CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ
Ðû²¼Ê±¼ä 2024-11-011. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ
10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓÃÏÖÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬£¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬´Ó¶ø¿ØÖÆÆä¡°Ë½ÓС±Ó¦ÓóÌÐò±à³Ì½Ó¿Ú (API)£¬£¬£¬£¬£¬£¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÈεÄÍøÕ¾±£´æ¡£¡£¡£¡£¡£¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢Ö°Ô±Ìá¹©ÌØÊâȨÏÞ£¬£¬£¬£¬£¬£¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍʹÓ㬣¬£¬£¬£¬£¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ¿ØÖÆ£¬£¬£¬£¬£¬£¬°üÀ¨¸ü¸ÄÉèÖá¢Ð®ÖÆÕË»§¡¢½ûÓÃÇå¾²À©Õ¹µÈ¡£¡£¡£¡£¡£¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬Guardio Ñо¿Ö°Ô±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬¸ÃÀ©Õ¹³ÌÐò±»Éè¼ÆÎªÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÍøÕ¾ÇéÐÎÖÐÔËÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£ËûÃÇͨ¹ý¸ÃÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬£¬£¬£¬£¬£¬²¢Ê¹Óà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬣¬£¬£¬£¬£¬´Ó¶øÖÜÈ«Éó²éºÍʹÓÃÆää¯ÀÀ»î¶¯¡£¡£¡£¡£¡£¡£ÎªÏàʶ¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬Opera ½ÓÄÉÁË Chrome ÖÐÒѾʵÏÖµÄÒ»ÖÖ¿ìËÙ½â¾ö¼Æ»®£º×èÖ¹ÈκÎÀ©Õ¹³ÌÐòÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÓòÉÏÔËÐо籾µÄÄÜÁ¦¡£¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users
2. ÍøÂç´¹ÂÚµç×ÓÓʼþÃé׼ѧÉú´û¿î³ÖÓÐÈË
10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬½ü4300ÍòÃÀ¹úÈ˱³¸º×ÅÆ½¾ùÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£¡£¡£¡£¡£¡£°ÝµÇ×ÜÍ³ÔøÌá³öÒ»ÏîÖ¼ÔÚÃâÈ¥²¿·ÖÆò´ûÈËÕ®ÎñµÄÍýÏ룬£¬£¬£¬£¬£¬µ«¸ÃÍýÏëÃæÁÙÖØÖØÕϰ¡£¡£¡£¡£¡£¡£ÔÚ´ËÅä¾°Ï£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ӳûúÕë¶ÔѧÉú´û¿î³ÖÓÐÈËÌá³«ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£Harmony Email & CollaborationµÄÍøÂçÇå¾²²¿·Ö·¢Ã÷£¬£¬£¬£¬£¬£¬ÕâÀ๥»÷ÔÚÒÑÍùÁ½ÖÜÄÚ¼¤Ôö£¬£¬£¬£¬£¬£¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬ÈçUnicode´Ó×óµ½ÓÒ±ê¼Ç (LRM) ºÍÈíÁ¬×Ö·û£¬£¬£¬£¬£¬£¬ÒÔ¹æ±Ü×ÔÈ»ÓïÑÔ´¦Öóͷ£¼ì²âÆ÷µÄ¼ì²â¡£¡£¡£¡£¡£¡£ÕâЩÓʼþÄÚÈÝ¿´ËƽôÆÈÇÒ¿ÉÐÅ£¬£¬£¬£¬£¬£¬ÊµÔòÖ¼ÔÚÓÕÆÊܺ¦Õßй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£´ËÀ๥»÷²»µ«ÍþвСÎÒ˽¼ÒÐÅÏ¢Çå¾²£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜ¶ÔÆóÒµ×é³ÉΣº¦¡£¡£¡£¡£¡£¡£Ô±¹¤ÈôÔÚ¹«Ë¾×°±¸ÉÏ´¦Öóͷ£ÕâЩÓʼþ£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬£¬£¬£¬£¬£¬½ø¶øÒý·¢Êý¾Ýй¶»òÓªÒµÐÅÏ¢Íâй¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬ÆóÒµÐè½ÓÄÉÇÐʵ¿ÉÐеIJ½·¥À´Ìá·À´ËÀ๥»÷£¬£¬£¬£¬£¬£¬°üÀ¨Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡¢Ê¹ÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺ÍÇå¾²¹¤¾ß¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤ÒÔ¼°Öƶ©ÍêÉÆµÄÊÂÎñÏìÓ¦ÍýÏë¡£¡£¡£¡£¡£¡£
https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/
3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬Óû§Ðè½ôÆÈÉý¼¶
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬LottieFiles ×òÈÕÐû²¼£¬£¬£¬£¬£¬£¬Æä npm °üÖеÄÌØ¶¨°æ±¾£¬£¬£¬£¬£¬£¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬£¬£¬£¬£¬£¬±»·¢Ã÷Я´ø¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£ÕâЩ°æ±¾»áÌáÐÑÓû§ÅþÁ¬¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£¡£¡£¡£¡£¡£·¢Ã÷ÎÊÌâºó£¬£¬£¬£¬£¬£¬LottieFiles ѸËÙÐû²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔ×èֹΣº¦¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬LottieFiles Ö¸³ö£¬£¬£¬£¬£¬£¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδÀο¿°æ±¾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬£¬£¬£¬£¬£¬µ«Ëæ×ÅÇå¾²°æ±¾µÄÐû²¼£¬£¬£¬£¬£¬£¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½ÐÞ¸´¡£¡£¡£¡£¡£¡£¹ØÓÚÎÞ·¨Éý¼¶µÄÓû§£¬£¬£¬£¬£¬£¬LottieFiles ½¨ÒéÏò×îÖÕÓû§×ª´ïΣº¦£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔËûÃÇÓйØÚ²ÆÐÔ¼ÓÃÜÇ®±ÒÇ®°üÅþÁ¬ÇëÇ󣬣¬£¬£¬£¬£¬»ò¼ÌÐøÊ¹ÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬LottieFiles Ðû²¼Í¨¸æ³Æ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½öÓ°ÏìÆä npm °ü£¬£¬£¬£¬£¬£¬²»Ó°ÏìÆä SaaS ЧÀÍ£¬£¬£¬£¬£¬£¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¸Ãƽ̨ÒѰþ¶á¸Ä¶¯°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢×÷·ÏÏà¹ØÁîÅÆ£¬£¬£¬£¬£¬£¬Í¬Ê±¼ÌÐø¶Ô´Ë´ÎÈëÇÖÊÂÎñ¾ÙÐÐÄÚ²¿ÊӲ졣¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊÂÎñÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°ÏêϸËðʧ½ð¶î¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/
4. PTZOpticsÉãÏñ»úÏÖÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼʹÓÃÌᳫ¹¥»÷
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃPTZOpticsÔÆÌ¨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢Ã÷µÄÁãÈÕÎó²îCVE-2024-8956ºÍCVE-2024-8957¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£¡£¡£¡£¡£¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂçЧÀÍÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬£¬£¬£¬ÔÊÐíδ¾ÊÚȨµÄÓû§»á¼ûCGI API£¬£¬£¬£¬£¬£¬Ì»Â¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÖÆÎļþÖеÄÊäÈëÕûÀíȱ·¦£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÍêÈ«½ÓÊÜ¡¢Ñ¬È¾¶ñÒâÈí¼þ¡¢¹¥»÷Í³Ò»ÍøÂçµÄÆäËû×°±¸»òÖÐÖ¹ÊÓÆµÁ÷¡£¡£¡£¡£¡£¡£Ö»¹Ü³õʼ¹¥»÷»î¶¯ÔÚ·¢Ã÷ºó²»¾ÃÏûÊÅ£¬£¬£¬£¬£¬£¬µ«6Ô·ºÆðÁËʹÓÃwgetÏÂÔØshell¾ç±¾¾ÙÐз´Ïò»á¼ûµÄʵÑé¡£¡£¡£¡£¡£¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩ӦÉ̾ÙÐÐÈÏÕæÈεÄÅû¶£¬£¬£¬£¬£¬£¬PTZOpticsµÈ³§ÉÌÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬µ«²¿·Ö¾ÉÐͺźÍз¢Ã÷µÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£¡£¡£¡£¡£¡£GreyNoiseÒÔΪ¿ÉÄÜÓиüÆÕ±éµÄ×°±¸Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬½¨ÒéÓû§×Éѯװ±¸¹©Ó¦ÉÌÏàʶ×îй̼þ¸üÐÂÇéÐΡ£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/
5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØÎ¬¶ûÍ£³µÏµÍ³Ì±»¾
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬¶íÂÞ˹Î÷±±²¿¶¼»áÌØÎ¬¶ûµÄסÃñÒòÕþ¸®Ëù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°ÊÖÒÕ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ìì¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçͬÃË¡±µÄºÚ¿Í×éÖ¯Éù³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊÐÖÎÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬£¬£¬£¬£¬£¬²¢Éù³Æ´Ý»ÙÁËÊýʮ̨ÐéÄâ»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸öÊÂÇéÕ¾¡£¡£¡£¡£¡£¡£ÌØÎ¬¶ûÊÐÕþ¸®×î³õδ¶Ô´Ë½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬£¬µ«Ëæºó½ÒÏþÉùÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÕýÔÚ¾ÙÐÐÊÖÒÕάÐÞ¡£¡£¡£¡£¡£¡£ÍâµØ×¡ÃñÔÚʵÑ鸶¿îʱÓöµ½¹ýʧÐÂÎÅ»òÓ¦ÓóÌÐò¼ÓÔØÊ§°Ü¡£¡£¡£¡£¡£¡£ÊÐÕþ¸®¹ÙÔ±ØÊºóÐû²¼Í£³µ¸¶·ÑЧÀÍÒѻָ´£¬£¬£¬£¬£¬£¬µ«Î´È·ÈÏÊÇ·ñ±¬·¢ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿ÍÊ×´ÎÉù³Æ¶Ô¶íÂÞ˹ЧÀÍÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬´ËǰҲÓÐÀàËÆÊÂÎñ±»¹é×ïΪ¡°ÊÖÒÕ¹ÊÕÏ¡±¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼ÍøÂçͬÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¸ÐÈËÊ¿ÕûÌ壬£¬£¬£¬£¬£¬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´Æð¾¢¼ÓÈë·´¶í¶·Õù£¬£¬£¬£¬£¬£¬²¢ÔøÉù³ÆÈëÇÖ¶íÂÞ˹¹ú¼ÒÐÅÓÿ¨Ö§¸¶ÏµÍ³µÈÐж¯¡£¡£¡£¡£¡£¡£
https://therecord.media/ukraine-cyberattack-russia-parking-tver
6. Phish n' ShipsÍøÂç´¹ÂڻѬȾǧ¼ÒÍøµê
10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂç´¹Âڻ×Ô2019ÄêÆð£¬£¬£¬£¬£¬£¬ÒÑѬȾÁè¼Ýһǧ¼ÒÕýµ±ÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬£¬Í¨¹ýÍÆ¹ãÐéαÉÌÆ·ÁбíÚ²ÆÊýÊ®ÍòÏûºÄÕߣ¬£¬£¬£¬£¬£¬Ôì³ÉÊýÍòÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÎó²î¡¢¹ýʧÉèÖûòÊÜËðÖÎÀíԱƾ֤ÈëÇÖÍøÕ¾£¬£¬£¬£¬£¬£¬ÉÏ´«¶ñÒâ¾ç±¾ºÍÐéα²úÆ·ÁÐ±í£¬£¬£¬£¬£¬£¬Ê¹ÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£¡£¡£¡£¡£¡£Êܺ¦Õßµã»÷Á´½Óºó±»Öض¨ÏòÖÁ¼ÙÊÐËÁ£¬£¬£¬£¬£¬£¬ÂÄÀúÐéα½áÕËÁ÷³Ì²¢ÊäÈëСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨ÏêÇ飬£¬£¬£¬£¬£¬µ«¹ºÖõÄÎïÆ·´ÓδËÍ´ï¡£¡£¡£¡£¡£¡£SatoriÍþвÇ鱨ÍŶӷ¢Ã÷ËùÓмÙÊÐËÁÅþÁ¬ÖÁÒ»¸öÓÉ14¸öIPµØµã×é³ÉµÄÍøÂ磬£¬£¬£¬£¬£¬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£¡£¡£¡£¡£¡£HUMAN¼°ÆäÏàÖúͬ°éÒÑе÷»ØÓ¦£¬£¬£¬£¬£¬£¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle±¨¸æÐéαÁÐ±í£¬£¬£¬£¬£¬£¬´ó´ó¶¼¶ñÒâËÑË÷Ч¹ûÒѱ»ÕûÀí£¬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕß¿ÉÄÜ»áʵÑ齨ÉèеÄÚ²ÆÍøÂç¡£¡£¡£¡£¡£¡£½¨ÒéÏûºÄÕß×¢ÖØ²»Ñ°³£Öض¨Ïò£¬£¬£¬£¬£¬£¬È·ÈÏÊÐËÁÍøÖ·£¬£¬£¬£¬£¬£¬²¢±¨¸æÚ²ÆÐÔÊÕ·Ñ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/