",
"https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486145&idx=1&sn=06229e2205d5dd9e99716999b4f1aa2e": "LLM大模型安全4- 供应链漏洞",
"https://mp.weixin.qq.com/s?__biz=MzkyMzI2NzIyMw==&mid=2247488304&idx=1&sn=c0db143fcd6865fdd3482b955dd94abd": "BlockSec和OKX Explorer达成合作携手提升链上数据安全与合规等级",
"https://mp.weixin.qq.com/s?__biz=MzI0NjE1NDYyOA==&mid=2247484677&idx=1&sn=bb89036b82c59a0e1e8b06227a9e9768": "【漏洞分享】edu通杀 新中小学智慧校园信息管理系统 Upload 任意文件上传",
"https://mp.weixin.qq.com/s?__biz=MzkzNjYwODg3Ng==&mid=2247485712&idx=1&sn=e15d7dda1a02527db2c340f56df4f3ea": "【漏洞复现】某平台-testdb-info-leak信息泄露漏洞",
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99": "远程代码执行风险威胁用户安全Zoom紧急修复多个安全漏洞颠覆传统安全架构Zscaler创新发布新型零信任分段方案 牛览",
"https://mp.weixin.qq.com/s?__biz=MjM5Njc3NjM4MA==&mid=2651133388&idx=2&sn=8fe7297f29148fa035db128b29e8dc99&chksm=bd15a51f8a622c096ef4441d0b5acb3ee39ef865e5650f4df483a8648b528a3509fe57972cd1&scene=58&subscene=0": "远程代码执行风险威胁用户安全Zoom紧急修复多个安全漏洞颠覆传统安全架构Zscaler创新发布新型零信任分段方案 牛览",
"https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502432&idx=1&sn=d3405bf69adda60e3be13962d038b6aa&chksm=fe79eef8c90e67eead814333282edff4d7e247d6ba9e9ba1895fff6354e808e4fa84048a0cd1&scene=58&subscene=0": "【已复现】Fortinet FortiManager 身份认证绕过漏洞(CVE-2024-47575)安全风险通告第二次更新",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=1&sn=06d6932fae0b8e2e54feda32c9c169ab&chksm=8b59e9cbbc2e60dd8d6dc37797f6608494298f22b5250c7326cf864063e039f776f4d7dc0847&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
"https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0&chksm=8b59e9cbbc2e60dda8a2633578ff2e76d88a3a00e52dba1a54ee0b2b9f554066431871d24cd8&scene=58&subscene=0": "CNNVD 关于微软多个安全漏洞的通报",
"https://mp.weixin.qq.com/s?__biz=Mzg4NTY0MDg1Mg==&mid=2247485595&idx=1&sn=b4c87d04e1659f11fad8f2f125985751&chksm=cfa49360f8d31a76e5d3880e51cd8f9b0ab1df47e86729adf04ea6d1f1202fac72fae5903fbe&scene=58&subscene=0": "大语言语言模型安全攻击以及AI供应链漏洞",
"https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521498&idx=1&sn=f0af27f6b0e814c92846ea129bcee155&chksm=ea94a5b0dde32ca62dddf91f42a9fa2b36402ffb856469973f83a6a88e24d6910dcc53072ef4&scene=58&subscene=0": "PostgreSQL 高危漏洞可导致环境变量被利用",
"https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651388483&idx=1&sn=070fb6976ee52108d263858115ea9bfd&chksm=8d398bcbba4e02ddbe0183f79c2682bbf1cab54e4ba6bb0697fdc56e297e7303aa9eb938b9e6&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办",
"https://mp.weixin.qq.com/s/O2Ohp_ceYrTo8hppX09fkw": "(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞",
"https://mp.weixin.qq.com/s/tbEXIAPT-Vumch-WyoGZHQ": "代码审计-某oa任意文件读取(1day)",
"https://mp.weixin.qq.com/s/73CXvF4ejvgS40OetzXr8A": "(0day)全新优客API接口管理系统代码审计"
}