CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ
Ðû²¼Ê±¼ä 2024-11-011. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ
10ÔÂ30ÈÕ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½·¨£¬£¬£¬£¬£¬Í¨¹ýʹÓÃÏÖÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬£¬£¬£¬£¬´Ó¶ø¿ØÖÆÆä¡°Ë½ÓС±Ó¦ÓóÌÐò±à³Ì½Ó¿Ú (API)£¬£¬£¬£¬£¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÈεÄÍøÕ¾±£´æ¡£¡£¡£¡£¡£¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢Ö°Ô±Ìá¹©ÌØÊâȨÏÞ£¬£¬£¬£¬£¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍʹÓ㬣¬£¬£¬£¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ¿ØÖÆ£¬£¬£¬£¬£¬°üÀ¨¸ü¸ÄÉèÖá¢Ð®ÖÆÕË»§¡¢½ûÓÃÇå¾²À©Õ¹µÈ¡£¡£¡£¡£¡£¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½·¨£¬£¬£¬£¬£¬Guardio Ñо¿Ö°Ô±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©Õ¹³ÌÐò£¬£¬£¬£¬£¬¸ÃÀ©Õ¹³ÌÐò±»Éè¼ÆÎªÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÍøÕ¾ÇéÐÎÖÐÔËÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ý¸ÃÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬£¬£¬£¬£¬²¢Ê¹Óà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬣¬£¬£¬£¬´Ó¶øÖÜÈ«Éó²éºÍʹÓÃÆää¯ÀÀ»î¶¯¡£¡£¡£¡£¡£¡£ÎªÏàʶ¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬Opera ½ÓÄÉÁË Chrome ÖÐÒѾʵÏÖµÄÒ»ÖÖ¿ìËÙ½â¾ö¼Æ»®£º×èÖ¹ÈκÎÀ©Õ¹³ÌÐòÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÓòÉÏÔËÐо籾µÄÄÜÁ¦¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users
2. ÍøÂç´¹ÂÚµç×ÓÓʼþÃé׼ѧÉú´û¿î³ÖÓÐÈË
10ÔÂ30ÈÕ£¬£¬£¬£¬£¬½ü4300ÍòÃÀ¹úÈ˱³¸º×ÅÆ½¾ùÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£¡£¡£¡£¡£¡£°ÝµÇ×ÜÍ³ÔøÌá³öÒ»ÏîÖ¼ÔÚÃâÈ¥²¿·ÖÆò´ûÈËÕ®ÎñµÄÍýÏ룬£¬£¬£¬£¬µ«¸ÃÍýÏëÃæÁÙÖØÖØÕϰ¡£¡£¡£¡£¡£¡£ÔÚ´ËÅä¾°Ï£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ӳûúÕë¶ÔѧÉú´û¿î³ÖÓÐÈËÌá³«ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Harmony Email & CollaborationµÄÍøÂçÇå¾²²¿·Ö·¢Ã÷£¬£¬£¬£¬£¬ÕâÀ๥»÷ÔÚÒÑÍùÁ½ÖÜÄÚ¼¤Ôö£¬£¬£¬£¬£¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬ÈçUnicode´Ó×óµ½ÓÒ±ê¼Ç (LRM) ºÍÈíÁ¬×Ö·û£¬£¬£¬£¬£¬ÒÔ¹æ±Ü×ÔÈ»ÓïÑÔ´¦Öóͷ£¼ì²âÆ÷µÄ¼ì²â¡£¡£¡£¡£¡£¡£ÕâЩÓʼþÄÚÈÝ¿´ËƽôÆÈÇÒ¿ÉÐÅ£¬£¬£¬£¬£¬ÊµÔòÖ¼ÔÚÓÕÆÊܺ¦Õßй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£´ËÀ๥»÷²»µ«ÍþвСÎÒ˽¼ÒÐÅÏ¢Çå¾²£¬£¬£¬£¬£¬»¹¿ÉÄÜ¶ÔÆóÒµ×é³ÉΣº¦¡£¡£¡£¡£¡£¡£Ô±¹¤ÈôÔÚ¹«Ë¾×°±¸ÉÏ´¦Öóͷ£ÕâЩÓʼþ£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬£¬£¬£¬£¬½ø¶øÒý·¢Êý¾Ýй¶»òÓªÒµÐÅÏ¢Íâй¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÆóÒµÐè½ÓÄÉÇÐʵ¿ÉÐеIJ½·¥À´Ìá·À´ËÀ๥»÷£¬£¬£¬£¬£¬°üÀ¨Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡¢Ê¹ÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺ÍÇå¾²¹¤¾ß¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤ÒÔ¼°Öƶ©ÍêÉÆµÄÊÂÎñÏìÓ¦ÍýÏë¡£¡£¡£¡£¡£¡£
https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/
3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬£¬£¬£¬£¬Óû§Ðè½ôÆÈÉý¼¶
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬LottieFiles ×òÈÕÐû²¼£¬£¬£¬£¬£¬Æä npm °üÖеÄÌØ¶¨°æ±¾£¬£¬£¬£¬£¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬£¬£¬£¬£¬±»·¢Ã÷Я´ø¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£ÕâЩ°æ±¾»áÌáÐÑÓû§ÅþÁ¬¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£¡£¡£¡£¡£¡£·¢Ã÷ÎÊÌâºó£¬£¬£¬£¬£¬LottieFiles ѸËÙÐû²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔ×èֹΣº¦¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬LottieFiles Ö¸³ö£¬£¬£¬£¬£¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδÀο¿°æ±¾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬£¬£¬£¬£¬µ«Ëæ×ÅÇå¾²°æ±¾µÄÐû²¼£¬£¬£¬£¬£¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½ÐÞ¸´¡£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Éý¼¶µÄÓû§£¬£¬£¬£¬£¬LottieFiles ½¨ÒéÏò×îÖÕÓû§×ª´ïΣº¦£¬£¬£¬£¬£¬²¢ÖÒÑÔËûÃÇÓйØÚ²ÆÐÔ¼ÓÃÜÇ®±ÒÇ®°üÅþÁ¬ÇëÇ󣬣¬£¬£¬£¬»ò¼ÌÐøÊ¹ÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬LottieFiles Ðû²¼Í¨¸æ³Æ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½öÓ°ÏìÆä npm °ü£¬£¬£¬£¬£¬²»Ó°ÏìÆä SaaS ЧÀÍ£¬£¬£¬£¬£¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÒѰþ¶á¸Ä¶¯°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§»á¼ûȨÏÞ£¬£¬£¬£¬£¬²¢×÷·ÏÏà¹ØÁîÅÆ£¬£¬£¬£¬£¬Í¬Ê±¼ÌÐø¶Ô´Ë´ÎÈëÇÖÊÂÎñ¾ÙÐÐÄÚ²¿ÊӲ졣¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊÂÎñÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°ÏêϸËðʧ½ð¶î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/
4. PTZOpticsÉãÏñ»úÏÖÁãÈÕÎó²î£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼʹÓÃÌᳫ¹¥»÷
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃPTZOpticsÔÆÌ¨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢Ã÷µÄÁãÈÕÎó²îCVE-2024-8956ºÍCVE-2024-8957¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£¡£¡£¡£¡£¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂçЧÀÍÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬£¬£¬ÔÊÐíδ¾ÊÚȨµÄÓû§»á¼ûCGI API£¬£¬£¬£¬£¬Ì»Â¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÖÆÎļþÖеÄÊäÈëÕûÀíȱ·¦£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÍêÈ«½ÓÊÜ¡¢Ñ¬È¾¶ñÒâÈí¼þ¡¢¹¥»÷Í³Ò»ÍøÂçµÄÆäËû×°±¸»òÖÐÖ¹ÊÓÆµÁ÷¡£¡£¡£¡£¡£¡£Ö»¹Ü³õʼ¹¥»÷»î¶¯ÔÚ·¢Ã÷ºó²»¾ÃÏûÊÅ£¬£¬£¬£¬£¬µ«6Ô·ºÆðÁËʹÓÃwgetÏÂÔØshell¾ç±¾¾ÙÐз´Ïò»á¼ûµÄʵÑé¡£¡£¡£¡£¡£¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩ӦÉ̾ÙÐÐÈÏÕæÈεÄÅû¶£¬£¬£¬£¬£¬PTZOpticsµÈ³§ÉÌÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬µ«²¿·Ö¾ÉÐͺźÍз¢Ã÷µÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£¡£¡£¡£¡£¡£GreyNoiseÒÔΪ¿ÉÄÜÓиüÆÕ±éµÄ×°±¸Êܵ½Ó°Ï죬£¬£¬£¬£¬½¨ÒéÓû§×Éѯװ±¸¹©Ó¦ÉÌÏàʶ×îй̼þ¸üÐÂÇéÐΡ£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/
