
腾讯玄武实验室安全动态推送
Tencent Xuanwu Lab Security Daily News
-
[ Industry News ] WordPress 插件 Display Widgets 存在后门并在网站上插入垃圾广告: https://threatpost.com/200k-wordpress-sites-exposed-to-rogue-version-of-display-widgets/127994/
-
[ MalwareAnalysis ] Fortinet 研究员对 Poison Ivy/PlugX 新变种的深度分析 - Part 2: https://blog.fortinet.com/2017/09/15/deep-analysis-of-new-poison-ivy-plugx-variant-part-ii
-
[ SecurityProduct ] ZDI 公开了趋势科技 Mobile Security for Enterprise 产品的 3 个漏洞,分别为 SQL 注入、文件上传、身份验证绕过(CVE-2017-14080/CVE-2017-14079/CVE-2017-14078): http://www.zerodayinitiative.com/advisories/ZDI-17-767/ http://www.zerodayinitiative.com/advisories/ZDI-17-807/ http://www.zerodayinitiative.com/advisories/ZDI-17-810/
-
[ Tools ] .NET Core 运行时的 JIT 编译器 - RyuJIT 介绍: https://github.com/dotnet/coreclr/blob/master/Documentation/botr/ryujit-tutorial.md
-
[ Virtualization ] VMware 修复了 3 个漏洞,分别为:1. SVGA 设备的一个越界写漏洞(CVE-2017-4924),该漏洞可以实现 Guest 到 Host 的逃逸;2. Guest RPC 空指针引用漏洞(CVE-2017-4925);3. H5 客户端的存储型 XSS(CVE-2017-4926): https://www.vmware.com/security/advisories/VMSA-2017-0015.html
-
[ Web Security ] Metasploitable 3: HTTP PUT 漏洞利用教程: http://www.hackingtutorials.org/exploit-tutorials/metasploitable-3-exploiting-http-put/
-
[ Windows ] 利用高权限的 .NET 应用程序实现 UAC 绕过: https://offsec.provadys.com/UAC-bypass-dotnet.html
-
[ Windows ] Windows kernel pool spraying fun (Part 3) : https://theevilbit.blogspot.in/2017/09/windows-kernel-pool-spraying-fun-part-3.html Part 2: https://theevilbit.blogspot.in/2017/09/windows-kernel-pool-spraying-fun-part-2.html Part 1: https://theevilbit.blogspot.in/2017/09/pool-spraying-fun-part-1.html
-
[ Windows ] CVE-2017-8759 - Microsoft .NET Framework RCE 漏洞利用工具包+视频教程: http://seclists.org/fulldisclosure/2017/Sep/33?utm_source=feedburner&;utm_medium=twitter&utm_campaign=Feed%3A+seclists%2FFullDisclosure+%28Full+Disclosure%29