每日安全动态推送(4-29)
2024-4-29 12:25:21 Author: mp.weixin.qq.com(查看原文) 阅读量:3 收藏

Tencent Security Xuanwu Lab Daily News

• Telegram Web app XSS / Session Hijacking 1-click:
https://seclists.org/oss-sec/2024/q2/183

   ・ Telegram Web应用程序中的新漏洞,详细分析了漏洞的根本原因并提供了利用漏洞的设置和修补程序提交。 – SecTodayBot

• Embed A Malicious Executable in a Normal PDF or EXE:
https://medium.com/@sam.rothlisberger/embed-a-malicious-executable-in-a-normal-pdf-or-exe-81ee5339707e

   ・ 如何将恶意可执行文件嵌入普通PDF或EXE文件中,从而在不引起用户怀疑的情况下执行恶意代码。 – SecTodayBot

• Horacius (IAM) - Local privilege escalation, even without a Windows account.:
https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation/

   ・ 揭示了E-TRUST开发的Horacius (IAM)系统中的一个严重漏洞(CVE-2024-29417),使得攻击者可以在未登录Windows的情况下通过特定功能提升权限,进而完全控制Windows操作系统。 – SecTodayBot

• CrimsonEDR - Simulate The Behavior Of AV/EDR For Malware Development Training:
https://dlvr.it/T67Gsm

   ・ CrimsonEDR是一个开源项目,旨在识别特定恶意软件模式,为了改进绕过终端检测和响应(EDR)的技能,并通过使用各种检测方法,使用户能够深入了解安全逃避策略。 – SecTodayBot

• Suspicious hook-loading mechanism in hyprland:
https://seclists.org/oss-sec/2024/q2/182

   ・ 讨论了hyprland软件中可疑的hook-loading机制,揭示了潜在的漏洞信息,并详细分析了其实现和潜在风险。 – WireFish

• Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller:
https://www.cyberark.com/resources/threat-research-blog/your-nvme-had-been-syzed-fuzzing-nvme-of-tcp-driver-for-linux-with-syzkaller

   ・ 使用syzkaller来探索NVMe-oF/TCP子系统中的漏洞,最终发现了五个新的漏洞。 – SecTodayBot

• CVE-2024-21111 – Local Privilege Escalation in Oracle VirtualBox:
https://www.mdsec.co.uk/2024/04/cve-2024-21111-local-privilege-escalation-in-oracle-virtualbox/

   ・ Local Privilege Escalation in Oracle VirtualBox – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号: 腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959622&idx=1&sn=d9df90f6cf8f1ccaedfe506f9e667ca7&chksm=8baed1d9bcd958cf2ef80ccbd792e0d9eb0f85012edf9bdb5d2b7b0f318caf9b527af09ee307&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh