CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ

Ðû²¼Ê±¼ä 2024-11-01

1. CrossBarking¹¥»÷£ºOperaä¯ÀÀÆ÷˽ÓÐAPIÔâÐ®ÖÆ


10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄä¯ÀÀÆ÷¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬Í¨¹ýʹÓÃÏÖÒÑÐÞ¸´µÄÎó²î£¬£¬£¬£¬£¬£¬£¬½«×Ô½ç˵´úÂë×¢ÈëÊܺ¦ÕßµÄ Opera ä¯ÀÀÆ÷£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ØÖÆÆä¡°Ë½ÓС±Ó¦ÓóÌÐò±à³Ì½Ó¿Ú (API)£¬£¬£¬£¬£¬£¬£¬ÕâЩ API ͨ³£½öΪ×îÊÜÐÅÈεÄÍøÕ¾±£´æ¡£¡£¡£¡£ÕâЩ˽ÓÐ API ¿ÉΪ¿ª·¢Ö°Ô±Ìá¹©ÌØÊâȨÏÞ£¬£¬£¬£¬£¬£¬£¬µ«Ò²¿ÉÄܱ»ºÚ¿ÍʹÓ㬣¬£¬£¬£¬£¬£¬ÒÔ»ñµÃ¶Ôä¯ÀÀÆ÷µÄȫȨ¿ØÖÆ£¬£¬£¬£¬£¬£¬£¬°üÀ¨¸ü¸ÄÉèÖá¢Ð®ÖÆÕË»§¡¢½ûÓÃÇå¾²À©Õ¹µÈ¡£¡£¡£¡£ÎªÁËչʾÕâÖÖ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬Guardio Ñо¿Ö°Ô±¿ª·¢ÁËÒ»¸ö¶ñÒâµÄ Chrome À©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬£¬¸ÃÀ©Õ¹³ÌÐò±»Éè¼ÆÎªÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÍøÕ¾ÇéÐÎÖÐÔËÐжñÒâ´úÂë¡£¡£¡£¡£ËûÃÇͨ¹ý¸ÃÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬£¬½«¶ñÒâ´úÂë×¢Èëµ½ Opera ä¯ÀÀÆ÷ÖУ¬£¬£¬£¬£¬£¬£¬²¢Ê¹Óà settingsPrivate API ¸ü¸ÄÁËÊܺ¦ÕßµÄÓòÃûϵͳ (DNS) ÉèÖ㬣¬£¬£¬£¬£¬£¬´Ó¶øÖÜÈ«Éó²éºÍʹÓÃÆää¯ÀÀ»î¶¯¡£¡£¡£¡£ÎªÏàʶ¾öÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬£¬Opera ½ÓÄÉÁË Chrome ÖÐÒѾ­ÊµÏÖµÄÒ»ÖÖ¿ìËÙ½â¾ö¼Æ»®£º×èÖ¹ÈκÎÀ©Õ¹³ÌÐòÔÚ¾ßÓÐ˽ÓÐ API »á¼ûȨÏÞµÄÓòÉÏÔËÐо籾µÄÄÜÁ¦¡£¡£¡£¡£


https://www.darkreading.com/vulnerabilities-threats/crossbarking-attack-secret-apis-expose-opera-browser-users


2. ÍøÂç´¹ÂÚµç×ÓÓʼþÃé׼ѧÉú´û¿î³ÖÓÐÈË


10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬½ü4300ÍòÃÀ¹úÈ˱³¸º×ÅÆ½¾ùÿÈË37,000ÃÀÔªµÄѧÉú´û¿îÕ®Îñ¡£¡£¡£¡£°ÝµÇ×ÜÍ³ÔøÌá³öÒ»ÏîÖ¼ÔÚÃâÈ¥²¿·ÖÆò´ûÈËÕ®ÎñµÄÍýÏ룬£¬£¬£¬£¬£¬£¬µ«¸ÃÍýÏëÃæÁÙÖØÖØÕϰ­¡£¡£¡£¡£ÔÚ´ËÅä¾°Ï£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ӳûúÕë¶ÔѧÉú´û¿î³ÖÓÐÈËÌá³«ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£Harmony Email & CollaborationµÄÍøÂçÇå¾²²¿·Ö·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÕâÀ๥»÷ÔÚÒÑÍùÁ½ÖÜÄÚ¼¤Ôö£¬£¬£¬£¬£¬£¬£¬ÇÒ¹¥»÷ÕßʹÓÃÁËÌØÊâµÄÎı¾»ìÏýÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬ÈçUnicode´Ó×óµ½ÓÒ±ê¼Ç (LRM) ºÍÈíÁ¬×Ö·û£¬£¬£¬£¬£¬£¬£¬ÒÔ¹æ±Ü×ÔÈ»ÓïÑÔ´¦Öóͷ£¼ì²âÆ÷µÄ¼ì²â¡£¡£¡£¡£ÕâЩÓʼþÄÚÈÝ¿´ËƽôÆÈÇÒ¿ÉÐÅ£¬£¬£¬£¬£¬£¬£¬ÊµÔòÖ¼ÔÚÓÕÆ­Êܺ¦Õßй¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£´ËÀ๥»÷²»µ«ÍþвСÎÒ˽¼ÒÐÅÏ¢Çå¾²£¬£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜ¶ÔÆóÒµ×é³ÉΣº¦¡£¡£¡£¡£Ô±¹¤ÈôÔÚ¹«Ë¾×°±¸ÉÏ´¦Öóͷ£ÕâЩÓʼþ£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¶ñÒâÈí¼þÈëÇÖ¹«Ë¾ÏµÍ³£¬£¬£¬£¬£¬£¬£¬½ø¶øÒý·¢Êý¾Ýй¶»òÓªÒµÐÅÏ¢Íâй¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬ÆóÒµÐè½ÓÄÉÇÐʵ¿ÉÐеIJ½·¥À´Ìá·À´ËÀ๥»÷£¬£¬£¬£¬£¬£¬£¬°üÀ¨Ìá¸ßÔ±¹¤Çå¾²Òâʶ¡¢Ê¹ÓÃÏȽøµÄµç×ÓÓʼþ¹ýÂ˺ÍÇå¾²¹¤¾ß¡¢ÊµÑé¶àÒòËØÉí·ÝÑéÖ¤ÒÔ¼°Öƶ©ÍêÉÆµÄÊÂÎñÏìÓ¦ÍýÏë¡£¡£¡£¡£


https://blog.checkpoint.com/harmony-email/7500-phishing-emails-use-interesting-obfuscation-method-to-target-student-loan-holders/


