每日安全动态推送(3-7)
2024-3-7 17:2:40 Author: mp.weixin.qq.com(查看原文) 阅读量:5 收藏

Tencent Security Xuanwu Lab Daily News

• Multilaser RE160V Header Manipulation Access Bypass:
https://packetstormsecurity.com/files/177391

   ・ 该文章披露了Multilaser路由器Web管理界面中的一个新漏洞,通过头部操纵绕过访问控制。文章详细分析了漏洞的根本原因,并提供了利用漏洞所需的利用或POC – SecTodayBot

• EMBA v1.4.0 - ICS testing Edt.:
https://github.com/e-m-b-a/emba/releases/tag/1.4.0-ICS-testing-edt

   ・ EMBA发布了最新版本v1.4.0,增加了许多新功能,包括通过semgrep进行扩展的二进制分析,通过zarn进行新的静态perl分析,工具链识别,改进的更新检查,新的扫描界面等。 – SecTodayBot

• Secure by Design: Google’s Perspective on Memory Safety:
http://security.googleblog.com/2024/03/secure-by-design-googles-perspective-on.html

   ・ 该文章主要讨论了谷歌对内存安全漏洞的观点以及他们对内存安全语言的投资。文章详细分析了内存安全漏洞的根本原因,讨论了实现内存安全的可能方法,并提到了对常用编程语言的选择和安全改进。  – SecTodayBot

• KL-001-2024-004: Artica Proxy Loopback Services Remotely Accessible Unauthenticated:
https://seclists.org/fulldisclosure/2024/Mar/14

   ・ 该文章披露了Artica Proxy存在的新漏洞,包括了漏洞的详细技术描述和利用该漏洞的POC。  – SecTodayBot

• JetBrains TeamCity Unauthenticated RCE exploit module (CVE-2024-27198) by sfewer-r7 · Pull Request #18922 · rapid7/metasploit-framework:
https://github.com/rapid7/metasploit-framework/pull/18922

   ・ 该文章介绍了针对JetBrains TeamCity的新漏洞(CVE-2024-27198),并提供了详细的漏洞分析和利用示例  – SecTodayBot

• DarkWidow: a Dropper/Post Exploitation Tool targeting Windows:
https://securityonline.info/darkwidow-a-dropper-post-exploitation-tool-targeting-windows/

   ・ DarkWidow是一个针对Windows系统的Dropper/Post Exploitation工具,其功能包括远程进程注入、EDR/Ring-3/UserLand hook Bypass等技术。  – SecTodayBot

• Nullcon Goa 2023 | Jailbreaking The Apple HomePod: Fun With Checkm8 And Smart Speakers.:
https://www.youtube.com/watch?feature=shared&v=C04YXQk3zlE

   ・ 介绍了利用Checkm8漏洞对Apple HomePod进行越狱的过程 – SecTodayBot

• The main idea behind the VoltSchemer attacks:
https://kas.pr/rp8c

   ・ 该文章披露了一项有关使用Qi无线充电器进行VoltSchemer攻击的研究。研究详细分析了这种攻击的原因,即Qi标准通信中缺乏加密,使得充电器和智能手机之间的通信容易受到中间人攻击。 – SecTodayBot

• oss-security - dnf5daemon-server: Local root Exploit and Local Denial-of-Service in dnf5 D-Bus Components (CVE-2024-1929, CVE-2024-1930):
https://www.openwall.com/lists/oss-security/2024/03/04/2

   ・ 介绍了dnf5 D-Bus组件中的本地root漏洞利用和拒绝服务问题 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959547&idx=1&sn=aa2cf9e8c22b5dec62fff60720ca9ba9&chksm=8baed064bcd95972951ca1c3c9b5414816b9f1673e6450de2d54891318396776f99f8ea500a5&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh