第十四周/20220104 红队推送
2022-1-4 11:14:19 Author: mp.weixin.qq.com(查看原文) 阅读量:3 收藏

BeeMedia - Bypass Admin Panel

BeeMedia- Sql Injection Vulnerability

https://cxsecurity.com/issue/WLB-2021120101

Backdoor.Win32.FTP.Simpel.12 / Insecure Crypto

https://cxsecurity.com/issue/WLB-2021120102

Backdoor.Win32.FTP.Simpel.12 / Port Bounce Scan

https://cxsecurity.com/issue/WLB-2021120103

AlphaSkins Alpha Controls Package | SQL Injection Vulnerability

Terramaster F4-210 / F2-210 Remote Code Execution

https://cxsecurity.com/issue/WLB-2021120105

Microsoft Windows Explorer Preview Pane Security Bypass

https://cxsecurity.com/issue/WLB-2021120107

Windows Explorer Preview Pane HTML File Link Spoofing

https://cxsecurity.com/issue/WLB-2021120108

Virtual Airlines Manager 2.6.2 - 'plane_location' SQL 

https://cxsecurity.com/issue/WLB-2022010009

ManageEngine ServiceDesk Plus Remote Code Execution

https://cxsecurity.com/issue/WLB-2021120112

2021年最受欢迎的黑客工具top 20

https://www.kitploit.com/2021/12/top-20-most-popular-hacking-tools-in.html

漏洞猎人的漏洞探测工具列表

https://infosecwriteups.com/bug-bounty-tool-list-32262271f1e4

WMEye:为使用 WMI 和 MSBuild 横向而开发

https://github.com/pwn1sher/WMEye

SourceLeakHacker:一个多线程 Web 目录扫描器

https://github.com/WangYihang/SourceLeakHacker

log4jscanner:用于分析 JAR 文件的 log4j 漏洞文件系统扫描器和 Go 包

https://github.com/google/log4jscanner

黑魔法:JS引擎漏洞

https://www.da.vidbuchanan.co.uk/blog/webos-wampage.html

https://blog.assetnote.io/2021/12/26/chained-ssrf-websphere/

https://infosecwriteups.com/hacktoberfest2k21-vulnerability-how-users-metadata-can-be-changed-via-auth-jwt-tokens-leaking-from-3028f8ad6991

https://www.o2oxy.cn/3972.html

https://bugs.xdavidhu.me/google/2021/12/31/fixing-the-unfixable-story-of-a-google-cloud-ssrf/

https://www.catonetworks.com/blog/how-to-detect-dns-tunneling-in-the-network/

https://blog.willemmelching.nl/carhacking/2022/01/02/vw-part1/


更多详情请查看原文


文章来源: https://mp.weixin.qq.com/s?__biz=MzIxMjI0Mzk0OQ==&mid=2247483765&idx=1&sn=fc842f5e33df181ca6a8355370d7b223&chksm=974845f7a03fcce1779e1577bdd0e284b111e9687d555ec494c3932f77a66739b03d12315cdd&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh