PyBot/resources/JSON/doonsec.json

1602 lines
82 KiB
JSON
Raw Normal View History

2025-01-06 14:26:37 +08:00
[
2025-01-06 17:06:15 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "新型 SuperBlack 勒索软件利用 Fortinet 身份验证绕过漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MjE2Mjk3Ng==&mid=2247488660&idx=2&sn=63345a27dc61a97ef893111b5b4d181b",
"description": "赛欧思安全资讯(2025-03-14)",
"author": "赛欧思安全研究实验室",
"category": "赛欧思安全研究实验室",
"pubDate": "2025-03-14T10:31:40"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Tomcat远程代码执行CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NzkxOTQ0OA==&mid=2247484529&idx=1&sn=23e7cc25ead1d292cdab7e4b17274901",
"description": "Apache Tomcat远程代码执行内含脚本CVE-2025-24813",
"author": "菜鸟学渗透",
"category": "菜鸟学渗透",
"pubDate": "2025-03-14T10:14:32"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "实战案例!记一次攻防演练突破",
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491695&idx=1&sn=e5e22f6e10efb0bac0a140bfcb282ae3",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "实战安全研究",
"category": "实战安全研究",
"pubDate": "2025-03-14T10:00:53"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "实战案例!记一次攻防演练突破",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650609133&idx=3&sn=50085f1992eff3e931ec947c9a698682",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2025-03-14T09:58:25"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "ZZCMS index.php SQL注入漏洞(CVE-2025-0565)",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247490752&idx=1&sn=da298ccc69cdf87ee27c66bb7ed9f292",
"description": "ZZCMS index.php 接口处存在SQL注入漏洞攻击者除了可以利用 SQL 注入漏洞获取数据库中的信息(例如,管理员后台密码、站点的用户个人信息)之外,甚至在高权限的情况可向服务器中写入木马,进一步获取服务器系统权限。",
"author": "nday POC",
"category": "nday POC",
"pubDate": "2025-03-14T09:57:18"
},
{
"title": "WebKit零日漏洞被利用开展“极其复杂”定向攻击苹果紧急修复",
"link": "https://mp.weixin.qq.com/s?__biz=MzIwNzAwOTQxMg==&mid=2652251539&idx=1&sn=029db25bda034ac4be3a6e0161359e86",
"description": "Apple近日发布紧急安全更新修复了WebKit跨平台网络浏览器引擎中一个零日漏洞CVE-2025-24201。该漏洞是一个越界写入问题已被用于针对特定目标个人的\\\\x26quot;极其复杂\\\\x26quot;的网络攻击中。",
"author": "汇能云安全",
"category": "汇能云安全",
"pubDate": "2025-03-14T09:55:59"
},
{
"title": "GitLab修复了CE和EE版本中的关键身份验证绕过漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247493386&idx=1&sn=28cc92528c8b791397f67f5b395b048f",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "黑猫安全",
"category": "黑猫安全",
"pubDate": "2025-03-14T09:33:59"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "专家警告称利用SSRF漏洞的攻击尝试正出现协同激增",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247493386&idx=2&sn=81f731575797392174d9c575bd038692",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "黑猫安全",
"category": "黑猫安全",
"pubDate": "2025-03-14T09:33:59"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "与朝鲜有关的APT组织ScarCruft被发现使用新型Android间谍软件KoSpy",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTc0NDcyNQ==&mid=2247493386&idx=5&sn=891325c1488d85c50ff41e8b3be0fece",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "黑猫安全",
"category": "黑猫安全",
"pubDate": "2025-03-14T09:33:59"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "逆向思维实现家庭WinNAS安全外网访问CDN去端口+HTTPS加密方案与那些被忽视的隐患",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2MjU2MzI3MA==&mid=2247484599&idx=1&sn=2da2dfc32ad3bb6f64952640f512cc46",
"description": "文章主要介绍了在家庭网络环境变化后如何重新设计远程访问家庭NAS的方案。由于家宽从千兆降为300Mbps且失去了动态公网IPv4原有的远程访问方案不再适用。新的方案旨在解决动态公网IP不稳定、运营商封锁端口及HTTP明文传输的安全隐患。",
"author": "内存泄漏",
"category": "内存泄漏",
"pubDate": "2025-03-14T09:23:38"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "工具集Fiora【漏洞PoC框架图形版的Nuclei】",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485687&idx=1&sn=cf3a87af5a7ac1c00532e6685cf6d31e",
"description": "漏洞PoC框架Nuclei的图形版。快捷搜索PoC、一键运行Nuclei。即可作为独立程序运行也可作为burp插件使用。一键运行等功能提升nuclei的使用体验。",
"author": "风铃Sec",
"category": "风铃Sec",
"pubDate": "2025-03-14T08:42:56"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "18个API渗透测试技巧及工具2025实战手册",
"link": "https://mp.weixin.qq.com/s?__biz=MzIwMzIyMjYzNA==&mid=2247518221&idx=1&sn=3c5fc851a9496855a567d45e3f2f9616",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "HACK之道",
"category": "HACK之道",
"pubDate": "2025-03-14T08:40:17"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "使用S/MIME端到端加密以保护电子邮件",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzI4OTkyNw==&mid=2247489627&idx=1&sn=ceddd4b71b5aaf525c1b453d09d4bb1f",
"description": "使用S/MIME保护电子邮件。",
"author": "墨雪飘影",
"category": "墨雪飘影",
"pubDate": "2025-03-14T08:35:47"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞挖掘案例】18w身份证泄露某211高校信息泄露导致的RCE影响全校用户",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNzY5MTg1Ng==&mid=2247486114&idx=1&sn=098287b613d67220426c372221f0cb66",
"description": "18w身份证泄露某211高校信息泄露导致的RCE影响全校用户",
"author": "富贵安全",
"category": "富贵安全",
"pubDate": "2025-03-14T08:31:12"
},
{
"title": "vulnhub靶场之fristileaks靶机",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxNTg1MDYxNA==&mid=2247490697&idx=1&sn=96527927991ea9576fab2b36876cab46",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "泷羽sec-何生安全",
"category": "泷羽sec-何生安全",
"pubDate": "2025-03-14T08:30:51"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次攻防演练突破",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDM4NDM5Ng==&mid=2247491222&idx=1&sn=bd2ee67026a598a81661b6e44aa40609",
"description": "在给定的靶标进行外网信息收集有一处老旧站点网站架构为iis+asp.net+mssql搜索框处存在sql注入漏洞尝试sqlmap检出3类注入",
"author": "安全洞察知识图谱",
"category": "安全洞察知识图谱",
"pubDate": "2025-03-14T08:30:47"
},
{
"title": ".NET 一种尚未公开绕过 SQL 全局防注入拦截的方法",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyOTc3NTQ5MA==&mid=2247499125&idx=2&sn=5a877b7d674007fda1fd0f00ac669f6c",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "dotNet安全矩阵",
"category": "dotNet安全矩阵",
"pubDate": "2025-03-14T08:23:54"
},
{
"title": "深度剖析苹果WebKit零日漏洞CVE-2025-24201如何被用于复杂攻击",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447900305&idx=1&sn=bc47cec112a10af66c5e153d6f9cc82f",
"description": "近日苹果公司发布紧急安全更新修复了WebKit浏览器引擎中的一个零日漏洞CVE-2025-24201。苹果罕见地指出该漏洞已被用于针对特定个体的“极其复杂的攻击”但出于安全考虑并未公布攻击细节。",
"author": "技术修道场",
"category": "技术修道场",
"pubDate": "2025-03-14T08:04:14"
},
{
"title": "漏洞预警 | Apache Tomcat远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492540&idx=1&sn=46ce2da0e24482730a74b36361f69238",
"description": "Apache Tomcat存在远程代码执行漏洞在特定条件下攻击者可上传文件以访问敏感内容从而导致远程代码执行、信息泄露或数据篡改等安全问题。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-14T08:01:36"
},
{
"title": "漏洞预警 | Apache Ofbiz模板引擎注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492540&idx=2&sn=46a423702ec6f44cab8ec8617ac3f1b8",
"description": "Apache OFBiz存在模板引擎注入漏洞攻击者可能利用此漏洞执行恶意操作甚至运行任意代码。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-14T08:01:36"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "提升日志系统范化效率的实践探索",
"link": "https://mp.weixin.qq.com/s?__biz=MzAwNTgyODU3NQ==&mid=2651131602&idx=1&sn=62d2a3e1d65bd2c140ee7b106a72e2d1",
"description": "日志规范化效率不仅关系到企业信息安全,也是保障业务连续性的关键。",
"author": "威努特安全网络",
"category": "威努特安全网络",
"pubDate": "2025-03-14T07:59:25"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "u200b【漏洞处置SOP】Apache Tomcat远程代码执行漏洞CVE-2025-24813处置建议",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0OTQzMDI4Mg==&mid=2247484674&idx=1&sn=2b29d399d90a3545634fc10774adb470",
"description": "安全漏洞防治中心团队成员已编制了升级到安全版本的标准作业程序SOP并已完成验证成功地将 Apache Tomcat 9.0.98 升级到安全版本 9.0.102。",
"author": "方桥安全漏洞防治中心",
"category": "方桥安全漏洞防治中心",
"pubDate": "2025-03-14T07:58:46"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "某企业壳frida检测另辟蹊径的绕过",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247487417&idx=1&sn=e9ec4e1a36f3fc92907d0c1e9f555b5c",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "进击的HACK",
"category": "进击的HACK",
"pubDate": "2025-03-14T07:55:18"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "『代码审计』某OA系统.NET代码审计",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNjMwNDUxNg==&mid=2247487417&idx=2&sn=6da0011e1d07a591ca9ea077aef60839",
"description": "记录某OA系统.NET审计过程",
"author": "进击的HACK",
"category": "进击的HACK",
"pubDate": "2025-03-14T07:55:18"
},
{
"title": "Venomous Bear APT 攻击模拟",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247505675&idx=1&sn=c46ef6358de254daf0e405132717fbaa",
"description": "这是 (Venomous Bear) APT 组织针对美国、德国和阿富汗的攻击模拟,攻击活动至少从 2020 年开始活",
"author": "安全狗的自我修养",
"category": "安全狗的自我修养",
"pubDate": "2025-03-14T07:18:37"
},
{
"title": "APIKit扫描API文档泄露的burp插件",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2MzkwNDU1Mw==&mid=2247485504&idx=1&sn=bda4eee8fcb148d277f3d54b8c4c697c",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "信安路漫漫",
"category": "信安路漫漫",
"pubDate": "2025-03-14T07:00:26"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Tomcat 反序列化代码执行 | CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=MzA5OTA0MTU4Mg==&mid=2247486173&idx=1&sn=964d41cd89d30010f8fd73946a6714ff",
"description": "yyds",
"author": "南街老友",
"category": "南街老友",
"pubDate": "2025-03-14T01:22:06"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "JsRpc联动burp实现自动加解密详细版",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247519539&idx=1&sn=00cf68809f4f4596cb9c12019a4cfa6e",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "船山信安",
"category": "船山信安",
"pubDate": "2025-03-14T00:01:02"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "为渗透测试而生的ssh面板|漏洞探测",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3ODE2MjkxMQ==&mid=2247490519&idx=1&sn=5eafc34f0f9558de0508085e2b8f74b7",
"description": "传统的ssh工具存在多种问题此工具就是为了简化红队人员在渗透测试过程中的繁琐操作而设计。",
"author": "渗透安全HackTwo",
"category": "渗透安全HackTwo",
"pubDate": "2025-03-14T00:00:43"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次双向认证绕过",
"link": "https://mp.weixin.qq.com/s?__biz=MzU3Mjk2NDU2Nw==&mid=2247492964&idx=1&sn=0dc0b6254eccafa1e1f829e86902f119",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "湘安无事",
"category": "湘安无事",
"pubDate": "2025-03-13T23:36:16"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "工具|Burp插件-短信轰炸 Bypass",
"link": "https://mp.weixin.qq.com/s?__biz=MzU3Mjk2NDU2Nw==&mid=2247492964&idx=3&sn=1ba92fb61769f54c9548066ea4cdf366",
"description": "昱子师傅的短信轰炸绕过的Burpsite插件",
"author": "湘安无事",
"category": "湘安无事",
"pubDate": "2025-03-13T23:36:16"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Wazuh4.7部署",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2MDI0NTM2Nw==&mid=2247490175&idx=1&sn=564c04230d550494ea70ebca42ae3143",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全孺子牛",
"category": "安全孺子牛",
"pubDate": "2025-03-13T22:45:02"
},
{
"title": "Hacking a VW Golf EPS - Part 1",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MzQzNzMxOA==&mid=2247487851&idx=1&sn=1df9a5b9efa9ee2c50a279f079ab6337",
"description": "修改2010年大众高尔夫MK6的电子动力转向EPSECU固件的经历",
"author": "安全脉脉",
"category": "安全脉脉",
"pubDate": "2025-03-13T21:53:23"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Rust后门样本加载与传播方式演变过程分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NjYzMDM1Mg==&mid=2247524579&idx=1&sn=4fd63ec101952bc5ae6933d368e97645",
"description": "近年来随着Rust语言在系统编程领域的广泛应用基于该语言开发的恶意软件样本也随之显著增长其特有的技术特性正逐渐成为网络犯罪分子的新选择主要表现为以下几点",
"author": "火绒安全",
"category": "火绒安全",
"pubDate": "2025-03-13T20:26:05"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "VBS/SMEP 绕过,消灭 Windows 内核缓解措施",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247487712&idx=1&sn=a3834f72d3b1fa52802e7ff689930a23",
2025-01-22 14:03:36 +08:00
"description": null,
"author": "securitainment",
"category": "securitainment",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-13T20:25:30"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Docker逃逸方式总结分享",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTYwMTk4Mw==&mid=2247488561&idx=1&sn=32c248a4b7c280c9587ae5aa75471cd7",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "网安探索员",
"category": "网安探索员",
"pubDate": "2025-03-13T20:00:48"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "渗透测试加解密 - mitmproxy-gui",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNTE0Mzc0OA==&mid=2247486157&idx=1&sn=9beddb5d2c9cf1076f1d3f170cd9d8ec",
"description": "一个基于 Mitmproxy 的 GUI 工具,支持多种加密算法的请求拦截和修改。",
"author": "GSDK安全团队",
"category": "GSDK安全团队",
"pubDate": "2025-03-13T19:30:50"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Tomcat远程代码执行漏洞(CVE-2025-24813)",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0OTcyODM3NA==&mid=2247484043&idx=1&sn=10941231c7611c9a29d3c1da54ef8398",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全技术达人",
"category": "安全技术达人",
"pubDate": "2025-03-13T19:09:02"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【安全圈】PHP XXE 注入漏洞让攻击者读取配置文件和私钥",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652068467&idx=2&sn=8209e2048ee474d6b91f16029aa9c134",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全圈",
"category": "安全圈",
"pubDate": "2025-03-13T19:00:26"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【安全圈】施乐打印机漏洞使攻击者能够从 LDAP 和 SMB 中获取身份验证数据",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652068467&idx=3&sn=a464bcdd8889a7e0e65921296df9fdd8",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全圈",
"category": "安全圈",
"pubDate": "2025-03-13T19:00:26"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】Apache Camel绕过/注入漏洞(CVE-2025-29891)",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489766&idx=2&sn=6f177e50f2b4c15cd06162ddd51e5386",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "飓风网络安全",
"category": "飓风网络安全",
"pubDate": "2025-03-13T18:50:37"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Zoom客户端惊现高危漏洞数百万用户数据或泄露",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458590760&idx=2&sn=0a7aeb5d4d57669042d37bf081806d7e",
"description": "Zoom客户端被曝出多个高危漏洞可能导致数据泄露和未授权访问用户需尽快更新软件。",
"author": "看雪学苑",
"category": "看雪学苑",
"pubDate": "2025-03-13T17:59:47"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "关于防范针对DeepSeek本地化部署实施网络攻击的风险提示",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NDA3ODY4Ng==&mid=2247488887&idx=2&sn=fcef25a6329622c6175ccee957bdfd0f",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "信息新安全",
"category": "信息新安全",
"pubDate": "2025-03-13T16:02:05"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "ruby-saml 身份认证绕过漏洞(CVE-2025-25291、CVE-2025-25292)安全风险通告",
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247503162&idx=2&sn=8cdebf57c6043395f1047ecde66a85e1",
"description": "致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。",
"author": "奇安信 CERT",
"category": "奇安信 CERT",
"pubDate": "2025-03-13T15:25:22"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "JAVA代码审计之权限绕过",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247489156&idx=1&sn=3fed7fc905f2de5bb29eb80b60117288",
"description": "用了getRequestURI来接收url该方法本来就不安全此处配合startsWith导致权限绕过。以下代码大概意思是如果请求链接以(/admin开头)且(不为/admin/login开头)",
"author": "星悦安全",
"category": "星悦安全",
"pubDate": "2025-03-13T13:51:32"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "告别流量拦截!手把手教你配置哥斯拉动态特征",
"link": "https://mp.weixin.qq.com/s?__biz=MzU0NDc0NTY3OQ==&mid=2247488532&idx=1&sn=1d459ce58b89f242536887c1447d94f1",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "老鑫安全",
"category": "老鑫安全",
"pubDate": "2025-03-13T13:40:31"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞复现】(CVE-2025-24813)Apache Tomcat 远程代码执行漏洞复现",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0OTY2ODE1NA==&mid=2247485154&idx=1&sn=cf980e0bc9741288fd39be9c152c876d",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Z0安全",
"category": "Z0安全",
"pubDate": "2025-03-13T13:29:15"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "某APP加密解密",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MDg5ODIzNQ==&mid=2247483983&idx=1&sn=0b7abeb10a0c2b6fe158bf6a985fd3bb",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "BH安全",
"category": "BH安全",
"pubDate": "2025-03-13T12:26:35"
2025-01-06 17:06:15 +08:00
},
2025-01-06 14:26:37 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "滥用 VBS Enclaves 创建规避恶意软件",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247528489&idx=1&sn=a0a158ad7c1585be7e5074d43954bcd7",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-03-13T12:14:26"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "复现完毕 | Apache Tomcat远程代码执行内含脚本CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NzQxNzY2OQ==&mid=2247488897&idx=1&sn=128e4801770144c95ba451886654ac3d",
"description": "犀利猪安全,带你上高速~",
"author": "犀利猪安全",
"category": "犀利猪安全",
