Linux KDE 4/5±£´æÎ´ÐÞ¸´µÄÏÂÁî×¢ÈëÎó²î£»£»£»SmominruÐ®ÖÆ50¶àÍǫ̀µçÄÔÍڿ󣻣»£»CSAÐû²¼ÔÆÅÌËã11ÏîÍþвÁбí

Ðû²¼Ê±¼ä 2019-08-08
1¡¢Linux KDE 4/5±£´æÎ´ÐÞ¸´µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬PoCÒÑÐû²¼

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²Ñо¿Ô±Dominik PennerÅû¶Linux KDEÖеÄÒ»¸öÉÐδÐÞ¸´µÄ0day£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§ÏÂÔØÏ¢ÕùѹËõ¶ñÒâ.desktopºÍ.directoryÎļþÔÚÓû§µÄÅÌËã»úÉϾ²Ä¬Ö´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬ÉõÖÁÎÞÐèÓû§ÏÖʵ·­¿ª¸ÃÎļþ¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËKDE°æ±¾4ºÍ5£¬£¬£¬£¬£¬£¬ÏÕЩËùÓеÄLinux¿¯Ðа涼±»²¨¼°¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËPoC´úÂëÒÔ¼°¸ÃÏÂÁî×¢ÈëÎó²îµÄÑÝʾÊÓÆµ¡£¡£¡£¡£¡£KDEÉçÇøÈ·ÈÏÁËÕâÒ»Îó²î²¢ÏòÓû§°ü¹ÜÐÞ¸´ÊÂÇéÕýÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kde-desktop-linux-vulnerability.html


2¡¢BinanceÔâµ½ÀÕË÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÍþвÐû²¼1ÍòÃû¿Í»§µÄKYCÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¼ÓÃÜÇ®±ÒÉúÒâËùBinanceÔâµ½Ò»Ãû·¸·¨·Ö×ÓµÄڲƭÀÕË÷£¬£¬£¬£¬£¬£¬¸ÃڲƭÕßÉù³ÆÒѾ­ÇÔÈ¡ÁËÊýǧÃûBinance¿Í»§µÄKYCÐÅÏ¢£¨¼´¡°ÏàʶÄúµÄ¿Í»§¡±ÐÅÏ¢£©£¬£¬£¬£¬£¬£¬²¢ÏòBinanceÀÕË÷300±ÈÌØ±Ò£¨¼ÛÖµ½ü350ÍòÃÀÔª£©µÄÊê½ð¡£¡£¡£¡£¡£BinanceÌåÏָù«Ë¾ÈÔÔÚÊÓ²ìÕâЩͼÏñµÄÕýµ±ÐÔ£¬£¬£¬£¬£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¸ÃڲƭÕß½¨ÉèÁËÒ»¸öTelegram̸Ìì×飬£¬£¬£¬£¬£¬²¢·ÖÏíÁË400¶àÕÅÊÖ³Ö»¤ÕÕ/Éí·ÝÖ¤µÄÈ˵ÄÕÕÆ¬£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤BinanceµÄ˵·¨£¬£¬£¬£¬£¬£¬ÕâЩͼÏñȱÉÙÆäÄÚ²¿ÐÅÏ¢µÄÊý×Öˮӡ£¬£¬£¬£¬£¬£¬ÕâÔöÌíÁ˶ÔÊý¾ÝÕæÊµÐÔµÄÏÓÒÉ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ½«ÏòÌṩڲƭÕßÉí·ÝÐÅÏ¢µÄÈ˽±Àø25±ÈÌØ±Ò£¨¼ÛÖµÁè¼Ý29ÍòÃÀÔª£©¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/binance-kyc-data-leak.html


3¡¢ÐǰͿËÊý¾Ý¿âSQL×¢ÈëÎó²î̻¶½ü100ÍòÌõ²ÆÎñ¼Í¼

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Çå¾²Ñо¿Ô±Eugene LimÓÚ4ÔÂ8ÈÕÔÚÐÇ°Í¿ËµÄÆóÒµÊý¾Ý¿âÖз¢Ã÷Ò»¸öSQL×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îµ¼Ö½ü100ÍòÌõ²ÆÎñ¼Í¼̻¶£¬£¬£¬£¬£¬£¬°üÀ¨Ë°ÎñÐÅÏ¢¡¢ÊÕÌõÒÔ¼°ÈËΪµ¥Êý¾ÝµÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¸Ã¹«Ë¾ÔÚHackerOneÉϵÄÎó²î½±ÀøÍýÏëÌá½»ÁËÎó²î£¬£¬£¬£¬£¬£¬ÐǰͿËÔÚÁ½ÌìÄÚÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Òò´Ë»ñµÃÁË4000ÃÀÔªµÄ½±Àø¡£¡£¡£¡£¡£¸ÃÎó²î±¨¸æÓÚ8ÔÂ6ÈÕÔÚHackerOneÉÏÅû¶¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sql-injection-vulnerability-exposed-starbucks-financial-records


4¡¢½©Ê¬ÍøÂçSmominruÐ®ÖÆ50¶àÍǫ̀µçÄÔÍڿ󣬣¬£¬£¬£¬£¬²¢ÇÔȡƾ֤ÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Carbon BlackµÄTAUÑо¿ÍŶӷ¢Ã÷Ò»¸öÐµĹ¥»÷»î¶¯SmominruÕýÔÚͨ¹ý½©Ê¬ÍøÂçÍÚÈ¡ÃÅÂÞ±Ò£¬£¬£¬£¬£¬£¬²¢ÇÒÇÔÈ¡Óû§µÄ»á¼ûƾ֤¡£¡£¡£¡£¡£SmominruÒѾ­ÀÖ³ÉÐ®ÖÆÁËÈ«ÇòÁè¼Ý50Íǫ̀»úе£¬£¬£¬£¬£¬£¬TAUÌåÏָý©Ê¬ÍøÂçÖÁÉÙÒѾ­»îÔ¾ÁËÁ½Ä꣬£¬£¬£¬£¬£¬²¢ÇÒÖ÷Ҫͨ¹ýÓÀºãÖ®À¶Èö²¥£¬£¬£¬£¬£¬£¬Êܺ¦ÕßÖ÷ҪλÓÚÑÇÌ«µØÇø¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«ÕâÖÖÁ¬ÏµÍÚ¿óºÍƾ֤ÇÔÈ¡µÄ¹¥»÷³ÆÖ®Îªaccess mining¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷SmominruÓëÁíÒ»¸ö½©Ê¬ÍøÂçMyKings±£´æ¹ØÁª¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-cryptojacking-campaign-strikes-half-a-million-pcs/


5¡¢°Í»ù˹̹ÄÐ×Óͨ¹ýÐлßAT£¦TÔ±¹¤²»·¨½âËø200¶àÍò²¿ÊÖ»ú


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°Í»ù˹̹һÃûÄÐ×Ó±»Ö¸¿ØÔÚÎåÄêµÄʱ¼äÄÚͨ¹ýÐлßAT£¦TµçÐŹ«Ë¾µÄÔ±¹¤²»·¨½âËø200¶àÍò²¿ÊÖ»úÒÔ¼°Ôڸù«Ë¾µÄÍøÂçÉÏÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸ÃÃûÄÐ×ÓÊÇÏÖÄê34ËêµÄ°Í»ù˹̹¹«ÃñMuhammad Fahd£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÃÀ¹úÁª°îÕþ¸®µÄÆðËßÊ飬£¬£¬£¬£¬£¬FahdÔÚ2012ÄêÖÁ2017Äêʱ´úÏòAT£¦TÄÚ²¿Ô±¹¤ÐлßÁè¼Ý100ÍòÃÀÔª£¬£¬£¬£¬£¬£¬ÒÔ²»·¨½âËø±»AT£¦T¹«Ë¾Ëø¶¨µÄÊÖ»ú×°±¸¡£¡£¡£¡£¡£ÔÚ¼ÓÈëÆäÍýÏëµÄһЩԱ¹¤±»AT&T¿ª³ýºó£¬£¬£¬£¬£¬£¬Fahd»¹Ïò¸Ã¹«Ë¾ÄÚÍø×°ÖöñÒ⹤¾ß£¬£¬£¬£¬£¬£¬Ê¹ÆäÄܹ»Í¨¹ýAT£¦TÅÌËã»úÔ¶³Ì½âËøÊÖ»ú¡£¡£¡£¡£¡£Fahd½«ÃæÁÙ³¤´ï20ÄêµÄî¿Ïµ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/sim-device-unlocking-malware.html


6¡¢ÔÆÇ徲ͬÃËCSAÐû²¼Õë¶ÔÔÆÅÌËãµÄ11Ïî×îÐÂÍþвÁбí

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÆÇ徲ͬÃË£¨CSA£©Ðû²¼ÔÆÅÌËãÍþв¶´²ì±¨¸æ£¬£¬£¬£¬£¬£¬±¨¸æÖÐÁгöÁËÔÆÅÌËãÃæÁÙµÄ11Ïî¶¥¼¶Çå¾²ÎÊÌâ¡£¡£¡£¡£¡£ÕâÊÇ×Ô2016ÄêCSAÐû²¼ÔÆÅÌËã¶¥¼¶ÍþвTop12ÒÔÀ´µÄµÚÒ»´ÎÖØ´ó¸üС£¡£¡£¡£¡£Ã»Óб¬·¢×ª±äµÄÍþв°üÀ¨Êý¾Ýй¶¡¢Éí·ÝÖÎÀí²»ÉÆ¡¢²»Çå¾²µÄAPI¡¢ÕË»§Ð®ÖÆ¡¢ÄÚ²¿ÍþвÒÔ¼°ÔÆÐ§Àͱ»ÀÄÓûò¶ñÒâʹÓᣡ£¡£¡£¡£Ê£ÏµÄÎå¸öÐÂÍþв°üÀ¨Èõ¿ØÖÆÃæ¡¢Ôª½á¹¹ÓëÓ¦Óýṹʧ°Ü¡¢ÉèÖùýʧºÍ±ä»»¿ØÖÆÈ±·¦¡¢È±·¦ÔÆÇå¾²¼Ü¹¹ºÍÕ½ÂÔÒÔ¼°ÔÆÊ¹ÓõĿɼûÐÔÊÜÏÞ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/cloud-security-alliance-releases/