{"id":216,"date":"2022-07-30T21:14:53","date_gmt":"2022-07-30T13:14:53","guid":{"rendered":"https:\/\/reverieland.cn\/?p=216"},"modified":"2022-07-30T21:14:54","modified_gmt":"2022-07-30T13:14:54","slug":"2022%e5%9b%bd%e5%a4%96%e5%ae%89%e5%85%a8%e7%ab%99%e7%82%b9%e6%94%b6%e9%9b%86","status":"publish","type":"post","link":"https:\/\/reverieland.cn\/index.php\/216\/","title":{"rendered":"2022\u56fd\u5916\u5b89\u5168\u7ad9\u70b9\u6536\u96c6"},"content":{"rendered":"\n<p>\u4e2a\u4eba\u6536\u85cf\u4f7f\u7528\uff0c\u4fb5\u5220<\/p>\n\n\n\n<p><a href=\"https:\/\/starlabs.sg\/blog\/2022\/05\/new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108\/\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/starlabs.sg\/blog\/2022\/05\/new-wine-in-old-bottle-microsoft-sharepoint-post-auth-deserialization-rce-cve-2022-29108\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/labs.nettitude.com\/blog\/cve-2022-23270-windows-server-vpn-remote-kernel-use-after-free-vulnerability\/\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/labs.nettitude.com\/blog\/cve-2022-23270-windows-server-vpn-remote-kernel-use-after-free-vulnerability\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/blog.viettelcybersecurity.com\/cve-2022-22005-microsoft-sharepoint-rce\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/blog.viettelcybersecurity.com\/cve-2022-22005-microsoft-sharepoint-rce<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/xakep-ru\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/xakep-ru<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/movaxbx.ru\/tag\/exploit\/\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/movaxbx.ru\/tag\/exploit\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/infosecwriteups.com\/utctf-2022-writeup-de956bfe0bf3\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/infosecwriteups.com\/utctf-2022-writeup-de956bfe0bf3<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/category\/apt\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/securityaffairs.co\/wordpress\/category\/apt<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/search\/label\/Vulnerability\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/thehackernews.com\/search\/label\/Vulnerability<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.zerodayinitiative.com\/blog\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/www.zerodayinitiative.com\/blog<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.crowdstrike.com\/blog\/cve-2022-0185-kubernetes-container-escape-using-linux-kernel-exploit\/\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/www.crowdstrike.com\/blog\/cve-2022-0185-kubernetes-container-escape-using-linux-kernel-exploit\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/blog.aquasec.com\/cve-2022-0185-linux-kernel-container-escape-in-kubernetes\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/blog.aquasec.com\/cve-2022-0185-linux-kernel-container-escape-in-kubernetes<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.truesec.com\/hub\/blog\/from-stranger-to-da-using-petitpotam-to-ntlm-relay-to-active-directory\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/www.truesec.com\/hub\/blog\/from-stranger-to-da-using-petitpotam-to-ntlm-relay-to-active-directory<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.exandroid.dev\/2021\/06\/23\/ad-cs-relay-attack-practical-guide\/\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/www.exandroid.dev\/2021\/06\/23\/ad-cs-relay-attack-practical-guide\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/posts.specterops.io\/certified-pre-owned-d95910965cd2\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/posts.specterops.io\/certified-pre-owned-d95910965cd2<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability\/27668\/\" target=\"_blank\"  rel=\"nofollow\" >https:\/\/isc.sans.edu\/forums\/diary\/Active+Directory+Certificate+Services+ADCS+PKI+domain+admin+vulnerability\/27668\/<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/news.shamcode.ru\/blog\/nomi-sec--poc-in-github-1\/\" target=\"_blank\"  rel=\"nofollow\" >http:\/\/news.shamcode.ru\/blog\/nomi-sec--poc-in-github-1\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>websltes related to 0-day leak<\/p>\n","protected":false},"author":1,"featured_media":217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[13],"tags":[20,21,11],"class_list":["post-216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-0-day","tag-21","tag-11"],"_links":{"self":[{"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/posts\/216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/comments?post=216"}],"version-history":[{"count":1,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/posts\/216\/revisions"}],"predecessor-version":[{"id":218,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/posts\/216\/revisions\/218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/media\/217"}],"wp:attachment":[{"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/media?parent=216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/categories?post=216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reverieland.cn\/index.php\/wp-json\/wp\/v2\/tags?post=216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}