"pubDate": "2025-03-13T11:51:38"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "如何提高群晖NAS外网访问的连接安全性",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2MjU2MzI3MA==&mid=2247484594&idx=1&sn=3c5318776e25bf47d4260cd5f36cbd9c",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "内存泄漏",
"category": "内存泄漏",
"pubDate": "2025-03-13T11:15:51"
2025-01-06 14:26:37 +08:00
},
2025-01-06 17:06:15 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "突破后缀限制实现任意文件上传",
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491691&idx=1&sn=ca03b792096d0780c894b804510a2bf0",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "实战安全研究",
"category": "实战安全研究",
"pubDate": "2025-03-13T10:42:16"
2025-01-06 17:06:15 +08:00
},
2025-01-06 14:26:37 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "黑客利用高级MFA绕过技术入侵用户账户",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523809&idx=1&sn=6c2cb03ffaa32a18da11be5c57c191bd",
"description": "黑客利用高级MFA绕过技术入侵用户账户",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-13T10:42:00"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Ballista僵尸网络利用未修补的TP-Link漏洞攻击超6000台设备",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523809&idx=3&sn=e0c97001d98173e0ee1c1b2039939e43",
"description": "Ballista僵尸网络利用未修补的TP-Link漏洞攻击超6000台设备",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-13T10:42:00"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "还在用传统方法防护网站实操雷池带您体验DDoS、漏洞、API攻击防护新高度",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2MTg2NzI5OA==&mid=2247484908&idx=1&sn=492b0d17cda9cb8eb4a8865b258f2e14",
"description": "评价:无敌",
"author": "黑熊安全",
"category": "黑熊安全",
"pubDate": "2025-03-13T09:00:56"
2025-01-06 14:26:37 +08:00
},
2025-01-06 17:06:15 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "日本警察厅披露MirrorFace APT 组织的攻击活动",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649794492&idx=1&sn=3ad31b6fc2ac1785bf6874d4fcf02ec5",
"description": "黑客利用windows 沙盒攻击日本目标",
"author": "军哥网络安全读报",
"category": "军哥网络安全读报",
"pubDate": "2025-03-13T09:00:43"
},
{
"title": "Mandiant 发现停产 Juniper 路由器上的自定义后门",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649794492&idx=2&sn=cc66f241a2f866678a3a36452ef0b0fc",
"description": "后门被植入到过期或报废的硬件中。",
"author": "军哥网络安全读报",
"category": "军哥网络安全读报",
"pubDate": "2025-03-13T09:00:43"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "APT攻击全链溯源基于多阶段载荷投递的Windows 11定向渗透技术深度解构",
"link": "https://mp.weixin.qq.com/s?__biz=MzAwMjQ2NTQ4Mg==&mid=2247497915&idx=1&sn=48a2ff69e58f913b0c1ecbcdeb2e2a22",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Khan安全团队",
"category": "Khan安全团队",
"pubDate": "2025-03-13T08:42:08"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "vulnhub靶场之devguru靶机两个cve的利用及复现",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxNTg1MDYxNA==&mid=2247490642&idx=1&sn=629db589e9823acdf55e2789e7cb3ea6",
"description": null,
2025-01-22 14:03:36 +08:00
"author": "泷羽sec-何生安全",
"category": "泷羽sec-何生安全",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-13T08:31:03"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "一次就学会网络钓鱼“骚”姿势",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDM4NDM5Ng==&mid=2247491193&idx=1&sn=4caff4cd05e9ddf42626608e1cc6635e",
2025-01-06 17:06:15 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全洞察知识图谱",
"category": "安全洞察知识图谱",
"pubDate": "2025-03-13T08:31:02"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "某付宝登录js分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMTIzNTM0MA==&mid=2247497269&idx=1&sn=91b4db853c028312be50352cfbb7e8e1",
"description": "某付宝登录js分析",
"author": "迪哥讲事",
"category": "迪哥讲事",
"pubDate": "2025-03-13T08:30:54"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "深度揭秘 | “盲鹰”APT组织如何利用Windows漏洞和代码托管平台渗透哥伦比亚",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447900296&idx=1&sn=06182175bd5370f0e140f737999ff90f",
"description": "Check Point 发布深度报告揭露了“盲鹰”Blind Eagle又称 APT-C-36黑客组织针对哥伦比亚的复杂网络攻击活动。自2024年11月以来该组织持续发动攻击并在12月19日左右达到高峰受害者超过1600人。",
"author": "技术修道场",
"category": "技术修道场",
"pubDate": "2025-03-13T08:14:33"
2025-01-06 17:06:15 +08:00
},
2025-01-06 14:26:37 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "GoSearch 【数字足迹及泄露密码追踪 OSINT工具】",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247489619&idx=1&sn=6289e1279ea3cb39e75d68ac5b0e2efa",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "白帽学子",
"category": "白帽学子",
"pubDate": "2025-03-13T08:11:50"
2025-01-06 14:26:37 +08:00
},
2025-01-06 17:06:15 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "Wireshark TS | 关闭连接和超时重传",
"link": "https://mp.weixin.qq.com/s?__biz=MzA5NTUxODA0OA==&mid=2247493327&idx=1&sn=62a3a868dc2cbe3e4c023e5267043d02",
"description": "Wireshark Troubleshooting 系列 87",
"author": "Echo Reply",
"category": "Echo Reply",
"pubDate": "2025-03-13T08:08:40"
2025-01-06 17:06:15 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "深度XSS漏洞扫描器",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247493794&idx=1&sn=3f3e2f673bfe8fc35c07ee0c5d5fe7b1",
"description": null,
"author": "夜组安全",
"category": "夜组安全",
"pubDate": "2025-03-13T08:00:32"
2025-01-06 17:06:15 +08:00
},
2025-01-06 14:26:37 +08:00
{
2025-03-14 11:50:28 +08:00
"title": "CTF web 解题思路",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655270342&idx=3&sn=b9cfdef795c1640156040d78b75c23cc",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "计算机与网络安全",
"category": "计算机与网络安全",
"pubDate": "2025-03-13T07:58:09"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Windows应急响应及隐患排查",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655270342&idx=4&sn=c84ced83495ebf7e918eadeaa81caa38",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "计算机与网络安全",
"category": "计算机与网络安全",
"pubDate": "2025-03-13T07:58:09"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | GeoServer远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492522&idx=1&sn=3744e231bd2aaf323f5d4c0a37c1e6e0",
"description": "GeoServer的/geoserver/topp/wfs接口存在远程代码执行漏洞未经身份验证的攻击者可以通过该漏洞远程执行任意代码从而控制目标服务器。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-13T07:50:47"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | OfficeWeb365任意文件读取漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492522&idx=2&sn=07f7a0ffc857dc08e64a0f78def152d5",
"description": "OfficeWeb365的/wordfix/Index接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取大量敏感信息。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-13T07:50:47"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "CVE-2025-24813 Apache Tomcat 远程命令执行漏洞分析与总结",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NTU5Mjg0Ng==&mid=2247491632&idx=1&sn=4f849b8b77db48f26ab7dc6eee90092a",
"description": "该漏洞影响启动 DefaultServlet PUT 文件写入功能的 Tomcat 系统,可导致恶意文件写入并可能导致 RCE 。",
"author": "自在安全",
"category": "自在安全",
"pubDate": "2025-03-13T07:20:58"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "内网横向之RDP缓存利用",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247519500&idx=1&sn=a335bb55e26f706060d25df237568e22",
"description": null,
"author": "船山信安",
"category": "船山信安",
"pubDate": "2025-03-13T00:02:52"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Ruijie Networks RCE漏洞检测工具 -- RuijieRCE3月10日更新",
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MDQ5MjY1Mg==&mid=2247516288&idx=1&sn=27bd5116a43e345822f71cfe899c5e25",
"description": null,
"author": "Web安全工具库",
"category": "Web安全工具库",
"pubDate": "2025-03-13T00:01:03"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "JAVA代码审计之权限绕过",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NDg2MDIxNQ==&mid=2247485799&idx=1&sn=e679756e16bb95813778877d54b690da",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Jie安全",
"category": "Jie安全",
"pubDate": "2025-03-13T00:00:55"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "安卓逆向 -- 动态调试以及常规手段",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652038239&idx=1&sn=bd9d42b4633c6f16863f074533d957d0",
"description": null,
"author": "逆向有你",
"category": "逆向有你",
"pubDate": "2025-03-13T00:00:37"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "私有化部署的DeepSeek的漏洞利用、防范",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NDYwMDA1NA==&mid=2247544670&idx=2&sn=39645f644be0aa48e713c897542be525",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Hacking黑白红",
"category": "Hacking黑白红",
