1月19日每日安全热点 - OpenWRT论坛被攻击信息被窃取

admin 2023-11-29 17:32:10 AnQuanKeInfo 来源:ZONE.CI 全球网 0 阅读模式

安全研究 Security Research Jumpserver 任意命令执行漏洞分析报告 https://cert.360.cn/report/detail?id=f5b2041e25d42d07698994f1b7f402ca ShadowMove:套接字劫持技术,巧妙的隐藏与C2的连接 https://adepts.of0x.cc/shadowmove-hijack-socket/ FiberHome HG6245D路由器多个漏洞分析 https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html 分而治之:一种绕过NextGen AV的技术 https://theevilbit.github.io/posts/divide_and_conquer/ Shazam地理位置漏洞,单击链接即可窃取用户的准确位置 https://ash-king.co.uk/blog/Shazlocate-abusing-CVE-2019-8791-CVE-2019-8792 CVE-2020-26233:GIT 命令行工具远程代码执行漏洞分析 https://blog.blazeinfosec.com/attack-of-the-clones-2-git-command-client-remote-code-execution-strikes-back/amp/ CVE-2020-5144:SonicWallVPN权限提升漏洞分析 https://cymptom.com/cve-2020-5144-sonicwall-global-vpn-new-elevation-of-privileges-vulnerability/2021/01/ CVE-2021-3113:Netsia-SEBA认证绕过漏洞分析 https://www.pentest.com.tr/exploits/Netsia-SEBA-0-16-1-Authentication-Bypass-Add-Root-User-Metasploit.html CVE-2020-1456: SHAREPOINT 2019 XSS漏洞复现 https://slashcrypto.org/2021/01/15/CVE-2020-1456/ 安全资讯 Security Information 从2月9日开始,DC默认开启强制模式 https://msrc-blog.microsoft.com/2021/01/14/netlogon-domain-controller-enforcement-mode-is-enabled-by-default-beginning-with-the-february-9-2021-security-update-related-to-cve-2020-1472/ OpenWRT项目论坛被攻击,论坛用户信息被窃取 https://www.zdnet.com/article/openwrt-reports-data-breach-after-hacker-gained-access-to-forum-admin-account/
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0