每日安全动态推送(01-23)

渗透技巧 2年前 (2022) admin
807 0 0
Tencent Security Xuanwu Lab Daily News


• McAfee Bug Can Be Exploited to Gain Windows SYSTEM Privileges:
https://threatpost.com/mcafee-bug-windows-system-privileges/177857/

   ・ McAfee Agent 被发现 Windows SYSTEM 本地提权漏洞 – Jett


• [Firmware] MoonBounce: the dark side of UEFI firmware:
https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/

   ・ MoonBounce: the dark side of UEFI firmware – Jett


• [Attack] 假旗 or 升级?疑似海莲花利用Glitch平台的攻击样本再现:
https://mp-weixin-qq-com.translate.goog/s/1L7o1C-aGlMBAXzHqR9udA?_x_tr_sl=zh-CN&_x_tr_tl=en&_x_tr_hl=zh-CN

   ・ 假旗 or 升级?疑似海莲花利用Glitch平台的攻击样本再现  – lanying37


• AFLTeam: Towards Systematic and Dynamic Task Allocation for Collaborative Parallel Fuzzing:
https://github.com/MelbourneFuzzingHub/aflteam

   ・ AFLTeam – AFLTeam: Towards Systematic and Dynamic Task Allocation for Collaborative Parallel Fuzzing – Jett


• 浅析分组加密模式攻击手段:
https://tttang.com/archive/1403/

   ・ 浅析分组加密模式攻击手段 – lanying37


• [iOS] 2232 – XNU kernel use-after-free in mach_msg – project-zero:
https://bugs.chromium.org/p/project-zero/issues/detail?id=2232

   ・ 2232 – XNU kernel use-after-free in mach_msg – project-zero – Jett


• ZohOwned :: A Critical Authentication Bypass on Zoho ManageEngine Desktop Central:
https://srcincite.io/blog/2022/01/20/zohowned-a-critical-authentication-bypass-on-zoho-manageengine-desktop-central.html

   ・ 桌面终端安全管理软件 Zoho ManageEngine 被发现高危认证绕过漏洞(CVE-2021-44515) – Jett


• Security advisory for the standard library (CVE-2022-21658):
https://blog.rust-lang.org/2022/01/20/cve-2022-21658.html

   ・ Rust 发布安全公告,std::fs::remove_dir_all 标准库函数存在条件竞争漏洞 (CVE-2022-21658) – Jett


• [Web] CVE-2021-45467: CWP CentOS Web Panel – preauth RCE:
https://octagon.net/blog/2022/01/22/cve-2021-45467-cwp-centos-web-panel-preauth-rce/

   ・ CVE-2021-45467: CWP CentOS Web Panel – preauth RCE – Jett


• [IoT] Checking your browser before accessing www.forensicfocus.com.:
https://www.forensicfocus.com/webinars/coffee-forensics-reconstructing-data-in-iot-devices-running-contiki-os/

   ・ Contiki OS 系统 IoT 设备取证分析之数据还原 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


原文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(01-23)

版权声明:admin 发表于 2022年1月23日 上午3:36。
转载请注明:每日安全动态推送(01-23) | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...