"pubDate": "2025-03-12T23:50:39"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "流量分析 - USB流量分析基础篇 (带一把梭工具)",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0NTg3ODYxNg==&mid=2247485406&idx=1&sn=8448aefa7ba00d699876446625c5d73b",
"description": "进入小美的电脑抓小美的USB数据包找到小美冷落我的证据。",
"author": "信安一把索",
"category": "信安一把索",
"pubDate": "2025-03-12T20:36:39"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "紧急Microsoft 修补了 57 个安全漏洞,包括 6 个被积极利用的零日漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNjIzMjM5Ng==&mid=2247490274&idx=1&sn=e2cd82077177a60dc46ad91a15a682e7",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "信息安全大事件",
"category": "信息安全大事件",
"pubDate": "2025-03-12T19:59:31"
},
{
"title": "工具更新Myosotis-免杀框架-1.1.0",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3MjU5MDc5MA==&mid=2247483778&idx=1&sn=0760dbde1f8ade9d914a675fb3ff4ae7",
"description": "最新链式加密功能更新,上亿种加密链助力免杀!",
"author": "小白安全",
"category": "小白安全",
"pubDate": "2025-03-12T19:16:17"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次漏洞挖掘过程中的SQL注入浅浅绕过记录",
"link": "https://mp.weixin.qq.com/s?__biz=MzIwMzIyMjYzNA==&mid=2247518209&idx=1&sn=c0d85b62621c3068befe75266f7b5abb",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "HACK之道",
"category": "HACK之道",
"pubDate": "2025-03-12T19:00:06"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】Fortinet多个产品前台远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489756&idx=1&sn=3e2882a2cbb0aa0a5791a908e7bb00c2",
"description": null,
"author": "飓风网络安全",
"category": "飓风网络安全",
"pubDate": "2025-03-12T18:57:30"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】万户网络ezOFFICE /selectAmountField.jsp存在SQL注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489756&idx=2&sn=4d27538590b82c13f97bc1732e9eda60",
"description": null,
"author": "飓风网络安全",
"category": "飓风网络安全",
"pubDate": "2025-03-12T18:57:30"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】MinIO身份验证缺陷漏洞 (CVE-2025-27414)",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489756&idx=3&sn=39c0b8a132b199a8d8dda341f09c51c2",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "飓风网络安全",
"category": "飓风网络安全",
"pubDate": "2025-03-12T18:57:30"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【风险通告】微软3月安全更新补丁和多个高危漏洞风险提示",
"link": "https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247490334&idx=1&sn=9361b4f5f44f08b5ed0ef6b3a30823c8",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安恒信息CERT",
"category": "安恒信息CERT",
"pubDate": "2025-03-12T18:34:09"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "工具更新Myosotis-免杀框架-1.1.0",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5ODYwODY3OA==&mid=2247484621&idx=1&sn=56a66a03da59bad930d5f46b510f16da",
"description": "最新链式加密功能更新,上亿种加密链助力免杀!",
"author": "攻有道",
"category": "攻有道",
"pubDate": "2025-03-12T18:32:13"
2025-01-22 14:03:36 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞通告】Fortinet多产品前台远程代码执行漏洞(CVE-2024-45324)",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NjgzNjA5NQ==&mid=2247524066&idx=2&sn=93a40ee8c5d3b9832561ea2de0fe1861",
"description": "2025年3月12日深瞳漏洞实验室监测到一则Fortinet多产品存在代码执行漏洞的信息漏洞编号CVE-2024-45324漏洞威胁等级高危。",
"author": "深信服千里目安全技术中心",
"category": "深信服千里目安全技术中心",
"pubDate": "2025-03-12T18:05:44"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "CVE-2025-24813——tomcat文件上传到反序列化",
"link": "https://mp.weixin.qq.com/s?__biz=MzUzNDMyNjI3Mg==&mid=2247487304&idx=1&sn=8d768aaff7b20e1d5776ad2f448b5752",
"description": "CVE-2025-24813是一个需要双特殊配置的漏洞其中一个还是臭名昭著的tomcat PUT这使得实战不可能碰得上。但漏洞原理和流程又比较简单适合新手复现学习。",
"author": "珂技知识分享",
"category": "珂技知识分享",
"pubDate": "2025-03-12T18:01:05"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "无壳app的libmsaoaidsec.so frida反调试绕过姿势",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458590751&idx=1&sn=3a5f5b3c1d41a36914abf745b355f9dc",
"description": "看雪论坛作者IDBiletonxa0xa0比尔顿",
2025-01-22 14:03:36 +08:00
"author": "看雪学苑",
"category": "看雪学苑",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-12T17:59:28"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【已复现】Apache Tomcat远程代码执行漏洞(CVE-2025-24813)",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MDk3MTgxOQ==&mid=2247499862&idx=1&sn=9d6b6a2f171c66a30923e8716b374b56",
"description": "此文章原创作者为源鲁安全实验室,转载请注明出处!此文章中所涉及的技术、思路和工具仅供网络安全学习为目的,不得以盈利为目的或非法利用,否则后果自行承担!",
"author": "源鲁安全实验室",
"category": "源鲁安全实验室",
"pubDate": "2025-03-12T17:40:48"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "浅谈DNS-rebinding",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTIwNTkyNg==&mid=2247554173&idx=1&sn=c91c23d22989ec2803d02b231d0b87b3",
2025-01-22 14:03:36 +08:00
"description": null,
"author": "蚁景网络安全",
"category": "蚁景网络安全",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-12T17:40:16"
},
{
"title": "实战案例!记一次攻防演练突破",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4NTUwMzM1Ng==&mid=2247513142&idx=1&sn=319a3880e8aab1f8b14a815401a04968",
"description": "近期一次攻防演练在给定的靶标进行外网信息收集有一处老旧站点网站架构为iis+asp.net+mssql",
"author": "潇湘信安",
"category": "潇湘信安",
"pubDate": "2025-03-12T17:20:28"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "vulnhub-DC-9 SQL注入、“ssh端口敲门”、hydra爆破",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk3NTIyOTA0OQ==&mid=2247484231&idx=1&sn=8ec2384b325ddac9d11b60595729a520",
"description": "vulnhub-DC-9 SQL注入、“ssh端口敲门”、hydra爆破",
"author": "泷羽Sec-朝阳",
"category": "泷羽Sec-朝阳",
"pubDate": "2025-03-12T17:09:57"
},
{
"title": "利用微软工具击败windows自带的防御系统",
"link": "https://mp.weixin.qq.com/s?__biz=MzAwMzYxNzc1OA==&mid=2247502047&idx=1&sn=c1a04bfdf83d879003fd53f059ee2690",
"description": null,
"author": "酒仙桥六号部队",
"category": "酒仙桥六号部队",
"pubDate": "2025-03-12T17:06:54"
},
{
"title": "SSTI之细说jinja2的常用构造及利用思路",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNTY3Nzc3Mg==&mid=2247489438&idx=1&sn=b71b26d4768a3c305ecbbd24852e95b5",
"description": "整理了一些SSTI常用的payload、利用思路以及题目结合题目分析以及自己的理解给大家提供一些参考。",
2025-01-06 14:26:37 +08:00
"author": "蚁景网安",
"category": "蚁景网安",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-12T16:30:53"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "XMLDecoder反序列化漏洞(CVE-2017-3506)",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNTUyOTk0NA==&mid=2247488614&idx=1&sn=e6928ac9088b72437b1f91c8cd977c57",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "智检安全",
"category": "智检安全",
"pubDate": "2025-03-12T16:05:17"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "汤姆猫最新CVE复现及分析",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5Mzk0MDE2Ng==&mid=2649608975&idx=1&sn=459fa83e455ee16847dcb7f8c47bd855",
"description": "近日北京天地和兴科技有限公司安全服务部监测到Apache发布安全公告修复了Apache Tomcat远程",
"author": "天地和兴",
"category": "天地和兴",
"pubDate": "2025-03-12T16:02:34"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "MassJacker恶意软件剪贴板劫持作案77.8万加密货币钱包被盗",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MDYwMjE3OQ==&mid=2247486289&idx=1&sn=e4eddf7e990460939c5a6984c1db656f",
"description": "MassJacker恶意软件通过剪贴板劫持手段利用至少778,531个加密货币钱包地址从被攻破的计算机中窃取数字资产。",
"author": "安全威胁纵横",
"category": "安全威胁纵横",
"pubDate": "2025-03-12T15:52:47"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | Apache Tomcat 存在远程代码执行漏洞CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzcxNTczNA==&mid=2247487041&idx=1&sn=fb038aa4f1e439a4799309bf67f1c0e1",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Beacon Tower Lab",
"category": "Beacon Tower Lab",
"pubDate": "2025-03-12T15:45:10"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次某大厂csrf漏洞通过蠕虫从低危到高危",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247519648&idx=1&sn=f91b30f18cf9b639b79e6bdbacae77ac",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "亿人安全",
"category": "亿人安全",
"pubDate": "2025-03-12T15:28:08"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "网康科技 NS-ASG 应用安全网关 add_postlogin.php SQL注入漏洞(CVE-2024-3455)",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247490723&idx=1&sn=24ca5d1e334b58987f9a46029045b6fd",
"description": "网康科技 NS-ASG 应用安全网关 add_postlogin.php接口处存在SQL注入漏洞未经身份验证的恶意攻击者利用 SQL 注入漏洞获取数据库中的信息之外,攻击者甚至可以在高权限下向服务器写入命令,进一步获取服务器系统权限。",
"author": "nday POC",
"category": "nday POC",
"pubDate": "2025-03-12T15:16:27"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞风险提示 | Apache Tomcat 远程代码执行漏洞 CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=MzAwNzk0NTkxNw==&mid=2247487102&idx=1&sn=14c3b1af5e899383072f554e754d61f7",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "边界无限",
