Linux KDE 4/5±£´æÎ´ÐÞ¸´µÄÏÂÁî×¢ÈëÎó²î£»£» £»£»SmominruÐ®ÖÆ50¶àÍǫ̀µçÄÔÍڿ󣻣» £»£»CSAÐû²¼ÔÆÅÌËã11ÏîÍþвÁбí

Ðû²¼Ê±¼ä 2019-08-08
1¡¢Linux KDE 4/5±£´æÎ´ÐÞ¸´µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬PoCÒÑÐû²¼

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Çå¾²Ñо¿Ô±Dominik PennerÅû¶Linux KDEÖеÄÒ»¸öÉÐδÐÞ¸´µÄ0day£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§ÏÂÔØÏ¢ÕùѹËõ¶ñÒâ.desktopºÍ.directoryÎļþÔÚÓû§µÄÅÌËã»úÉϾ²Ä¬Ö´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬ÉõÖÁÎÞÐèÓû§ÏÖʵ·­¿ª¸ÃÎļþ¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËKDE°æ±¾4ºÍ5£¬£¬£¬£¬£¬ÏÕЩËùÓеÄLinux¿¯Ðа涼±»²¨¼°¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËPoC´úÂëÒÔ¼°¸ÃÏÂÁî×¢ÈëÎó²îµÄÑÝʾÊÓÆµ¡£¡£¡£¡£KDEÉçÇøÈ·ÈÏÁËÕâÒ»Îó²î²¢ÏòÓû§°ü¹ÜÐÞ¸´ÊÂÇéÕýÔÚ¾ÙÐÐÖС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kde-desktop-linux-vulnerability.html


2¡¢BinanceÔâµ½ÀÕË÷£¬£¬£¬£¬£¬¹¥»÷ÕßÍþвÐû²¼1ÍòÃû¿Í»§µÄKYCÐÅÏ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


¼ÓÃÜÇ®±ÒÉúÒâËùBinanceÔâµ½Ò»Ãû·¸·¨·Ö×ÓµÄڲƭÀÕË÷£¬£¬£¬£¬£¬¸ÃڲƭÕßÉù³ÆÒѾ­ÇÔÈ¡ÁËÊýǧÃûBinance¿Í»§µÄKYCÐÅÏ¢£¨¼´¡°ÏàʶÄúµÄ¿Í»§¡±ÐÅÏ¢£©£¬£¬£¬£¬£¬²¢ÏòBinanceÀÕË÷300±ÈÌØ±Ò£¨¼ÛÖµ½ü350ÍòÃÀÔª£©µÄÊê½ð¡£¡£¡£¡£BinanceÌåÏָù«Ë¾ÈÔÔÚÊÓ²ìÕâЩͼÏñµÄÕýµ±ÐÔ£¬£¬£¬£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£¸ÃڲƭÕß½¨ÉèÁËÒ»¸öTelegram̸Ìì×飬£¬£¬£¬£¬²¢·ÖÏíÁË400¶àÕÅÊÖ³Ö»¤ÕÕ/Éí·ÝÖ¤µÄÈ˵ÄÕÕÆ¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤BinanceµÄ˵·¨£¬£¬£¬£¬£¬ÕâЩͼÏñȱÉÙÆäÄÚ²¿ÐÅÏ¢µÄÊý×Öˮӡ£¬£¬£¬£¬£¬ÕâÔöÌíÁ˶ÔÊý¾ÝÕæÊµÐÔµÄÏÓÒÉ¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ½«ÏòÌṩڲƭÕßÉí·ÝÐÅÏ¢µÄÈ˽±Àø25±ÈÌØ±Ò£¨¼ÛÖµÁè¼Ý29ÍòÃÀÔª£©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/binance-kyc-data-leak.html


3¡¢ÐǰͿËÊý¾Ý¿âSQL×¢ÈëÎó²î̻¶½ü100ÍòÌõ²ÆÎñ¼Í¼

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

Çå¾²Ñо¿Ô±Eugene LimÓÚ4ÔÂ8ÈÕÔÚÐÇ°Í¿ËµÄÆóÒµÊý¾Ý¿âÖз¢Ã÷Ò»¸öSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îµ¼Ö½ü100ÍòÌõ²ÆÎñ¼Í¼̻¶£¬£¬£¬£¬£¬°üÀ¨Ë°ÎñÐÅÏ¢¡¢ÊÕÌõÒÔ¼°ÈËΪµ¥Êý¾ÝµÈ¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¸Ã¹«Ë¾ÔÚHackerOneÉϵÄÎó²î½±ÀøÍýÏëÌá½»ÁËÎó²î£¬£¬£¬£¬£¬ÐǰͿËÔÚÁ½ÌìÄÚÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£Ñо¿Ö°Ô±Òò´Ë»ñµÃÁË4000ÃÀÔªµÄ½±Àø¡£¡£¡£¡£¸ÃÎó²î±¨¸æÓÚ8ÔÂ6ÈÕÔÚHackerOneÉÏÅû¶¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sql-injection-vulnerability-exposed-starbucks-financial-records


