每日安全动态推送(1-10)
2024-1-10 18:18:34 Author: mp.weixin.qq.com(查看原文) 阅读量:1 收藏

Tencent Security Xuanwu Lab Daily News

• PluXml Blog 5.8.9 Remote Code Execution ≈ Packet Storm:
https://packetstormsecurity.com/files/176407

   ・ 在PluXml Blog版本5.8.9中发现的远程代码执行漏洞 – SecTodayBot

• cpio privilege escalation vulnerability via setuid files in cpio archive:
https://seclists.org/fulldisclosure/2024/Jan/5

   ・ 利用setuid文件进行cpio权限提升的漏洞利用示例 – SecTodayBot

• Gom Player 2.3.92.5362 Buffer Overflow:
https://packetstormsecurity.com/files/176395

   ・ Gom Player 2.3.92.5362 缓冲区溢出漏洞的 PoC – SecTodayBot

• Linux Kernel Flaw CVE-2024-0193 Opens Root Access:
https://securityonline.info/linux-kernel-flaw-cve-2024-0193-opens-root-access/

   ・ Linux内核中的使用后释放漏洞,提升权限与任意代码执行风险 – SecTodayBot

• Exploiting GOG Galaxy XPC service for privilege escalation in macOS:
https://securityintelligence.com/x-force/exploiting-gog-galaxy-xpc-service-privilege-escalation-macos/

   ・ GOG Galaxy在连接验证逻辑上存在权限提升漏洞 – SecTodayBot

• Planex CS-QR10/CS-QR20 camera vulnerabilities - NeroTeam Security Labs:
https://neroteam.com/blog/planex-network-camera-cs-qr10-and-cs-qr20-vulnerability-repo

   ・ Planex CS-QR10和CS-QR20智能摄像头被发现存在不安全的保护措施,允许攻击者以根用户身份执行命令。 – SecTodayBot

• Exploring Counter-Strike: Global Offensive Attack Surface:
https://www.synacktiv.com/en/publications/exploring-counter-strike-global-offensive-attack-surface.html

   ・ 深入研究《反恐精英:全球攻势》的攻击面,揭示漏洞和潜在利用。 – SecTodayBot

• 全链基带漏洞利用分析(第 1 部分):
https://paper.seebug.org/3099/

   ・ 揭秘基带处理器中的安全隐患及其实际影响。深入剖析三星和MediaTek无线通信接口。讨论分析漏洞影响的必要性和共享芯片制造商基带漏洞缓解措施的重要性。 – SecTodayBot

• GitHub - byinarie/teams_dump: PoC for dumping and decrypting cookies in the latest version of Microsoft Teams:
https://github.com/byinarie/teams_dump

   ・ 使用此PoC代码从最新版本的Microsoft Teams中获取和解密cookie – SecTodayBot

• oss-security - Re: TTY pushback vulnerabilities / TIOCSTI:
https://www.openwall.com/lists/oss-security/2023/03/14/3

   ・ 一个新的绕过tty pushback漏洞的方法已经被发现,允许用户几乎在不禁用TIOCSTI功能的情况下实现相同的效果。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959492&idx=1&sn=6ad5393d06789aa6b7a53f42180bb850&chksm=8baed05bbcd9594de2d4f519f4c0e73642918722aa6bd57427d31dc13a67c3979b45295e27f0&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh