Evernote Chrome²å¼þXSSÎó²î£¬£¬ £¬£¬£¬²¨¼°Ô¼460ÍòÓû§£»£»£»£»£»£»£»WAGO¹¤Òµ½»Á÷»úÓ²±àÂëºóÃÅÕË»§£»£»£»£»£»£»£»ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é

Ðû²¼Ê±¼ä 2019-06-14

1¡¢Evernote Chrome²å¼þXSSÎó²î£¬£¬ £¬£¬£¬²¨¼°Ô¼460ÍòÓû§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖØµÄXSSÎó²î£¬£¬ £¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½Ð§ÀÍÖеÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£ÓÉÓÚEvernote¹ãÊܽӴý£¬£¬ £¬£¬£¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­¹ýʧ£¬£¬ £¬£¬£¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÂÔ£¬£¬ £¬£¬£¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½Ð§À͵ÄÃô¸ÐÓû§ÐÅÏ¢£¬£¬ £¬£¬£¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£¡£¡£¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/

2¡¢Ë¼¿ÆÐû²¼IOS XEÈí¼þ¸üУ¬£¬ £¬£¬£¬ÐÞ¸´Web UIÖеÄCSRFÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Cisco IOS XEÈí¼þWeb UIÖеÄÎó²î£¨CVE-2019-1904£©¿ÉÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¾ÙÐпçÕ¾ÇëÇóαÔ죨CSRF£©¹¥»÷¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚÊÜÓ°ÏìÉè±¹ØÁ¬ÄWeb UIµÄCSRF±£»£»£»£»£»£»£»¤È±·¦£¬£¬ £¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕÆ­Óû§»á¼û¶ñÒâÁ´½ÓÀ´Ê¹ÓôËÎó²î£¬£¬ £¬£¬£¬ÀÖ³ÉʹÓôËÎó²î¿ÉÔÊÐí¹¥»÷ÕßÒÔÓû§µÄȨÏÞ¼¶±ðÖ´ÐÐí§Òâ²Ù×÷¡£¡£¡£¡£ÈôÊÇÓû§¾ßÓÐÖÎÀíȨÏÞ£¬£¬ £¬£¬£¬Ôò¹¥»÷Õß¿ÉÒÔ¸ü¸ÄÉèÖá¢Ö´ÐÐÏÂÁî»òÖØÐ¼ÓÔØÊÜÓ°ÏìµÄ×°±¸¡£¡£¡£¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ8.8·Ö£¬£¬ £¬£¬£¬½¨ÒéÓû§¾¡¿ì×°ÖÃÐÞ¸´²¹¶¡¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190612-iosxe-csrf

3¡¢WAGO¹¤Òµ½»Á÷»ú¶à¸öÎó²î£¬£¬ £¬£¬£¬°üÀ¨Ó²±àÂëµÄºóÃÅÕË»§

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
SEC ConsultÑо¿Ö°Ô±·¢Ã÷µÂ¹úWAGO¹«Ë¾ÖÆÔìµÄ¹¤Òµ½»Á÷»ú±£´æ¶à¸öÎó²î¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËWAGO 852-303¡¢852-1305ºÍ852-1505ϵÁн»Á÷»ú£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÒÑ»®·ÖÐû²¼¹Ì¼þ°æ±¾1.2.2.S0¡¢1.1.6.S0ºÍ1.1.5.S0¾ÙÐÐÁËÐÞ¸´¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îÊÇÓ²±àÂëºóÃÅÕË»§Îó²î£¨CVE-2019-12550£©£¬£¬ £¬£¬£¬Ò»¸ö¾ßÓÐrootȨÏÞµÄĬÈÏÕË»§µÄƾ֤´æ´¢ÔÚÎļþÖУ¬£¬ £¬£¬£¬²¢ÇÒ¾ßÓÐÈõÃÜÂ룬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÕË»§Í¨¹ýTelnet»òSSHÅþÁ¬µ½ÊÜÓ°ÏìµÄ½»Á÷»ú¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/critical-vulnerabilities-found-wago-industrial-switches

4¡¢EviteÈ·ÈϽü1000Íò¿Í»§Êý¾Ý±»µÁ£¬£¬ £¬£¬£¬ÒÑÔÚ°µÍø³öÊÛ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
µç×ÓÔ¼Ç뺯ƽ̨EviteÈ·ÈÏÔÚ2019Äê2ÔÂ22ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬ £¬£¬£¬½ü1000ÍòÓû§Êý¾Ýй¶²¢ÔÚ°µÍøÊг¡ÉϳöÊÛ¡£¡£¡£¡£EviteÌåÏÖδ¾­ÊÚȨµÄµÚÈý·½»ñµÃÁËÒ»¸ö·Ç»î¶¯Êý¾Ý´æ´¢ÎļþµÄ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬¸Ã´æ´¢Îļþ°üÀ¨2013Äê֮ǰµÄEviteÓû§ÕË»§ÐÅÏ¢£¬£¬ £¬£¬£¬ÀýÈçÐÕÃû¡¢Óû§Ãû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂë¡¢³öÉúÈÕÆÚºÍµç»°ºÅÂ룬£¬ £¬£¬£¬µ«²»°üÀ¨²ÆÎñÐÅÏ¢ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£ÕâЩÊý¾Ý±»ÎÛÃûÕÑÖøµÄºÚ¿ÍGnosticplayersÔÚ°µÍøÊг¡Dream MarketÉϳöÊÛ¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/evite-confirms-that-its-customer-data-was-stolen-and-put-up-for-sale-in-the-dark-web-998a1462

5¡¢ºÚ¿ÍÍÅ»ïOutlaw»Ø¹é£¬£¬ £¬£¬£¬Ê¹Óý©Ê¬ÍøÂç·Ö·¢PerlºóÃźÍMonero¿ó¹¤

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
Ç÷ÊÆ¿Æ¼¼·¢Ã÷ºÚ¿Í×éÖ¯Outlaw¾íÍÁÖØÀ´£¬£¬ £¬£¬£¬Ê¹Óý©Ê¬ÍøÂç·Ö·¢ÃÅÂޱҿ󹤡£¡£¡£¡£¸Ã¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÖйú£¬£¬ £¬£¬£¬Æä·Ö·¢µÄ¶ñÒâ¿ó¹¤À¦°óÁËÒ»¸ö»ùÓÚPerlµÄºóÃÅ×é¼þºÍÒ»¸öSSHºóÃÅ£¬£¬ £¬£¬£¬ÕâÁ½¸ö×é¼þ¶¼ÓëÒÔǰµÄOutlaw¹¥»÷ÓйØ¡£¡£¡£¡£Í¨Ì«¹ýÎöshell¾ç±¾×é¼þºÍ´¦ÓÚδִÐÐ״̬µÄÐÝÃß¶ñÒâÎļþ£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±ÒÔΪOutlaw¹¥»÷ÈÔ´¦ÓÚ²âÊԽ׶Σ¬£¬ £¬£¬£¬ÆäÄ¿µÄÊǽøÒ»²½¿ª·¢´óÐͶñÒâÈí¼þºÍ½©Ê¬ÍøÂç¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/outlaw-hackers-return-with-cryptocurrency-mining-bot/

6¡¢FormBookÐÂÑù±¾ÔöÇ¿»ìÏý¼°³¤ÆÚÐÔ»úÖÆ£¬£¬ £¬£¬£¬Í¨¹ýdropper·Ö·¢

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨
 
CyberbitÑо¿Ö°Ô±·¢Ã÷FormBook¶ñÒâÈí¼þµÄÐÂÑù±¾°üÀ¨ÐµÄdropper¡£¡£¡£¡£FormBookÊÇÒ»¸öä¯ÀÀÆ÷±íµ¥ÇÔÈ¡¼°¼üÅ̼ͼľÂí£¬£¬ £¬£¬£¬×Ô2016ÄêÔÚºÚ¿ÍÂÛ̳ÉÏ·ºÆðÒÔÀ´Ò»Ö±ÔÚÆð¾¢¿ª·¢ÖС£¡£¡£¡£Ñо¿Ö°Ô±³Æ¸ÃÐÂÑù±¾ÔöÇ¿ÁËϵͳ³¤ÆÚÐԺͻìÏý»úÖÆÒÔÌӱܼì²â£¬£¬ £¬£¬£¬ÐµÄdropper²»µ«»á½âѹËõ¶ñÒâÈí¼þ£¬£¬ £¬£¬£¬»¹»á½¨ÉèÁ½¸ö¶ñÒâÀú³Ì£ºmshta.exeºÍÁíÒ»¸ödropper £¨Rhododendrons8.exe£©¡£¡£¡£¡£Ñо¿Ö°Ô±ÉÐ佫¸ÃÐÂÑù±¾ÓëÈκι¥»÷»î¶¯¹ØÁªÆðÀ´¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://threatpost.com/new-formbook-dropper-harbors-persistence/145614/