ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01й¶Óû§Êý¾Ý
Ðû²¼Ê±¼ä 2025-10-171. ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01й¶Óû§Êý¾Ý
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬È¥ÖÐÐÄ»¯ÊÓÆµ¾Û»áÓ¦ÓÃHuddle01Ðû³ÆÌṩ¸ßÇå¾²ÐÔWebRTCЧÀÍ£¬£¬£¬£¬£¬È´ÒòδÊܱ£»£»£»£»£»£»¤µÄKafka BrokerʵÀýµ¼Ö´ó¹æÄ£Óû§Êý¾Ýй¶¡£¡£¡£¡£¡£¡£Ñо¿ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬¸Ãƽ̨ÓÃÓÚ´«ÊäʵʱÈÕÖ¾µÄKafka BrokerδÆôