每日安全动态推送(6-13)
2024-6-13 17:24:57 Author: mp.weixin.qq.com(查看原文) 阅读量:7 收藏

Tencent Security Xuanwu Lab Daily News

• Microsoft Urges Windows Admins to Patch Microsoft Message Queuing RCE Flaw:
https://gbhackers.com/microsoft-message-queuing-rce-flaw/

   ・ 微软披露了两个关键的远程代码执行漏洞,分别位于Microsoft Message Queuing和Windows Wi-Fi Driver。 – SecTodayBot

• CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability:
https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29824-deep-dive-ivanti-epm-sql-injection-remote-code-execution-vulnerability/

   ・ 揭示了Ivanti Endpoint Manager中的SQL注入漏洞,提供了利用该漏洞的POC – SecTodayBot

• MagicDot: Exploiting Windows Paths for Rootkit Power:
https://meterpreter.org/magicdot-exploiting-windows-paths-for-rootkit-power/

   ・ MagicDot是一个Python软件包,实现了类似rootkit的技术,包括利用DOT-to-NT路径转换已知问题的漏洞。 – SecTodayBot

• Zoom Session Takeover - Cookie Tossing Payloads, OAuth Dirty Dancing, Browser Permissions Hijacking, and WAF abuse:
https://nokline.github.io/bugbounty/2024/06/07/Zoom-ATO.html

   ・ 揭示了Zoom会话和基于web的权限劫持相关的新漏洞信息,详细分析了XSS和cookie字符串解析的根本原因 – SecTodayBot

• CVE-2024-27801: Critical Vulnerability Discovered in Apple Ecosystem, PoC Published:
https://securityonline.info/cve-2024-27801-critical-vulnerability-discovered-in-apple-ecosystem-poc-published/

   ・ 苹果生态系统中发现了一个关键性漏洞CVE-2024-27801,影响多个平台,包括macOS Sonoma、iOS/iPadOS和visionOS。该漏洞的潜在影响很大,可能提升权限,授予恶意应用对系统服务和敏感用户数据的未经授权访问。 – SecTodayBot

• Stepping Stones – A Red Team Activity Hub:
https://research.nccgroup.com/2024/06/12/stepping-stones-a-red-team-activity-hub/

   ・ 一篇介绍开源工具Stepping Stones的文章,该工具用于帮助Red团队记录活动并与Blue团队的日志进行关联。工具具有活动记录、Cobalt Strike和BloodHound集成以及凭据管理等功能。 – SecTodayBot

• Microsoft’s Copilot+ AI PCs: Still a privacy disaster waiting to happen:
https://www.computerworld.com/article/2140400/microsofts-copilot-ai-pcs-are-a-privacy-disaster-waiting-to-happen.html

   ・ Windows PC新功能Recall引发了隐私和安全问题的讨论 – SecTodayBot

• Lateral Movement with the .NET Profiler:
https://posts.specterops.io/lateral-movement-with-the-net-profiler-8772c86f9523

   ・ 如何使用.NET Profiler来hook和instrumentation .NET进程,主要讨论了在.NET应用程序中进行fuzz测试的新方法。 – SecTodayBot

• Fly Phishing:
https://posts.specterops.io/fly-phishing-7d4fb56ac325?source=rss----f05f8696e3cc---4

   ・ 介绍了如何绕过垃圾邮件过滤器进行钓鱼,强调了绕过内容过滤器的策略和技巧。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号: 腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959691&idx=1&sn=2746d0df8049d0d8a760aeae2affbef7&chksm=8baed114bcd95802d0285a4143f3fa007acad47efe41ded2405e1818e811f28a0c8dc6c92104&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh