每周蓝军技术推送(2024.12.14-12.20) | CTF导航
Common Information
Type Value
UUID 2d169fd8-9621-479c-96e0-fd839cf09e8f
Fingerprint 57f8e49eb66fe714
Analysis status DONE
Considered CTI value -2
Text language
Published Dec. 14, 2024, midnight
Added to db Dec. 21, 2024, 4:27 a.m.
Last updated Dec. 24, 2024, 2:02 a.m.
Headline 每周蓝军技术推送(2024.12.14-12.20)
Title 每周蓝军技术推送(2024.12.14-12.20) | CTF导航
Detected Hints/Tags/Attributes 19/1/60
Source URLs
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 426 CTF导航 https://www.ctfiot.com/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 3
cve-2024-40725
Details CVE 6
cve-2024-51479
Details CVE 2
cve-2024-50264
Details Domain 4710
github.com
Details Domain 3
testbnull.medium.com
Details Domain 1
ricardojoserf.github.io
Details Domain 285
blog.talosintelligence.com
Details Domain 15
www.hexacorn.com
Details Domain 1
hexacorn.com
Details Domain 867
www.youtube.com
Details Domain 70
seclists.org
Details Domain 2
a13xp0p0v.github.io
Details Domain 13
securitylab.github.com
Details Domain 8
www.vectra.ai
Details Domain 223
arxiv.org
Details Domain 4
gynvael.coldwind.pl
Details Domain 20
blog.trailofbits.com
Details File 43
next.js
Details File 210
msmpeng.exe
Details File 1
alexander_popov-h2hc-2024.pdf
Details File 11
vectra.ai
Details File 4
coldwind.pl
Details Github username 1
soltanali0
Details Github username 4
vercel
Details Github username 2
nullenc0de
Details Github username 1
cobblepot59
Details Github username 1
ntdallas
Details Github username 2
ricardojoserf
Details Github username 1
edwardzpeng
Details Github username 39
google
Details Github username 25
advisories
Details Github username 3
cncf
Details sha1 1
09335abb6b01ee706a5a5584278ef4c4c1d50bda
Details Url 1
https://github.com/soltanali0/cve-2024-40725cve-2024-51479:next.js
Details Url 1
https://github.com/vercel/next.js/security/advisories/ghs...
Details Url 1
https://github.com/soltanali0/cve-2024-40725
Details Url 1
https://github.com/vercel/next.js/security/advisories/ghsa-7gfc-8cq8-jh5f
Details Url 1
https://testbnull.medium.com/có-gì-bên-trong-các-net-deser-gadgetchain-3d89897c4878
Details Url 1
https://github.com/nullenc0de/trust-validator
Details Url 1
https://github.com/cobblepot59/adcheck
Details Url 1
https://github.com/ntdallas/svartalfheim
Details Url 1
https://ricardojoserf.github.io/nativedump
Details Url 1
https://github.com/ricardojoserf/nativedump/tree/crystal-flavour
Details Url 1
https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers
Details Url 1
https://www.cobaltstrike.com/blog/introducing-the-mutator-kit-creating-object-file-monstrosities-with-sleep-mask-and-llvm
Details Url 1
https://www.hexacorn.com/blog/2024/12/20/windows-server-2022-and-msmpeng-exe
Details Url 1
https://hexacorn.com/d/msmpeng.exe.txt
Details Url 1
https://trainsec.net/library/understanding-the-differences-between-createprocessasuser-and-createprocesswithtokenw-in-windows
Details Url 1
https://www.youtube.com/watch?v=hehwjh
Details Url 1
https://github.com/edwardzpeng/presentations/tree/main/blackhat
Details Url 1
https://seclists.org/oss-sec/2024/q4/163
Details Url 1
https://github.com/google/security-research/blob/09335abb6b01ee706a5a5584278ef4c4c1d50bda/pocs/linux/kernelctf/cve-2024-50264_lts_cos/docs/exploit.md
Details Url 1
https://a13xp0p0v.github.io/img/alexander_popov-h2hc-2024.pdf
Details Url 1
https://securitylab.github.com/advisories/ghsl-2024-312_azure_api_management_developer_portal
Details Url 1
https://www.vectra.ai/blog/remediation-to-mitigation-addressing-insecure-by-design-flaws
Details Url 1
https://arxiv.org/abs/2412.06090
Details Url 1
https://arxiv.org/pdf/2212.10496
Details Url 1
https://gynvael.coldwind.pl/n/eoy_talk_watchlist_2024
Details Url 2
https://blog.trailofbits.com/2024/12/09/35-more-semgrep-rules-infrastructure-supply-chain-and-ruby
Details Url 1
https://github.com/cncf/tag-security/tree/main/community/catalog/compromises