"category": "边界无限",
"pubDate": "2025-03-12T14:29:27"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "警惕 Apache Camel 漏洞 攻击者借此能注入任意标头",
"link": "https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247581481&idx=2&sn=2a2b8413424b32da5743ddb9a2b5d0aa",
"description": "Apache Camel 中近期披露的一个安全漏洞(编号为 CVE - 2025 - 27636已引发整个网络安全社区的高度警惕。",
"author": "嘶吼专业版",
"category": "嘶吼专业版",
"pubDate": "2025-03-12T14:01:10"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "2025年3月微软补丁日多个高危漏洞安全风险通告",
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247497264&idx=1&sn=7778319f9181dd93bd746af37146a7a7",
"description": "近日嘉诚安全监测到Microsoft官方发布了3月份的安全更新公告共修复了57个漏洞鉴于漏洞危害较大嘉诚安全提醒广大Microsoft用户尽快下载补丁更新避免引发漏洞相关的网络安全事件。",
2025-01-22 14:03:36 +08:00
"author": "嘉诚安全",
"category": "嘉诚安全",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-12T13:19:33"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞通告】Apache Tomcat 远程代码执行漏洞安全风险通告",
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247497264&idx=2&sn=7a7d4506478b14ab6fca95c13c7df2b1",
"description": "近日嘉诚安全监测到Apache发布安全公告修复了一个Apache Tomcat 远程代码执行漏洞,鉴于漏洞危害较大,嘉诚安全提醒相关用户尽快更新至安全版本,避免引发漏洞相关的网络安全事件。",
"author": "嘉诚安全",
"category": "嘉诚安全",
"pubDate": "2025-03-12T13:19:33"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Sitecore 曝零日漏洞,可执行任意代码攻击",
"link": "https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247736&idx=1&sn=94a43ff967e452e1c4e0b95cf2f1b778",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "e安在线",
"category": "e安在线",
"pubDate": "2025-03-12T13:05:03"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Telegram bot token利用",
"link": "https://mp.weixin.qq.com/s?__biz=MzU5Mjk3MDA5Ng==&mid=2247486507&idx=1&sn=8dc5d9e5c41e9b4a395af6f5f0a50e69",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "军机故阁",
"category": "军机故阁",
"pubDate": "2025-03-12T12:53:53"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "如何隐藏服务器IP隐藏IP有什么好处",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMTMyOTg4NQ==&mid=2247484207&idx=1&sn=4a41f1699bab793e070aa0f2717ef556",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "护卫神说安全",
"category": "护卫神说安全",
"pubDate": "2025-03-12T12:41:42"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Electron桌面应用开发笔记",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484938&idx=1&sn=172768f1a0d7c3e018aa3dfd1434071f",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ting的安全笔记",
"category": "Ting的安全笔记",
"pubDate": "2025-03-12T12:07:10"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "HW蓝队面试题初、中级",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484938&idx=3&sn=c06feb79ef3624f0c40d975ebc7a2791",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ting的安全笔记",
"category": "Ting的安全笔记",
"pubDate": "2025-03-12T12:07:10"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Webshell管理工具流量特征抓包分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484938&idx=4&sn=0bdb056fed6d4a3eb38e37da2a315d40",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ting的安全笔记",
"category": "Ting的安全笔记",
"pubDate": "2025-03-12T12:07:10"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞通告】微软2025年3月安全更新通告",
"link": "https://mp.weixin.qq.com/s?__biz=MzI1NDQxMDE0NQ==&mid=2247485101&idx=1&sn=6986bcb4c4d1539b8ae87f9f58ad349e",
"description": null,
"author": "青藤实验室",
"category": "青藤实验室",
"pubDate": "2025-03-12T12:03:52"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "利用条件竞争绕过 HackerOne 2FA",
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247615654&idx=1&sn=f7f0230e2057f5ffad4d32d97de39f86",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "白帽子左一",
"category": "白帽子左一",
"pubDate": "2025-03-12T12:00:28"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【JAVA安全】JNDI漏洞分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMzYzNzIzNQ==&mid=2247485514&idx=1&sn=fe716b09168132088c149c3d30b0411e",
"description": "近年来JNDIJava Naming and Directory Interface相关的安全漏洞频繁成为企业级Java应用的重大威胁。",
"author": "安全驾驶舱",
"category": "安全驾驶舱",
"pubDate": "2025-03-12T11:10:35"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "微软2025年3月补丁星期二修复57个漏洞及6个被积极利用的零日漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523785&idx=1&sn=d9204ac4eb97a1fa3b62630468f0b2ba",
"description": "微软2025年3月补丁星期二修复57个漏洞及6个被积极利用的零日漏洞",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-12T11:06:59"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Pinot 漏洞允许攻击者绕过身份验证",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523785&idx=2&sn=6982914432650e6d5c6a7de32091284e",
"description": "Apache Pinot 漏洞允许攻击者绕过身份验证",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-12T11:06:59"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Lazarus 黑客将 6 个 npm 包武器化以窃取登录信息",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523785&idx=4&sn=caa17939c781f596359ee0b7d3844b91",
"description": "Lazarus 黑客将 6 个 npm 包武器化以窃取登录信息",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-12T11:06:59"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Src实战-垂直越权任意添加用户",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzM2MjM0OQ==&mid=2247496014&idx=1&sn=80e7bb9b8a12d79c988875586daa01f5",
"description": "Src实战分享",
"author": "隐雾安全",
"category": "隐雾安全",
"pubDate": "2025-03-12T10:30:26"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "『代码审计』某OA系统.NET代码审计",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650609014&idx=3&sn=20b9dac76b6fdbd6ac25c782c75920c0",
"description": "记录某OA系统.NET审计过程",
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2025-03-12T10:05:41"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "一个用于检测HOST 头攻击漏洞的Burp Suite扩展插件",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650609014&idx=4&sn=e37e7f249ac6a77610f8b9d9542182be",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2025-03-12T10:05:41"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Tomcat DefaultServlet rceCVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MjY2NTU4Mw==&mid=2247486550&idx=1&sn=b748fd6094e2100f4adbb6051d0ffdfa",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "e0m安全屋",
"category": "e0m安全屋",
"pubDate": "2025-03-12T10:04:40"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "『代码审计』某OA系统.NET代码审计",
"link": "https://mp.weixin.qq.com/s?__biz=MzU0MTc2NTExNg==&mid=2247491665&idx=1&sn=e22475df89d220dc33611cbf56b9ea41",
"description": "记录某OA系统.NET审计过程",
"author": "实战安全研究",
"category": "实战安全研究",
"pubDate": "2025-03-12T10:03:43"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Laravel 框架惊现高危漏洞,攻击者可肆意植入恶意脚本",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NTY0MjIwNg==&mid=2247485791&idx=1&sn=a733ed0ce50fa585954ff776ec3d140f",
"description": "Laravel 框架中出现了一个极为严重的安全漏洞(编号为 CVE-2024-13918。攻击者能够借此在运行该流行 PHP 框架特定版本的网站上,随意执行 JavaScript 代码。",
"author": "星尘安全",
"category": "星尘安全",
"pubDate": "2025-03-12T10:00:33"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "没有DNS下安装vCenter和日后如何修改",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyOTkzMjk1Ng==&mid=2247486270&idx=1&sn=7ac4dd1c5fc0ce5797fe7adbb4a0894d",
"description": "VCSA无DNS安装日后如何修正",
"author": "vExpert",
"category": "vExpert",
"pubDate": "2025-03-12T09:38:57"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "CVE-2025-21333 Windows 基于堆的缓冲区溢出分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247528488&idx=1&sn=e87d0ef04d915b93627c108f89cc6f38",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-03-12T09:36:03"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "TPCTF2025 writeup by Mini-Venom",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMTc1MjExOQ==&mid=2247512289&idx=1&sn=3335feefc68146cf1e3763bc0a609005",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "ChaMd5安全团队",
"category": "ChaMd5安全团队",
"pubDate": "2025-03-12T09:31:27"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Tomcat 中的 CVE-2025-24813 漏洞导致服务器遭受 RCE 和数据泄露",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486930&idx=1&sn=2b51fc318e0909b7da707385b0b1a6d4",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "TtTeam",
"category": "TtTeam",
"pubDate": "2025-03-12T09:30:37"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "微软3月补丁日多个产品安全漏洞风险通告6个在野利用、6个紧急漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247503142&idx=1&sn=f4f47cabc55a311159daa2ca4cca64e4",
"description": "致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。",
"author": "奇安信 CERT",
"category": "奇安信 CERT",
"pubDate": "2025-03-12T09:23:18"
2025-01-22 14:03:36 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "飞牛NAS上部署DeepSeek的详细步骤",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2MjU2MzI3MA==&mid=2247484536&idx=4&sn=236ae06a06c4cdb5360f149757d9f016",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "内存泄漏",
"category": "内存泄漏",
"pubDate": "2025-03-12T09:21:31"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "微软周二补丁日发布,修复 57 个漏洞其中6个被野外利用",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649794476&idx=3&sn=4f916971b11499698a033c3e5778285e",
"description": "微软月度安全更新",
"author": "军哥网络安全读报",
"category": "军哥网络安全读报",
"pubDate": "2025-03-12T09:00:32"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "工具集DarKnuclei【针对红蓝对抗的快速打点工具】",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485671&idx=1&sn=d06ccd31a6bce1e9c839f072d5d972bd",
"description": null,
"author": "风铃Sec",
"category": "风铃Sec",
"pubDate": "2025-03-12T08:32:40"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次攻防演练突破",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247505465&idx=1&sn=d4dc748aacaa931f969f5707728c0812",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "菜鸟学信安",
"category": "菜鸟学信安",
"pubDate": "2025-03-12T08:31:15"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "vulnhub靶场之SkyTower【天空塔】靶机",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxNTg1MDYxNA==&mid=2247490579&idx=1&sn=e700fd0761ceaf011b4c27263348c26b",
"description": null,
"author": "泷羽sec-何生安全",
"category": "泷羽sec-何生安全",
"pubDate": "2025-03-12T08:30:16"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "钓鱼和 MFA 绕过技术",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486925&idx=1&sn=52d11cd6ac9a12bcaa511e8cce6c61b0",
"description": null,
"author": "TtTeam",
"category": "TtTeam",
"pubDate": "2025-03-12T08:12:59"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "开源免费抓包工具支持Windows、Mac、Android、IOS、Linux 全平台系统",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247489618&idx=1&sn=c40926b3259114eb3ec99ebc78bc8bb6",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "白帽学子",
"category": "白帽学子",
"pubDate": "2025-03-12T08:11:28"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "SideWinder APT 深度解析:攻击动机、归因迷雾与防御策略再思考",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447900287&idx=1&sn=e6a126f5895e43dd74bc88c25ca7dace",
"description": "卡巴斯基实验室最新报告揭示SideWinder APT 组织正以更隐蔽、更具破坏性的方式对亚洲、中东和非洲的关键基础设施展开新一轮攻击。攻击目标涵盖海运、核能、IT、外交等多个领域其技术手段之高超令人警惕。",
"author": "技术修道场",
"category": "技术修道场",
"pubDate": "2025-03-12T08:01:11"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | I Doc View远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492511&idx=1&sn=d90056b0e4950327c59177129714d04d",
"description": "I Doc View在线文档预览系统的/system/cmd.json接口存在远程代码执行漏洞未经身份验证的攻击者可以通过该漏洞远程执行任意代码从而控制目标服务器。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-12T08:00:22"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | NetMizer日志管理系统SQL注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492511&idx=2&sn=1adfaea6216aa5d0392354d7666d1bc0",
"description": "NetMizer日志管理系统的/data/login/dologin.php接口存在SQL注入漏洞未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-12T08:00:22"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | 百易云资产管理运营系统SQL注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247492511&idx=3&sn=4afea6b201d98a1d469c47a50a0ab63c",
"description": "百易云资产管理运营系统的/wuser/admin.house.collect.php接口存在SQL注入漏洞未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-03-12T08:00:22"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "已复现远程代码执行漏洞攻击X平台与DeepSeek的为同一僵尸网络",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5OTk4MDE2MA==&mid=2655270238&idx=1&sn=7ed018021c4ec3fdf271c87db80f84bc",
"description": null,
"author": "计算机与网络安全",
"category": "计算机与网络安全",
"pubDate": "2025-03-12T07:57:39"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Voodoo Bear APT44 攻击模拟",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247505652&idx=1&sn=64b22bfcac17d28f8994690f81cc3019",
"description": "这是 (Voodoo Bear) APT44 组织针对东欧实体发起的攻击模拟,攻击活动早在 2022 年中期就已活跃,攻击链从后门开始,后门是一个 DLL针对 32 位和 64 位 Windows 环",
"author": "安全狗的自我修养",
"category": "安全狗的自我修养",
"pubDate": "2025-03-12T07:28:54"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次刨根问底的HTTP包WAF绕过",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247496089&idx=1&sn=0e5caafcb791547c9eeb70d937fd24b9",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "七芒星实验室",
"category": "七芒星实验室",
"pubDate": "2025-03-12T07:00:22"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "泛微OA-Ecology9.0开启非标功能操作说明",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMzY0MTk2OA==&mid=2247485614&idx=1&sn=b01a6f9dca018e898d49ff6ad21b71b4",
"description": "泛微Ecology系统提供了标准功能和非标准功能两种选项。通常情况下标准安装包中已包含系统的基础功能即标准产品。而非标准功能则属于增值服务需要通过泛微内部的流程申请才能获取这些功能通常用于满足特定客户的需求或提供额外的定制化服务。",
"author": "OA大助手",
"category": "OA大助手",
"pubDate": "2025-03-12T00:07:49"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "XXE漏洞利用完全指南",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260717&idx=1&sn=d6fa0c120d6f91a96082e3b771c82315",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "骨哥说事",
"category": "骨哥说事",
"pubDate": "2025-03-12T00:01:20"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "从JS文件中发现隐藏端点及自动化检测的实现【星球专享】",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260717&idx=2&sn=f780f48953d8194749db2c6277e3c484",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "骨哥说事",
"category": "骨哥说事",
"pubDate": "2025-03-12T00:01:20"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "安卓逆向 -- 安卓开发与逆向基础",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652038189&idx=1&sn=2c850f87849281dd051f7e99825a145d",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "逆向有你",
"category": "逆向有你",
"pubDate": "2025-03-12T00:01:07"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "工具推荐 | 使用Go编写的瑞数WAF绕过工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247494176&idx=1&sn=7f65c0f85ad748213edb0d159e426267",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "星落安全团队",
"category": "星落安全团队",
"pubDate": "2025-03-12T00:00:38"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "一文学习JWT造成的各种安全漏洞利用手法",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247519482&idx=1&sn=c4414508f283d61a4bf8ebe56981e379",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "船山信安",
"category": "船山信安",
"pubDate": "2025-03-12T00:00:38"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "《改个返回包接管全站?》",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzODM0OTkwMA==&mid=2247487172&idx=1&sn=b302a144fa2166df85d2c43a0fc22f3a",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "赛搏思安全实验室",
"category": "赛搏思安全实验室",
"pubDate": "2025-03-11T23:30:20"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次红队打点mt_rand突破",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTUxNTU2NQ==&mid=2247490081&idx=1&sn=344102842f59ca0d39d02729b19c4850",
2025-01-22 14:03:36 +08:00
"description": null,
"author": "sec0nd安全",
"category": "sec0nd安全",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-11T23:07:58"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "无需手动操作deepseek自动通关DVWA靶场",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3OTUxNTU2NQ==&mid=2247490081&idx=5&sn=967aa4cd1090a6bb8cc65a8513262609",
"description": "无需任何手动操作deepseek全自动通关DVWA靶场",
2025-01-22 14:03:36 +08:00
"author": "sec0nd安全",
"category": "sec0nd安全",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-11T23:07:58"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "深入探索 AD CS探索一些常见错误消息",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247487675&idx=1&sn=2bef14f30073d262816f48cb63bd6a37",
"description": null,
"author": "securitainment",
"category": "securitainment",
"pubDate": "2025-03-11T22:24:23"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】Apache Tomcat 远程代码执行漏洞(CVE-2025-24813)",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzQzNDI5OQ==&mid=2247486637&idx=1&sn=9582df0651833643a927edc2a197edd2",
"description": "近日,安全聚实验室监测到 Apache Tomcat 存在远程代码执行漏洞 编号为CVE-2025-24813CVSS:8.7",
"author": "安全聚",
"category": "安全聚",
"pubDate": "2025-03-11T22:12:35"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Tomcat远程代码执行漏洞CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=MzUzMDUxNTE1Mw==&mid=2247511221&idx=1&sn=b04ebc86e93bf83a9d60382e28d6ea0b",
"description": "虽然利用条件较多,但漏洞影响还是非常广泛的,建议使用相关版本的用户尽快升级安全更新。",
"author": "山石网科安全技术研究院",
"category": "山石网科安全技术研究院",
"pubDate": "2025-03-11T21:30:41"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "ProxyCat-V1.9.4 更加强大的代理池",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzIxMjM3Mg==&mid=2247489617&idx=1&sn=c49ce6272d8a2f5668e2ffee1c1110cf",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "白帽学子",
"category": "白帽学子",
"pubDate": "2025-03-11T20:27:40"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "网康科技 NS-ASG 应用安全网关 add_ikev2.php SQL注入漏洞(CVE-2024-3458)",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMTcwMTg1Mg==&mid=2247490705&idx=1&sn=f5a167bb5a411f732d7f86b842591ff4",
"description": "网康科技 NS-ASG 应用安全网关 add_ikev2.php接口处存在SQL注入漏洞未经身份验证的恶意攻击者利用 SQL 注入漏洞获取数据库中的信息之外,攻击者甚至可以在高权限下向服务器写入命令,进一步获取服务器系统权限。",
"author": "nday POC",
"category": "nday POC",
"pubDate": "2025-03-11T20:09:50"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Vulnhub 靶机 VulnOSv2 opendocman cms 32075 sql注入账号密码 ssh连接",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk3NTIyOTA0OQ==&mid=2247484181&idx=1&sn=08fb907e09c2c2d784949310a6d0887b",
"description": "Vulnhub 靶机 VulnOSv2 opendocman cms 32075 sql注入账号密码 ssh连接",
"author": "泷羽Sec-朝阳",
"category": "泷羽Sec-朝阳",
"pubDate": "2025-03-11T20:02:11"
},
{
"title": "实测新型攻击可盗任意密码",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxOTUyOTc0NQ==&mid=2247493232&idx=1&sn=1ae4006751050148cda0df08054fddbd",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "二进制空间安全",
"category": "二进制空间安全",
"pubDate": "2025-03-11T19:43:56"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Apache Tomcat 多项安全漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI0NzE4ODk1Mw==&mid=2652094945&idx=1&sn=cab9786aaa955563472a712e9552f111",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "网安百色",
"category": "网安百色",
"pubDate": "2025-03-11T19:28:57"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Microsoft WinDbg RCE 存在允许攻击者远程执行任意代码漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI0NzE4ODk1Mw==&mid=2652094945&idx=2&sn=b8927f61ae21ac02b310e4b2e01c22f6",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "网安百色",
"category": "网安百色",
"pubDate": "2025-03-11T19:28:57"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【安全圈】Apache Tomcat 中的 CVE-2025-24813 漏洞导致服务器遭受 RCE 和数据泄露:立即更新",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzMzE4NDU1OQ==&mid=2652068433&idx=3&sn=70253a351fb115e049a9d256c1390052",
2025-01-06 14:26:37 +08:00
"description": null,
2025-01-22 14:03:36 +08:00
"author": "安全圈",
"category": "安全圈",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-11T19:00:53"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【已复现】Apache Tomcat存在远程代码执行漏洞CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247490328&idx=1&sn=ba3aac1c3b2f2418ffe8b3312ef3874a",
"description": null,
"author": "安恒信息CERT",
"category": "安恒信息CERT",
"pubDate": "2025-03-11T18:40:19"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "已复现Apache Tomcat 远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5NjA0NjI5MQ==&mid=2650183306&idx=1&sn=d5005af8f2feedc3827c1c50b3c7a948",
"description": "请查看漏洞详情!",
"author": "微步在线",
"category": "微步在线",
"pubDate": "2025-03-11T18:31:13"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【已复现】Apache Tomcat Partial PUT远程代码执行漏洞CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=MzIwMDk1MjMyMg==&mid=2247492735&idx=1&sn=6dea5357862c227b6882f2948233a06a",
"description": "检测业务是否受到此漏洞影响,请联系长亭应急服务团队!",
"author": "长亭安全应急响应中心",
"category": "长亭安全应急响应中心",
"pubDate": "2025-03-11T18:27:07"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "一种基于unicorn的寄存器间接跳转混淆去除方式",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458590669&idx=1&sn=347a710061251090dc435a48bdd6fb9f",
"description": "看雪论坛作者IDl4n",
2025-01-06 14:26:37 +08:00
"author": "看雪学苑",
"category": "看雪学苑",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-11T18:00:00"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Responder与evil-winRM配合远程登录windows",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTIwNTkyNg==&mid=2247554161&idx=1&sn=e547c1aec4b529dd6c6ec3d69a27eda8",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "蚁景网络安全",
"category": "蚁景网络安全",
"pubDate": "2025-03-11T17:40:56"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "udp没有连接就会生成socket吗",
"link": "https://mp.weixin.qq.com/s?__biz=MzIxNTM3NDE2Nw==&mid=2247490362&idx=1&sn=80cd462c71ea1c8072e245d89326f0b2",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "车小胖谈网络",
"category": "车小胖谈网络",
"pubDate": "2025-03-11T17:32:42"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【已复现】Apache Tomcat远程代码执行漏洞CVE-2025-24813",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjE3ODkxNg==&mid=2247489041&idx=1&sn=4e296b6bc36202ea679b904adb098521",
"description": "近日绿盟科技CERT监测到Apache发布安全公告修复了Apachexa0Tomcat远程代码执行漏洞CVE-2025-24813目前已成功复现请相关用户尽快采取措施进行防护。",
"author": "绿盟科技CERT",
"category": "绿盟科技CERT",
"pubDate": "2025-03-11T17:12:10"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "CVE-2023-21839-WebLogic Server远程代码执行",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNTUyOTk0NA==&mid=2247488582&idx=1&sn=5b93bf6831cb5d3ba36c1b86bf08da5c",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "智检安全",
"category": "智检安全",
"pubDate": "2025-03-11T16:38:38"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞速递】Apache Tomcat 远程代码执行漏洞(CVE-2025-24813)",
"link": "https://mp.weixin.qq.com/s?__biz=MzIwNDYwMDcyNQ==&mid=2247488922&idx=1&sn=ceb2114122a4a891f31b9ba96ae721f7",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全狐",
"category": "安全狐",
"pubDate": "2025-03-11T16:31:43"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "记一次漏洞挖掘过程中的SQL注入浅浅绕过记录",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247519642&idx=1&sn=f89c90b0b15a4b3fd97a21cf183bbdf1",
"description": null,
"author": "亿人安全",
"category": "亿人安全",
"pubDate": "2025-03-11T15:55:07"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "H3CWeb网管登录系统aaa_portal_auth_wchat_submit存在远程命令执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTg3ODc5OA==&mid=2247484641&idx=1&sn=b445fd53476f27e964b941662af15de6",
"description": null,
"author": "骇客安全",
"category": "骇客安全",
"pubDate": "2025-03-11T14:34:50"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "打靶日记 VulnHub靶机 Tr0ll 2",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk1Nzc0MzY3NA==&mid=2247484367&idx=1&sn=187446822f79aaba9d42d6bb8708c233",
"description": null,
"author": "泷羽Sec-临观",
"category": "泷羽Sec-临观",
"pubDate": "2025-03-11T14:30:57"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "翻译|创建基于WebSocket的PowerShell反向 Shell",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5NTUzNzY3Ng==&mid=2247489033&idx=1&sn=0a27d8b8be9bce885f5ef1b9d7042306",
"description": null,
"author": "SecHub网络安全社区",
"category": "SecHub网络安全社区",
"pubDate": "2025-03-11T13:22:34"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "JS逆向 | cookie加密处理",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTUxMzk2NQ==&mid=2247486106&idx=1&sn=66a14d0a427a446704148b92d3ffd67c",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "安全君呀",
"category": "安全君呀",
"pubDate": "2025-03-11T13:20:27"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "详解PHP弱类型与常见安全问题",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=2651037544&idx=1&sn=b0c40d4df00b5ee0b83e899ddb1ff58a",
"description": "弱类型的语言对变量的数据类型没有限制,你可以在任何地时候将变量赋值给任意的其他类型的变量,同时变量也可以转换成任意地其他类型的数据。这时候在类型转化、不同类型比较、不合理地传参,会造成意外执行结果和绕过防御。",
"author": "SAINTSEC",
"category": "SAINTSEC",
"pubDate": "2025-03-11T13:13:37"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "威胁行为者利用 PHP-CGI RCE 漏洞攻击 Windows 计算机",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523764&idx=1&sn=6359558313ce2edbcb59efbbbe3c2fb8",
"description": "威胁行为者利用 PHP-CGI RCE 漏洞攻击 Windows 计算机",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-11T11:59:40"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "CISA 将 3 个 Ivanti Endpoint Manager 漏洞添加到已知已利用漏洞目录中",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247523764&idx=3&sn=5b3b0277523ad161c1cf404f0691a165",
"description": "CISA 将 3 个 Ivanti Endpoint Manager 漏洞添加到已知已利用漏洞目录中",
"author": "邑安全",
"category": "邑安全",
"pubDate": "2025-03-11T11:59:40"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "虚拟机逃逸VMware高危漏洞正被积极利用国内公网暴露面最大",
"link": "https://mp.weixin.qq.com/s?__biz=MzI1OTA1MzQzNA==&mid=2651247728&idx=1&sn=36ad3c8edbbe2b6751fe59e93c9851d6",
"description": null,
"author": "e安在线",
"category": "e安在线",
"pubDate": "2025-03-11T11:31:34"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】Apache Tomcat 远程代码执行漏洞(CVE-2025-24813)",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0OTY2ODE1NA==&mid=2247485130&idx=1&sn=a09954552c2468b317bca829c23dbd81",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Z0安全",
"category": "Z0安全",
"pubDate": "2025-03-11T11:16:29"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "关于防范针对DeepSeek本地化部署实施网络攻击的风险提示",
"link": "https://mp.weixin.qq.com/s?__biz=MzIxNjI2NjUzNw==&mid=2247493028&idx=1&sn=2c332f4077aa2a9bedeae8c680e1b78a",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "金瀚信安",
"category": "金瀚信安",
"pubDate": "2025-03-11T11:09:32"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "ScopeSentry-网络空间测绘 子域|端口|漏洞扫描工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247486648&idx=1&sn=6e4b4f683b40d7f8cf5a189dd1c0ca73",
"description": "Scope Sentry是一款具有资产测绘、子域名枚举、信息泄露检测、漏洞扫描、目录扫描、子域名接管、爬虫、页面监控功能的工具通过构建多个节点自由选择节点运行扫描任务。当出现新漏洞时可以快速排查关注资产是否存在相关组件。",
"author": "三沐数安",
"category": "三沐数安",
"pubDate": "2025-03-11T11:04:12"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】Apache Tomcat 远程代码执行漏洞(CVE-2025-24813)",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489740&idx=1&sn=db37e0a11d920f2bdae04f69ac22bb2d",
2025-01-22 14:03:36 +08:00
"description": null,
"author": "飓风网络安全",
"category": "飓风网络安全",
2025-03-14 11:50:28 +08:00
"pubDate": "2025-03-11T11:02:29"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞预警】Apache OFBiz服务端模板注入漏洞(CVE-2025-26865)",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489740&idx=2&sn=0bac6a9c71f04dc537658d19ed7a2478",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "飓风网络安全",
"category": "飓风网络安全",
"pubDate": "2025-03-11T11:02:29"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "警惕伪装成DeepSeek的木马犯罪分子利用DeepSeek 的受欢迎程度投毒",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247528473&idx=1&sn=6cde878240948b58662e1b85c4c1306c",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-03-11T10:51:50"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Burp Suite 文件上传漏洞Fuzz插件",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTQyOTk3Mg==&mid=2247485116&idx=1&sn=64a9b755ee1cb17b0078ef171acb8946",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "海底天上月",
"category": "海底天上月",
"pubDate": "2025-03-11T10:32:07"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "红队技巧 - RDP 隐身模式",
"link": "https://mp.weixin.qq.com/s?__biz=MzIxNTIzNTExMQ==&mid=2247491324&idx=1&sn=97d119f16f06e8deadd0210a9998307b",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "阿乐你好",
"category": "阿乐你好",
"pubDate": "2025-03-11T10:30:00"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Lazarus Group 攻击 Windows Web 服务器案例分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247528428&idx=1&sn=01245845ecc54604d651f3a257311cf9",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-03-11T10:21:29"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "戎码翼龙NG-EDR揭秘“泄露版”红队工具Nighthawk C2 投毒事件",
"link": "https://mp.weixin.qq.com/s?__biz=MzU5MjgwMDg1Mg==&mid=2247484980&idx=1&sn=250e6cc93a967635a6227883490b5ae8",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "夜组科技圈",
"category": "夜组科技圈",
"pubDate": "2025-03-11T10:17:24"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "实战 | 微信小程序EDUSRC渗透漏洞复盘",
"link": "https://mp.weixin.qq.com/s?__biz=MzIxMTg1ODAwNw==&mid=2247500863&idx=2&sn=f34f08a45619c3b0b616de1bdd3316a6",
"description": "EDUSRC",
"author": "网络安全透视镜",
"category": "网络安全透视镜",
"pubDate": "2025-03-11T10:14:25"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "服务器无浏览器如何查出口IP",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ0NzQwNA==&mid=2247486164&idx=1&sn=60853bded5c726ed917cbc953d9b41c7",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "网络个人修炼",
"category": "网络个人修炼",
"pubDate": "2025-03-11T10:00:51"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "戎码翼龙NG-EDR揭秘“泄露版”红队工具Nighthawk C2 投毒事件",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5OTQzNTI4Nw==&mid=2247488963&idx=1&sn=cf409d54c77a34df9be4707521380a25",
2025-01-22 14:03:36 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "黑客街安全团队",
"category": "黑客街安全团队",
"pubDate": "2025-03-11T09:54:15"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "漏洞预警 | Apache OFBiz 服务端模板注入漏洞CVE-2025-26865",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzcxNTczNA==&mid=2247487034&idx=1&sn=17c00f90fbe293eb4a543d5699c8e22d",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "Beacon Tower Lab",
"category": "Beacon Tower Lab",
"pubDate": "2025-03-11T09:19:21"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "【漏洞通告】Apache OFBiz服务端模板注入漏洞安全风险通告",
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247497247&idx=1&sn=dba9ef3272ca8faeae6d581cc6af2c5b",
"description": "近日嘉诚安全监测到Apache OFBiz服务端模板注入漏洞鉴于漏洞危害较大嘉诚安全提醒相关用户尽快更新至安全版本避免引发漏洞相关的网络安全事件。",
"author": "嘉诚安全",
"category": "嘉诚安全",
"pubDate": "2025-03-11T09:03:39"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "探索挖掘xss中括号被转义的绕过措施(续)",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485509&idx=1&sn=366fe7ce9d30e1676cd0808b84eb3ad4",
"description": null,
"author": "Spade sec",
"category": "Spade sec",
"pubDate": "2025-03-11T09:01:32"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "二月安全通告",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3Mzg1OTYyMQ==&mid=2247487749&idx=1&sn=dd61290487729b374219fa279ad31bac",
"description": null,
"author": "中龙技术",
"category": "中龙技术",
"pubDate": "2025-03-11T09:00:54"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "曹县黑客利用 ZIP 文件执行恶意 PowerShell 脚本",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649794462&idx=3&sn=d1b6e2e0e7899e93d8922d4b2e6203b5",
"description": "又是那个曹县黑客……",
"author": "军哥网络安全读报",
"category": "军哥网络安全读报",
"pubDate": "2025-03-11T09:00:53"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "WordPress如何防Webshell、防篡改、防劫持",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMTMyOTg4NQ==&mid=2247484198&idx=1&sn=92d0a2d6af95721509e7ab961d1ace3c",
"description": null,
"author": "护卫神说安全",
"category": "护卫神说安全",
"pubDate": "2025-03-11T08:34:38"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "Paragon 硬盘分区工具驱动曝 0day 漏洞勒索软件“合法”提权BYOVD 攻击再现!",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447900282&idx=1&sn=15fde91e5d776f6506e5e684e5e2237e",
"description": "Paragon Partition Manager 的核心驱动程序 BioNTdrv.sys 被曝存在一组高危漏洞CVE-2025-0285 ~ CVE-2025-0289。",
"author": "技术修道场",
"category": "技术修道场",
"pubDate": "2025-03-11T08:33:43"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "vulnhub靶场之【digitalworld.local系列】的electrical靶机",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxNTg1MDYxNA==&mid=2247490578&idx=1&sn=c0f04a64eab0bb6ba6a4c6fad9befc36",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "泷羽sec-何生安全",
"category": "泷羽sec-何生安全",
"pubDate": "2025-03-11T08:30:13"
2025-01-06 14:26:37 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "BurpSuite使用Trips-304状态码解决",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0ODY1NzEwMA==&mid=2247487720&idx=1&sn=0681552cbb341e11a07b492cf1f68597",
2025-01-06 14:26:37 +08:00
"description": null,
2025-03-14 11:50:28 +08:00
"author": "土拨鼠的安全屋",
"category": "土拨鼠的安全屋",
"pubDate": "2025-03-11T08:24:00"
2025-01-22 14:03:36 +08:00
},
{
2025-03-14 11:50:28 +08:00
"title": "工具集工具集MySQL Fake Server【高级版MySQL_Fake_Server】",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485670&idx=1&sn=7a595bd8bfc79031d83b59a0bf2e9637",
"description": "高级版MySQL_Fake_Serve",
"author": "风铃Sec",
"category": "风铃Sec",
"pubDate": "2025-03-11T08:23:49"
2025-01-06 14:26:37 +08:00
}
]