1¡¢Wordpress CSRFÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÖ´ÐÐí§Òâ´úÂë
RIPSÑо¿Ö°Ô±Simon Scannell·¢Ã÷Wordpress 5.1Öб£´æÒ»¸öCSRFÎó²î£¬£¬£¬£¬£¬¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÓÕÆÍøÕ¾ÖÎÀíÔ±»á¼û°üÀ¨Îó²îʹÓôúÂëµÄ¶ñÒâÍøÕ¾£¬£¬£¬£¬£¬¿ÉÒÔÏòÄ¿µÄWordPressÍøÕ¾×¢Èë´æ´¢ÐÍXSS payload£¬£¬£¬£¬£¬²¢Ê¹ÓøÃpayloadÍêÈ«¿ØÖƸÃÍøÕ¾¡£¡£¡£¡£±¾ÖÜÈýWordPressÍŶÓÐû²¼ÁËа汾WordPress 5.1.1ÒÔÐÞ¸´¸ÃÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/03/hack-wordpress-websites.html
2¡¢Ë¼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´CSPCÈí¼þÖеĺóÃÅÕË»§Îó²î
˼¿ÆÐÞ¸´ÁËͨË×ЧÀÍÆ½Ì¨ÍøÂçÆ÷£¨CSPC£©Èí¼þÖеÄÒ»¸öºóÃÅÕË»§Îó²î£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-1723£©°üÀ¨Ò»¸ö´øÓо²Ì¬ÃÜÂëµÄĬÈÏÕË»§£¬£¬£¬£¬£¬ËäÈ»¸ÃÕË»§Ã»ÓÐÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬µ«Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î»ñµÃϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£Æ¾Ö¤Ë¼¿ÆµÄ˵·¨£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËCSPC°æ±¾2.7.2µ½2.7.4.5ÒÔ¼°ËùÓеÄ2.8.x°æ±¾£¬£¬£¬£¬£¬²¢ÒÑÔÚ°æ±¾2.7.4.6ºÍ2.8.1.2ÖлñµÃÐÞ¸´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/82391/security/common-services-platform-collector-flaw.html
3¡¢°Í»ùË¹Ì¹ÒÆÃñ¾Ö¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬±»Ö²Èë¼üÅ̼ͼľÂí
°Í»ùË¹Ì¹ÒÆÃñÓ뻤ÕվֵĹÙÍøtracking.dgip.gov[.]pkÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÍøÕ¾ÉÏÖ²ÈëÁ˶ñÒâ´úÂëÒÔ¸ú×ÙÓû§¡£¡£¡£¡£±»Ö²ÈëµÄpayloadÊÇScanBox£¬£¬£¬£¬£¬¸Ã±äÖÖ¿ÉÒÔÍøÂçÍøÕ¾»á¼ûÕßµÄϵͳÐÅÏ¢²¢¾ÙÐмüÅ̼ͼ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã±äÖÖ»¹ÊÔͼ¼ì²â»á¼ûÕßÊÇ·ñ×°ÖÃÁËÌØ¶¨µÄÇå¾²²úÆ·¡¢½âѹËõ¹¤¾ßºÍÐéÄâ»ú¹¤¾ßµÈ£¬£¬£¬£¬£¬Õâ¸öÁÐ±í³¤´ï77Ï£¬£¬£¬£¬¸ÃÐÐΪ¿ÉÄÜÊÇÕë¶ÔÌØ¶¨Ä¿µÄȺÌåµÄË®¿Ó¹¥»÷µÄÒ»²¿·Ö¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/pakistani-government-site-compromised-logs-visitor-keystrokes/
4¡¢SteamÉÏ39£¥µÄCS 1.6ЧÀÍÆ÷ÏòÍæ¼Ò·Ö·¢BelonardľÂí
ÔÚDr.WebµÄÒ»·Ýб¨¸æÖУ¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Steam¹Ù·½¿Í»§¶ËÉϵÄÔ¼5000¸öCS 1.6ЧÀÍÆ÷ÖÐÓÐ1951¸öЧÀÍÆ÷£¨39%£©ÏòÍæ¼Ò·Ö·¢BelonardľÂí¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÕâÖÖ·½·¨½¨ÉèÁËBelonard½©Ê¬ÍøÂ磬£¬£¬£¬£¬µ±Íæ¼ÒÅþÁ¬µ½¶ñÒâЧÀÍÆ÷ʱ£¬£¬£¬£¬£¬Belonard½©Ê¬ÍøÂçʹÓÃCS 1.6¿Í»§¶ËÖеÄRCEÎó²î¾ÙÐÐѬȾ¡£¡£¡£¡£ÓÉÓÚCS 1.6ÊÇValveÐû²¼µÄ¸ÃÓÎÏ·×îºóÒ»¸ö°æ±¾£¬£¬£¬£¬£¬Òò´Ë¿Í»§¶ËÖеÄRCEÎó²î²»»á»ñµÃÐÞ¸´£¬£¬£¬£¬£¬ËùÓÐÍæ¼Ò¶¼¿ÉÄܳÉΪDZÔÚµÄÊܺ¦Õß¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/39-percent-of-all-counter-strike-16-servers-used-to-infect-players/
5¡¢ÐÂCryptoSinkÍÚ¿ó¹¥»÷£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔElasticsearchЧÀÍÆ÷
F5 NetworksÑо¿ÍŶӷ¢Ã÷Ò»¸öÕë¶ÔElasticsearchЧÀÍÆ÷µÄжñÒâ»î¶¯CryptoSink£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃ2014ÄêµÄÎó²î£¨CVE-2014-3120£©À´Èö²¥ÃÅÂޱҿ󹤡£¡£¡£¡£ÔÚLinuxÉÏ£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÁËһЩÒÔǰδ֪µÄ¶ñÒâÈí¼þ£¨°üÀ¨ÏÂÔØ³ÌÐòºÍľÂí£©£¬£¬£¬£¬£¬·À²¡¶¾½â¾ö¼Æ»®ÎÞ·¨¼ì²âµ½ËüÃÇ¡£¡£¡£¡£¹¥»÷Õß»¹»á½«ÆäËüÁ÷Á¿µ¼Èë127.1.1.1À´É±ËÀÆäËüµÄ¾ºÕù¿ó¹¤¡£¡£¡£¡£Æä¾ßÓжà¸öC&CЧÀÍÆ÷£¬£¬£¬£¬£¬Ä¿½ñ»îÔ¾µÄC&CЧÀÍÆ÷λÓÚÖйú¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.f5.com/labs/articles/threat-intelligence/-cryptosink--campaign-deploys-a-new-miner-malware
6¡¢PoS¶ñÒâÈí¼þDMSniff£¬£¬£¬£¬£¬×Ô2016ÄêÀ´Ò»Ö±Õë¶ÔÖÐСÐÍÆóÒµ
FlashpointÑо¿ÍŶӷ¢Ã÷PoS¶ñÒâÈí¼þDMSniff×Ô2016Äê×îÏÈÒ»Ö±»îÔ¾£¬£¬£¬£¬£¬ËüÖ÷ÒªÕë¶ÔÖÐСÐÍÆóÒµ£¬£¬£¬£¬£¬°üÀ¨²Í¹Ý¡¢¾çÔºÒÔ¼°ÆäËüÓéÀÖ³¡ºÏµÈ¡£¡£¡£¡£DMSniffÖ÷ÒªÇÔÊØÐÅÓÿ¨Êý¾Ý£¬£¬£¬£¬£¬Ëü»áÒ»Ö±ä¯ÀÀÀú³ÌÁÐ±í£¬£¬£¬£¬£¬²¢´ÓÄÚ´æÖÐÆÊÎöÐÅÓÿ¨ºÅ£¬£¬£¬£¬£¬È»ºó½«ÕâЩÐÅÏ¢·¢ËÍÖÁC&CЧÀÍÆ÷¡£¡£¡£¡£DMSniff×Ô2016ÄêÒÔÀ´ÖÁÉÙʹÓùý11ÖÖDGAËã·¨±äÌ壬£¬£¬£¬£¬ÕâÒâζ×ÅÆäÖÁÉÙ°²ÅŹý11¸ö°æ±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/dmsniff-point-of-sale-malware-silently-attacked-smbs-for-years/
ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí