服务粉丝

我们一直在努力
当前位置:首页 > 财经 >

每日安全动态推送(2-14)

日期: 来源:腾讯玄武实验室收集编辑:admin
Tencent Security Xuanwu Lab Daily News

• [Vulnerability] GitHub - 0xf4n9x/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.:
https://github.com/0xf4n9x/CVE-2023-0669

   ・ GoAnywhere MFT反序列化漏洞(CVE-2023-0669)利用工具 – P4nda


• Shadowsocks 重定向攻击:
https://www.freebuf.com/articles/blockchain-articles/357051.html

   ・ 复现和分析2020年发现的Shadowsocks 重定向漏洞,利用已知明文攻击可能造成中间人攻击 – xmzyshypnc


• Vulns1002 04 UAF 🥷CVE-2020-29661🏇☎️ 03 Exploit:
https://www.youtube.com/watch?v=96f8H48d-y8

   ・ Linux tty子系统UAF漏洞(CVE-2020-29661)详情与利用思路 – P4nda


• Firefly: a smart black-box fuzzer for web applications testing - Global Bug Bounty Platform:
https://blog.yeswehack.com/yeswerhackers/firefly-smart-black-box-fuzzer-web-applications/

   ・ Web 应用黑盒模糊测试工具 Firefly – WireFish


• [Malware] Phylum Discovers Revived Crypto Wallet Address Replacement Attack:
https://blog.phylum.io/phylum-discovers-revived-crypto-wallet-address-replacement-attack

   ・ 替换剪贴板中钱包地址的恶意软件再次活跃,使用了新的混淆方法。 – keenan


• mast1c0re: Introduction – Exploiting the PS4 and PS5 through a game save:
https://mccaulay.co.uk/mast1c0re-introduction-exploiting-the-ps4-and-ps5-through-a-gamesave/

   ・ PS4和PS5上的漏洞利用过程:修改游戏存档文件,利用栈溢出漏洞实现shellcode执行,利用越界写漏洞逃逸emulator。 – keenan


• Helping secure BNB Chain through responsible disclosure:
https://jumpcrypto.com/helping-secure-bnb-chain-through-responsible-disclosure/

   ・ BNB Beacon Chain 无限铸币漏洞 – WireFish


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


相关阅读

  • 每日安全动态推送(2-15)

  • Tencent Security Xuanwu Lab Daily News• Exploiting a remote heap overflow with a custom TCP stack:https://www.synacktiv.com/publications/exploiting-a-remote-he
  • 每日安全动态推送(2-16)

  • Tencent Security Xuanwu Lab Daily News• [Tools] Reversing The EVM: Raw Calldata:https://degatchi.com/articles/reading-raw-evm-calldata ・ EVM中calldata编码与
  • 每日安全动态推送(2-17)

  • Tencent Security Xuanwu Lab Daily News• Linux内核常用保护和绕过技术:http://blog.topsec.com.cn/linux%e5%86%85%e6%a0%b8%e5%b8%b8%e7%94%a8%e4%bf%9d%e6%8a%a4%e5%92
  • 每日安全动态推送(2-20)

  • Tencent Security Xuanwu Lab Daily News• I'm Building a Self-Destructing USB Drive:https://interruptlabs.ca/2022/07/29/I-m-Building-a-Self-Destructing-USB-Drive
  • 每日安全动态推送(2-21)

  • Tencent Security Xuanwu Lab Daily News• [Tools] r/netsec - mast1c0re: Part 3 – Escaping the PS5 emulator:https://www.reddit.com/r/netsec/comments/115u6xc/mast
  • 每日安全动态推送(2-22)

  • Tencent Security Xuanwu Lab Daily News• Open source solution replicates ChatGPT training process! Ready to go with only 1.6GB GPU memory and gives you 7.73 tim
  • 每日安全动态推送(2-24)

  • Tencent Security Xuanwu Lab Daily News• [macOS] Built-in macOS Security Tools:https://www.huntress.com/blog/built-in-macos-security-tools ・ 一篇介绍macos自
  • 每日安全动态推送(2-27)

  • Tencent Security Xuanwu Lab Daily News• [Android] The code that wasn’t there: Reading memory on an Android device by accident:https://github.blog/2023-02-23-t
  • HAProxy请求走私漏洞安全风险通告

  • 奇安信CERT致力于第一时间为企业级用户提供安全风险通告和有效解决方案。安全通告HAProxy是一个使用C语言编写的自由及开放源代码软件,其提供高可用性、负载均衡,以及基于TCP

热门文章

  • “复活”半年后 京东拍拍二手杀入公益事业

  • 京东拍拍二手“复活”半年后,杀入公益事业,试图让企业捐的赠品、家庭闲置品变成实实在在的“爱心”。 把“闲置品”变爱心 6月12日,“益心一益·守护梦想每一步”2018年四

最新文章

  • 每日安全动态推送(2-14)

  • Tencent Security Xuanwu Lab Daily News• [Vulnerability] GitHub - 0xf4n9x/CVE-2023-0669: CVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command
  • 每日安全动态推送(2-15)

  • Tencent Security Xuanwu Lab Daily News• Exploiting a remote heap overflow with a custom TCP stack:https://www.synacktiv.com/publications/exploiting-a-remote-he
  • 每日安全动态推送(2-16)

  • Tencent Security Xuanwu Lab Daily News• [Tools] Reversing The EVM: Raw Calldata:https://degatchi.com/articles/reading-raw-evm-calldata ・ EVM中calldata编码与
  • 每日安全动态推送(2-17)

  • Tencent Security Xuanwu Lab Daily News• Linux内核常用保护和绕过技术:http://blog.topsec.com.cn/linux%e5%86%85%e6%a0%b8%e5%b8%b8%e7%94%a8%e4%bf%9d%e6%8a%a4%e5%92
  • 每日安全动态推送(2-20)

  • Tencent Security Xuanwu Lab Daily News• I'm Building a Self-Destructing USB Drive:https://interruptlabs.ca/2022/07/29/I-m-Building-a-Self-Destructing-USB-Drive
  • 每日安全动态推送(2-21)

  • Tencent Security Xuanwu Lab Daily News• [Tools] r/netsec - mast1c0re: Part 3 – Escaping the PS5 emulator:https://www.reddit.com/r/netsec/comments/115u6xc/mast