4¡¢½©Ê¬ÍøÂçSmominruÐ®ÖÆ50¶àÍǫ̀µçÄÔÍڿ󣬣¬£¬£¬£¬²¢ÇÔȡƾ֤ÐÅÏ¢


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Carbon BlackµÄTAUÑо¿ÍŶӷ¢Ã÷Ò»¸öÐµĹ¥»÷»î¶¯SmominruÕýÔÚͨ¹ý½©Ê¬ÍøÂçÍÚÈ¡ÃÅÂÞ±Ò£¬£¬£¬£¬£¬²¢ÇÒÇÔÈ¡Óû§µÄ»á¼ûƾ֤¡£¡£¡£¡£SmominruÒѾ­ÀÖ³ÉÐ®ÖÆÁËÈ«ÇòÁè¼Ý50Íǫ̀»úе£¬£¬£¬£¬£¬TAUÌåÏָý©Ê¬ÍøÂçÖÁÉÙÒѾ­»îÔ¾ÁËÁ½Ä꣬£¬£¬£¬£¬²¢ÇÒÖ÷Ҫͨ¹ýÓÀºãÖ®À¶Èö²¥£¬£¬£¬£¬£¬Êܺ¦ÕßÖ÷ҪλÓÚÑÇÌ«µØÇø¡£¡£¡£¡£Ñо¿Ö°Ô±½«ÕâÖÖÁ¬ÏµÍÚ¿óºÍƾ֤ÇÔÈ¡µÄ¹¥»÷³ÆÖ®Îªaccess mining¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷SmominruÓëÁíÒ»¸ö½©Ê¬ÍøÂçMyKings±£´æ¹ØÁª¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-cryptojacking-campaign-strikes-half-a-million-pcs/


5¡¢°Í»ù˹̹ÄÐ×Óͨ¹ýÐлßAT£¦TÔ±¹¤²»·¨½âËø200¶àÍò²¿ÊÖ»ú


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


°Í»ù˹̹һÃûÄÐ×Ó±»Ö¸¿ØÔÚÎåÄêµÄʱ¼äÄÚͨ¹ýÐлßAT£¦TµçÐŹ«Ë¾µÄÔ±¹¤²»·¨½âËø200¶àÍò²¿ÊÖ»úÒÔ¼°Ôڸù«Ë¾µÄÍøÂçÉÏÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¸ÃÃûÄÐ×ÓÊÇÏÖÄê34ËêµÄ°Í»ù˹̹¹«ÃñMuhammad Fahd£¬£¬£¬£¬£¬Æ¾Ö¤ÃÀ¹úÁª°îÕþ¸®µÄÆðËßÊ飬£¬£¬£¬£¬FahdÔÚ2012ÄêÖÁ2017Äêʱ´úÏòAT£¦TÄÚ²¿Ô±¹¤ÐлßÁè¼Ý100ÍòÃÀÔª£¬£¬£¬£¬£¬ÒÔ²»·¨½âËø±»AT£¦T¹«Ë¾Ëø¶¨µÄÊÖ»ú×°±¸¡£¡£¡£¡£ÔÚ¼ÓÈëÆäÍýÏëµÄһЩԱ¹¤±»AT&T¿ª³ýºó£¬£¬£¬£¬£¬Fahd»¹Ïò¸Ã¹«Ë¾ÄÚÍø×°ÖöñÒ⹤¾ß£¬£¬£¬£¬£¬Ê¹ÆäÄܹ»Í¨¹ýAT£¦TÅÌËã»úÔ¶³Ì½âËøÊÖ»ú¡£¡£¡£¡£Fahd½«ÃæÁÙ³¤´ï20ÄêµÄî¿Ïµ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/sim-device-unlocking-malware.html


6¡¢ÔÆÇ徲ͬÃËCSAÐû²¼Õë¶ÔÔÆÅÌËãµÄ11Ïî×îÐÂÍþвÁбí

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÔÆÇ徲ͬÃË£¨CSA£©Ðû²¼ÔÆÅÌËãÍþв¶´²ì±¨¸æ£¬£¬£¬£¬£¬±¨¸æÖÐÁгöÁËÔÆÅÌËãÃæÁÙµÄ11Ïî¶¥¼¶Çå¾²ÎÊÌâ¡£¡£¡£¡£ÕâÊÇ×Ô2016ÄêCSAÐû²¼ÔÆÅÌËã¶¥¼¶ÍþвTop12ÒÔÀ´µÄµÚÒ»´ÎÖØ´ó¸üС£¡£¡£¡£Ã»Óб¬·¢×ª±äµÄÍþв°üÀ¨Êý¾Ýй¶¡¢Éí·ÝÖÎÀí²»ÉÆ¡¢²»Çå¾²µÄAPI¡¢ÕË»§Ð®ÖÆ¡¢ÄÚ²¿ÍþвÒÔ¼°ÔÆÐ§Àͱ»ÀÄÓûò¶ñÒâʹÓᣡ£¡£¡£Ê£ÏµÄÎå¸öÐÂÍþв°üÀ¨Èõ¿ØÖÆÃæ¡¢Ôª½á¹¹ÓëÓ¦Óýṹʧ°Ü¡¢ÉèÖùýʧºÍ±ä»»¿ØÖÆÈ±·¦¡¢È±·¦ÔÆÇå¾²¼Ü¹¹ºÍÕ½ÂÔÒÔ¼°ÔÆÊ¹ÓõĿɼûÐÔÊÜÏÞ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/cloud-security-alliance-releases/