Linux KDE 4/5±£´æÎ´ÐÞ¸´µÄÏÂÁî×¢ÈëÎó²î£»£»£»£»£»SmominruÐ®ÖÆ50¶àÍǫ̀µçÄÔÍڿ󣻣»£»£»£»CSAÐû²¼ÔÆÅÌËã11ÏîÍþвÁбí

Ðû²¼Ê±¼ä 2019-08-08
1¡¢Linux KDE 4/5±£´æÎ´ÐÞ¸´µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬PoCÒÑÐû²¼

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Çå¾²Ñо¿Ô±Dominik PennerÅû¶Linux KDEÖеÄÒ»¸öÉÐδÐÞ¸´µÄ0day£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§ÏÂÔØÏ¢ÕùѹËõ¶ñÒâ.desktopºÍ.directoryÎļþÔÚÓû§µÄÅÌËã»úÉϾ²Ä¬Ö´ÐÐí§Òâ´úÂ룬£¬£¬ÉõÖÁÎÞÐèÓû§ÏÖʵ·­¿ª¸ÃÎļþ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËKDE°æ±¾4ºÍ5£¬£¬£¬ÏÕЩËùÓеÄLinux¿¯Ðа涼±»²¨¼°¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËPoC´úÂëÒÔ¼°¸ÃÏÂÁî×¢ÈëÎó²îµÄÑÝʾÊÓÆµ¡£¡£¡£¡£¡£¡£KDEÉçÇøÈ·ÈÏÁËÕâÒ»Îó²î²¢ÏòÓû§°ü¹ÜÐÞ¸´ÊÂÇéÕýÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kde-desktop-linux-vulnerability.html


2¡¢BinanceÔâµ½ÀÕË÷£¬£¬£¬¹¥»÷ÕßÍþвÐû²¼1ÍòÃû¿Í»§µÄKYCÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


¼ÓÃÜÇ®±ÒÉúÒâËùBinanceÔâµ½Ò»Ãû·¸·¨·Ö×ÓµÄڲƭÀÕË÷£¬£¬£¬¸ÃڲƭÕßÉù³ÆÒѾ­ÇÔÈ¡ÁËÊýǧÃûBinance¿Í»§µÄKYCÐÅÏ¢£¨¼´¡°ÏàʶÄúµÄ¿Í»§¡±ÐÅÏ¢£©£¬£¬£¬²¢ÏòBinanceÀÕË÷300±ÈÌØ±Ò£¨¼ÛÖµ½ü350ÍòÃÀÔª£©µÄÊê½ð¡£¡£¡£¡£¡£¡£BinanceÌåÏָù«Ë¾ÈÔÔÚÊÓ²ìÕâЩͼÏñµÄÕýµ±ÐÔ£¬£¬£¬²¢¾Ü¾øÖ§¸¶Êê½ð¡£¡£¡£¡£¡£¡£¸ÃڲƭÕß½¨ÉèÁËÒ»¸öTelegram̸Ìì×飬£¬£¬²¢·ÖÏíÁË400¶àÕÅÊÖ³Ö»¤ÕÕ/Éí·ÝÖ¤µÄÈ˵ÄÕÕÆ¬£¬£¬£¬µ«Æ¾Ö¤BinanceµÄ˵·¨£¬£¬£¬ÕâЩͼÏñȱÉÙÆäÄÚ²¿ÐÅÏ¢µÄÊý×Öˮӡ£¬£¬£¬ÕâÔöÌíÁ˶ÔÊý¾ÝÕæÊµÐÔµÄÏÓÒÉ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ½«ÏòÌṩڲƭÕßÉí·ÝÐÅÏ¢µÄÈ˽±Àø25±ÈÌØ±Ò£¨¼ÛÖµÁè¼Ý29ÍòÃÀÔª£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/binance-kyc-data-leak.html


3¡¢ÐǰͿËÊý¾Ý¿âSQL×¢ÈëÎó²î̻¶½ü100ÍòÌõ²ÆÎñ¼Í¼

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Çå¾²Ñо¿Ô±Eugene LimÓÚ4ÔÂ8ÈÕÔÚÐÇ°Í¿ËµÄÆóÒµÊý¾Ý¿âÖз¢Ã÷Ò»¸öSQL×¢ÈëÎó²î£¬£¬£¬¸ÃÎó²îµ¼Ö½ü100ÍòÌõ²ÆÎñ¼Í¼̻¶£¬£¬£¬°üÀ¨Ë°ÎñÐÅÏ¢¡¢ÊÕÌõÒÔ¼°ÈËΪµ¥Êý¾ÝµÈ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¸Ã¹«Ë¾ÔÚHackerOneÉϵÄÎó²î½±ÀøÍýÏëÌá½»ÁËÎó²î£¬£¬£¬ÐǰͿËÔÚÁ½ÌìÄÚÐÞ¸´Á˸ÃÎÊÌâ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Òò´Ë»ñµÃÁË4000ÃÀÔªµÄ½±Àø¡£¡£¡£¡£¡£¡£¸ÃÎó²î±¨¸æÓÚ8ÔÂ6ÈÕÔÚHackerOneÉÏÅû¶¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sql-injection-vulnerability-exposed-starbucks-financial-records


4¡¢½©Ê¬ÍøÂçSmominruÐ®ÖÆ50¶àÍǫ̀µçÄÔÍڿ󣬣¬£¬²¢ÇÔȡƾ֤ÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Carbon BlackµÄTAUÑо¿ÍŶӷ¢Ã÷Ò»¸öÐµĹ¥»÷»î¶¯SmominruÕýÔÚͨ¹ý½©Ê¬ÍøÂçÍÚÈ¡ÃÅÂÞ±Ò£¬£¬£¬²¢ÇÒÇÔÈ¡Óû§µÄ»á¼ûƾ֤¡£¡£¡£¡£¡£¡£SmominruÒѾ­ÀÖ³ÉÐ®ÖÆÁËÈ«ÇòÁè¼Ý50Íǫ̀»úе£¬£¬£¬TAUÌåÏָý©Ê¬ÍøÂçÖÁÉÙÒѾ­»îÔ¾ÁËÁ½Ä꣬£¬£¬²¢ÇÒÖ÷Ҫͨ¹ýÓÀºãÖ®À¶Èö²¥£¬£¬£¬Êܺ¦ÕßÖ÷ҪλÓÚÑÇÌ«µØÇø¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±½«ÕâÖÖÁ¬ÏµÍÚ¿óºÍƾ֤ÇÔÈ¡µÄ¹¥»÷³ÆÖ®Îªaccess mining¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»¹·¢Ã÷SmominruÓëÁíÒ»¸ö½©Ê¬ÍøÂçMyKings±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-cryptojacking-campaign-strikes-half-a-million-pcs/


5¡¢°Í»ù˹̹ÄÐ×Óͨ¹ýÐлßAT£¦TÔ±¹¤²»·¨½âËø200¶àÍò²¿ÊÖ»ú


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


°Í»ù˹̹һÃûÄÐ×Ó±»Ö¸¿ØÔÚÎåÄêµÄʱ¼äÄÚͨ¹ýÐлßAT£¦TµçÐŹ«Ë¾µÄÔ±¹¤²»·¨½âËø200¶àÍò²¿ÊÖ»úÒÔ¼°Ôڸù«Ë¾µÄÍøÂçÉÏÖ²Èë¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¸ÃÃûÄÐ×ÓÊÇÏÖÄê34ËêµÄ°Í»ù˹̹¹«ÃñMuhammad Fahd£¬£¬£¬Æ¾Ö¤ÃÀ¹úÁª°îÕþ¸®µÄÆðËßÊ飬£¬£¬FahdÔÚ2012ÄêÖÁ2017Äêʱ´úÏòAT£¦TÄÚ²¿Ô±¹¤ÐлßÁè¼Ý100ÍòÃÀÔª£¬£¬£¬ÒÔ²»·¨½âËø±»AT£¦T¹«Ë¾Ëø¶¨µÄÊÖ»ú×°±¸¡£¡£¡£¡£¡£¡£ÔÚ¼ÓÈëÆäÍýÏëµÄһЩԱ¹¤±»AT&T¿ª³ýºó£¬£¬£¬Fahd»¹Ïò¸Ã¹«Ë¾ÄÚÍø×°ÖöñÒ⹤¾ß£¬£¬£¬Ê¹ÆäÄܹ»Í¨¹ýAT£¦TÅÌËã»úÔ¶³Ì½âËøÊÖ»ú¡£¡£¡£¡£¡£¡£Fahd½«ÃæÁÙ³¤´ï20ÄêµÄî¿Ïµ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/sim-device-unlocking-malware.html


6¡¢ÔÆÇ徲ͬÃËCSAÐû²¼Õë¶ÔÔÆÅÌËãµÄ11Ïî×îÐÂÍþвÁбí

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÔÆÇ徲ͬÃË£¨CSA£©Ðû²¼ÔÆÅÌËãÍþв¶´²ì±¨¸æ£¬£¬£¬±¨¸æÖÐÁгöÁËÔÆÅÌËãÃæÁÙµÄ11Ïî¶¥¼¶Çå¾²ÎÊÌâ¡£¡£¡£¡£¡£¡£ÕâÊÇ×Ô2016ÄêCSAÐû²¼ÔÆÅÌËã¶¥¼¶ÍþвTop12ÒÔÀ´µÄµÚÒ»´ÎÖØ´ó¸üС£¡£¡£¡£¡£¡£Ã»Óб¬·¢×ª±äµÄÍþв°üÀ¨Êý¾Ýй¶¡¢Éí·ÝÖÎÀí²»ÉÆ¡¢²»Çå¾²µÄAPI¡¢ÕË»§Ð®ÖÆ¡¢ÄÚ²¿ÍþвÒÔ¼°ÔÆÐ§Àͱ»ÀÄÓûò¶ñÒâʹÓᣡ£¡£¡£¡£¡£Ê£ÏµÄÎå¸öÐÂÍþв°üÀ¨Èõ¿ØÖÆÃæ¡¢Ôª½á¹¹ÓëÓ¦Óýṹʧ°Ü¡¢ÉèÖùýʧºÍ±ä»»¿ØÖÆÈ±·¦¡¢È±·¦ÔÆÇå¾²¼Ü¹¹ºÍÕ½ÂÔÒÔ¼°ÔÆÊ¹ÓõĿɼûÐÔÊÜÏÞ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/cloud-security-alliance-releases/