3. LottieFiles npm°üÏÖ¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬Óû§Ðè½ôÆÈÉý¼¶


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬LottieFiles ×òÈÕÐû²¼£¬£¬£¬£¬£¬£¬£¬Æä npm °üÖеÄÌØ¶¨°æ±¾£¬£¬£¬£¬£¬£¬£¬¼´ Lottie Web Player£¨¡°lottie-player¡±£©µÄ 2.0.5¡¢2.0.6 ºÍ 2.0.7 °æ±¾£¬£¬£¬£¬£¬£¬£¬±»·¢Ã÷Я´ø¶ñÒâ´úÂë¡£¡£¡£¡£ÕâЩ°æ±¾»áÌáÐÑÓû§ÅþÁ¬¼ÓÃÜÇ®±ÒÇ®°ü£¬£¬£¬£¬£¬£¬£¬ÒâͼÇå¿ÕÇ®°üÖеÄ×ʲú¡£¡£¡£¡£·¢Ã÷ÎÊÌâºó£¬£¬£¬£¬£¬£¬£¬LottieFiles ѸËÙÐû²¼ÁË´¿¾»µÄ 2.0.8 °æ±¾£¬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ìÉý¼¶ÒÔ×èֹΣº¦¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬LottieFiles Ö¸³ö£¬£¬£¬£¬£¬£¬£¬Í¨¹ýµÚÈý·½ CDN ʹÓøÿâÇÒδÀο¿°æ±¾µÄÓû§»á×Ô¶¯ÊÕµ½ÊÜËð°æ±¾£¬£¬£¬£¬£¬£¬£¬µ«Ëæ×ÅÇå¾²°æ±¾µÄÐû²¼£¬£¬£¬£¬£¬£¬£¬ÕâЩÓû§½«×Ô¶¯ÊÕµ½ÐÞ¸´¡£¡£¡£¡£¹ØÓÚÎÞ·¨Éý¼¶µÄÓû§£¬£¬£¬£¬£¬£¬£¬LottieFiles ½¨ÒéÏò×îÖÕÓû§×ª´ïΣº¦£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔËûÃÇÓйØÚ²Æ­ÐÔ¼ÓÃÜÇ®±ÒÇ®°üÅþÁ¬ÇëÇ󣬣¬£¬£¬£¬£¬£¬»ò¼ÌÐøÊ¹ÓÃδÊÜÓ°ÏìµÄ 2.0.4 °æ±¾¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬LottieFiles Ðû²¼Í¨¸æ³Æ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½öÓ°ÏìÆä npm °ü£¬£¬£¬£¬£¬£¬£¬²»Ó°ÏìÆä SaaS ЧÀÍ£¬£¬£¬£¬£¬£¬£¬²¢È·ÈÏÆäËû¿ªÔ´¿â¡¢´úÂëºÍ´æ´¢¿â¾ùδÊÜÓ°Ïì¡£¡£¡£¡£¸Ãƽ̨ÒѰþ¶á¸Ä¶¯°æ±¾ÉÏ´«ÕßµÄ npm ÕÊ»§»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢×÷·ÏÏà¹ØÁîÅÆ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±¼ÌÐø¶Ô´Ë´ÎÈëÇÖÊÂÎñ¾ÙÐÐÄÚ²¿ÊӲ졣¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¸ÃÊÂÎñÊÇ·ñÓÐÊܺ¦ÕßÒÔ¼°ÏêϸËðʧ½ð¶î¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lottiefiles-hit-in-npm-supply-chain-attack-targeting-users-crypto/


4. PTZOpticsÉãÏñ»úÏÖÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼʹÓÃÌᳫ¹¥»÷


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃPTZOpticsÔÆÌ¨±ä½¹ÊµÊ±Á÷ýÌåÉãÏñ»úÖеÄÁ½¸öз¢Ã÷µÄÁãÈÕÎó²îCVE-2024-8956ºÍCVE-2024-8957¡£¡£¡£¡£ÕâЩÎó²îÓÚ2024Äê4Ô±»GreyNoiseµÄSift¹¤¾ßÔÚÆäÃÛ¹ÞÍøÂçÉϼì²âµ½¡£¡£¡£¡£CVE-2024-8956Éæ¼°ÉãÏñ»ú¡°lighthttpd¡±ÍøÂçЧÀÍÆ÷ÖеÄÈõÉí·ÝÑéÖ¤ÎÊÌ⣬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­ÊÚȨµÄÓû§»á¼ûCGI API£¬£¬£¬£¬£¬£¬£¬Ì»Â¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¶øCVE-2024-8957ÔòÊÇÓÉÓÚ¡°ntp_client¡±¶þ½øÖÆÎļþÖеÄÊäÈëÕûÀíȱ·¦£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£ÕâÁ½¸öÎó²î¿ÉÄܵ¼ÖÂÉãÏñÍ·±»ÍêÈ«½ÓÊÜ¡¢Ñ¬È¾¶ñÒâÈí¼þ¡¢¹¥»÷Í³Ò»ÍøÂçµÄÆäËû×°±¸»òÖÐÖ¹ÊÓÆµÁ÷¡£¡£¡£¡£Ö»¹Ü³õʼ¹¥»÷»î¶¯ÔÚ·¢Ã÷ºó²»¾ÃÏûÊÅ£¬£¬£¬£¬£¬£¬£¬µ«6Ô·ºÆðÁËʹÓÃwgetÏÂÔØshell¾ç±¾¾ÙÐз´Ïò»á¼ûµÄʵÑé¡£¡£¡£¡£GreyNoiseÒÑÏòÊÜÓ°Ï칩ӦÉ̾ÙÐÐÈÏÕæÈεÄÅû¶£¬£¬£¬£¬£¬£¬£¬PTZOpticsµÈ³§ÉÌÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬µ«²¿·Ö¾ÉÐͺźÍз¢Ã÷µÄÊÜÓ°ÏìÐͺÅÉÐδÊÕµ½²¹¶¡¡£¡£¡£¡£GreyNoiseÒÔΪ¿ÉÄÜÓиüÆÕ±éµÄ×°±¸Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬½¨ÒéÓû§×Éѯװ±¸¹©Ó¦ÉÌÏàʶ×îй̼þ¸üÐÂÇéÐΡ£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-target-critical-zero-day-vulnerability-in-ptz-cameras/


5. ÒÉËÆÎÚ¿ËÀ¼ÍøÂç¹¥»÷µ¼ÖÂÌØÎ¬¶ûÍ£³µÏµÍ³Ì±»¾


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹Î÷±±²¿¶¼»áÌØÎ¬¶ûµÄסÃñÒòÕþ¸®Ëù³ÆµÄÊý×ÖÍ£³µÖ§¸¶ÏµÍ³¡°ÊÖÒÕ¹ÊÕÏ¡±¶øµÃÒÔÃâ·ÑÍ£³µ½üÁ½Ìì¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°ÎÚ¿ËÀ¼ÍøÂçͬÃË¡±µÄºÚ¿Í×éÖ¯Éù³ÆÕâ¿ÉÄÜÊÇÕë¶Ô¸ÃÊÐÖÎÀíÍøÂçµÄÍøÂç¹¥»÷ËùÖ£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ´Ý»ÙÁËÊýʮ̨ÐéÄâ»ú¡¢±¸·Ý´æ´¢¡¢ÍøÕ¾¡¢µç×ÓÓʼþºÍÊý°Ù¸öÊÂÇéÕ¾¡£¡£¡£¡£ÌØÎ¬¶ûÊÐÕþ¸®×î³õδ¶Ô´Ë½ÒÏþ̸ÂÛ£¬£¬£¬£¬£¬£¬£¬µ«Ëæºó½ÒÏþÉùÃ÷³ÆÍøÕ¾ºÍÔÚÏßÍ£³µÖ§¸¶Æ½Ì¨ÕýÔÚ¾ÙÐÐÊÖÒÕάÐÞ¡£¡£¡£¡£ÍâµØ×¡ÃñÔÚʵÑ鸶¿îʱÓöµ½¹ýʧÐÂÎÅ»òÓ¦ÓóÌÐò¼ÓÔØÊ§°Ü¡£¡£¡£¡£ÊÐÕþ¸®¹ÙÔ±ØÊºóÐû²¼Í£³µ¸¶·ÑЧÀÍÒѻָ´£¬£¬£¬£¬£¬£¬£¬µ«Î´È·ÈÏÊÇ·ñ±¬·¢ÁËÍøÂç¹¥»÷¡£¡£¡£¡£Õâ²¢·ÇÇ×ÎÚ¿ËÀ¼ºÚ¿ÍÊ×´ÎÉù³Æ¶Ô¶íÂÞ˹ЧÀÍÌᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬´ËǰҲÓÐÀàËÆÊÂÎñ±»¹é×ïΪ¡°ÊÖÒÕ¹ÊÕÏ¡±¡£¡£¡£¡£ÎÚ¿ËÀ¼ÍøÂçͬÃËÊÇÒ»¸öÇ×ÎÚ¿ËÀ¼ÍøÂç»î¸ÐÈËÊ¿ÕûÌ壬£¬£¬£¬£¬£¬£¬×Ô¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ÒÔÀ´Æð¾¢¼ÓÈë·´¶í¶·Õù£¬£¬£¬£¬£¬£¬£¬²¢ÔøÉù³ÆÈëÇÖ¶íÂÞ˹¹ú¼ÒÐÅÓÿ¨Ö§¸¶ÏµÍ³µÈÐж¯¡£¡£¡£¡£


https://therecord.media/ukraine-cyberattack-russia-parking-tver


6. Phish n' ShipsÍøÂç´¹ÂڻѬȾǧ¼ÒÍøµê


10ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»ÏîÃûΪ¡°Phish n' Ships¡±µÄÍøÂç´¹Âڻ×Ô2019ÄêÆð£¬£¬£¬£¬£¬£¬£¬ÒÑѬȾÁè¼Ýһǧ¼ÒÕýµ±ÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÍÆ¹ãÐéαÉÌÆ·ÁбíڲƭÊýÊ®ÍòÏûºÄÕߣ¬£¬£¬£¬£¬£¬£¬Ôì³ÉÊýÍòÍòÃÀÔªËðʧ¡£¡£¡£¡£¸Ã»î¶¯Ê¹ÓÃÎó²î¡¢¹ýʧÉèÖûòÊÜËðÖÎÀíԱƾ֤ÈëÇÖÍøÕ¾£¬£¬£¬£¬£¬£¬£¬ÉÏ´«¶ñÒâ¾ç±¾ºÍÐéα²úÆ·Áбí£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃSEOÓÅ»¯ÎüÒýÊܺ¦Õß¡£¡£¡£¡£Êܺ¦Õßµã»÷Á´½Óºó±»Öض¨ÏòÖÁ¼ÙÊÐËÁ£¬£¬£¬£¬£¬£¬£¬ÂÄÀúÐéα½áÕËÁ÷³Ì²¢ÊäÈëСÎÒ˽¼ÒÐÅÏ¢ºÍÐÅÓÿ¨ÏêÇ飬£¬£¬£¬£¬£¬£¬µ«¹ºÖõÄÎïÆ·´ÓδËÍ´ï¡£¡£¡£¡£SatoriÍþвÇ鱨ÍŶӷ¢Ã÷ËùÓмÙÊÐËÁÅþÁ¬ÖÁÒ»¸öÓÉ14¸öIPµØµã×é³ÉµÄÍøÂ磬£¬£¬£¬£¬£¬£¬²¢ÀÄÓöà¼ÒÖ§¸¶ÌṩÉÌÌ×ÏÖ¡£¡£¡£¡£HUMAN¼°ÆäÏàÖúͬ°éÒÑЭµ÷»ØÓ¦£¬£¬£¬£¬£¬£¬£¬Í¨ÖªÊÜÓ°Ïì×éÖ¯²¢ÏòGoogle±¨¸æÐéαÁбí£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼¶ñÒâËÑË÷Ч¹ûÒѱ»ÕûÀí£¬£¬£¬£¬£¬£¬£¬µ«ÍþвÐÐΪÕß¿ÉÄÜ»áʵÑ齨ÉèеÄÚ²Æ­ÍøÂç¡£¡£¡£¡£½¨ÒéÏûºÄÕß×¢ÖØ²»Ñ°³£Öض¨Ïò£¬£¬£¬£¬£¬£¬£¬È·ÈÏÊÐËÁÍøÖ·£¬£¬£¬£¬£¬£¬£¬²¢±¨¸æÚ²Æ­ÐÔÊÕ·Ñ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-a-thousand-online-shops-hacked-to-show-fake-product-listings/