5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØÎ¬¶ûÍ£³µÏµÍ³Ì±»¾
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬¶íÂÞ˹Î÷±±²¿¶¼»áÌØÎ¬¶ûµÄסÃñÒòÕþ¸®Ëù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°ÊÖÒÕ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ìì¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçͬÃË¡±µÄºÚ¿Í×éÖ¯Éù³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊÐÖÎÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬£¬£¬£¬£¬²¢Éù³Æ´Ý»ÙÁËÊýʮ̨ÐéÄâ»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸öÊÂÇéÕ¾¡£¡£¡£¡£¡£¡£ÌØÎ¬¶ûÊÐÕþ¸®×î³õδ¶Ô´Ë½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬µ«Ëæºó½ÒÏþÉùÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÕýÔÚ¾ÙÐÐÊÖÒÕάÐÞ¡£¡£¡£¡£¡£¡£ÍâµØ×¡ÃñÔÚʵÑ鸶¿îʱÓöµ½¹ýʧÐÂÎÅ»òÓ¦ÓóÌÐò¼ÓÔØÊ§°Ü¡£¡£¡£¡£¡£¡£ÊÐÕþ¸®¹ÙÔ±ØÊºóÐû²¼Í£³µ¸¶·ÑЧÀÍÒѻָ´£¬£¬£¬£¬£¬µ«Î´È·ÈÏÊÇ·ñ±¬·¢ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿ÍÊ×´ÎÉù³Æ¶Ô¶íÂÞ˹ЧÀÍÌᳫ¹¥»÷£¬£¬£¬£¬£¬´ËǰҲÓÐÀàËÆÊÂÎñ±»¹é×ïΪ¡°ÊÖÒÕ¹ÊÕÏ¡±¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ÍøÂçͬÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¸ÐÈËÊ¿ÕûÌ壬£¬£¬£¬£¬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´Æð¾¢¼ÓÈë·´¶í¶·Õù£¬£¬£¬£¬£¬²¢ÔøÉù³ÆÈëÇÖ¶íÂÞ˹¹ú¼ÒÐÅÓÿ¨Ö§¸¶ÏµÍ³µÈÐж¯¡£¡£¡£¡£¡£¡£
https://therecord.media/ukraine-cyberattack-russia-parking-tver
6. Phish n' ShipsÍøÂç´¹ÂڻѬȾǧ¼ÒÍøµê
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂç´¹Âڻ×Ô2019ÄêÆð£¬£¬£¬£¬£¬ÒÑѬȾÁè¼Ýһǧ¼ÒÕýµ±ÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬Í¨¹ýÍÆ¹ãÐéαÉÌÆ·ÁбíÚ²ÆÊýÊ®ÍòÏûºÄÕߣ¬£¬£¬£¬£¬Ôì³ÉÊýÍòÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÎó²î¡¢¹ýʧÉèÖûòÊÜËðÖÎÀíԱƾ֤ÈëÇÖÍøÕ¾£¬£¬£¬£¬£¬ÉÏ´«¶ñÒâ¾ç±¾ºÍÐéα²úÆ·ÁÐ±í£¬£¬£¬£¬£¬Ê¹ÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£¡£¡£¡£¡£¡£Êܺ¦Õßµã»÷Á´½Óºó±»Öض¨ÏòÖÁ¼ÙÊÐËÁ£¬£¬£¬£¬£¬ÂÄÀúÐéα½áÕËÁ÷³Ì²¢ÊäÈëСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨ÏêÇ飬£¬£¬£¬£¬µ«¹ºÖõÄÎïÆ·´ÓδËÍ´ï¡£¡£¡£¡£¡£¡£SatoriÍþвÇ鱨ÍŶӷ¢Ã÷ËùÓмÙÊÐËÁÅþÁ¬ÖÁÒ»¸öÓÉ14¸öIPµØµã×é³ÉµÄÍøÂ磬£¬£¬£¬£¬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£¡£¡£¡£¡£¡£HUMAN¼°ÆäÏàÖúͬ°éÒÑе÷»ØÓ¦£¬£¬£¬£¬£¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle±¨¸æÐéαÁÐ±í£¬£¬£¬£¬£¬´ó´ó¶¼¶ñÒâËÑË÷Ч¹ûÒѱ»ÕûÀí£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕß¿ÉÄÜ»áʵÑ齨ÉèеÄÚ²ÆÍøÂç¡£¡£¡£¡£¡£¡£½¨ÒéÏûºÄÕß×¢ÖØ²»Ñ°³£Öض¨Ïò£¬£¬£¬£¬£¬È·ÈÏÊÐËÁÍøÖ·£¬£¬£¬£¬£¬²¢±¨¸æÚ²ÆÐÔÊÕ·Ñ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/


¾©¹«Íø°²±¸11010802024551ºÅ