每日安全动态推送(11-6)
2023-11-6 10:33:34 Author: mp.weixin.qq.com(查看原文) 阅读量:3 收藏

Tencent Security Xuanwu Lab Daily News

• batsignal (no CVE) - a macOS LPE:
https://gergelykalman.com/no-CVE-batsignal-a-macos-lpe.html

   ・ batsignal是一种macOS本地特权升级漏洞,可由任何用户(包括Guest)利用Spotlight服务提升权限。该漏洞已报告给Apple并获得奖励,但经历了332天的等待和多次修复 – SecTodayBot

• Exploit Released for Cisco IOS XE Zero-day Vulnerability:
https://cybersecuritynews.com/exploit-cisco-ios-zero-day/

   ・ Cisco上周被报道存在一个关键漏洞,已经被黑客在野外积极利用。该漏洞编号为CVE-2023-20198,且被评定为10.0(危急)。此漏洞影响了安装在数千台Cisco设备上的Cisco IOS XE软件,包括路由器、交换机和其他网络设备。 – SecTodayBot

• Exploiting Zenbleed from Chrome:
https://vu.ls/blog/exploiting-zenbleed-from-chrome/

   ・ Zenbleed AMD CPU漏洞可导致处理器泄露敏感信息,本文介绍了如何从Chrome浏览器作为入口进行利用。 – SecTodayBot

• Django: CVE-2023-46695: Potential denial of service vulnerability in UsernameField on Windows:
https://seclists.org/oss-sec/2023/q4/199

   ・ Django 4.2.7、Django 4.1.13和Django 3.2.23已发布,修复了Windows上UsernameField的拒绝服务漏洞CVE-2023-46695。 – SecTodayBot

• Ringzer0 - Mobile Reverse Engineering with r2frida:
https://ringzer0.training/trainings/mobile-reverse-engineering-r2frida.html

   ・ 学习如何将Radare2与Frida结合使用,通过R2Frida插件分析Android和iOS应用程序,了解移动安全、绕过防护措施和提取加密密钥等技巧。 – SecTodayBot

• ATT&CK Changes:
https://attack.mitre.org/docs/changelogs/v13.1-v14.0/changelog-detailed.html

   ・ ATT&CK v13.1和v14.0之间的变化 – SecTodayBot

• GitHub - M17-Project/rru-rf-hw: Remote Radio Unit - RF board:
https://github.com/M17-Project/rru-rf-hw#readme

   ・ 远程无线电单元RF板。采用德州仪器的CC1200芯片和射频功率放大模块构建,具有60W输出功率、420-450MHz频率范围等特点 – SecTodayBot

• A Defenders Guide to GraphRunner — Part I:
https://invictus-ir.medium.com/a-defenders-guide-to-graphrunner-part-i-e01dcc6b6fa7

   ・ GraphRunner是一个用于处理Microsoft Entra ID(Azure AD)账户的后渗透工具集,包含各种访问和操作租户数据的工具。本系列博客的第一部分将介绍GraphRunner的组件,包括身份验证、侦察和枚举以及持久化等,第二部分将涵盖其他模块并提供防御建议。  – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959410&idx=1&sn=5d6f0d04b51a3015a09b60c9b52d6d2b&chksm=8baed0edbcd959fbb7b7a1e8dea04bcbe9ce042cddc45baa3bbf93f04deb067e51fa70856d26&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh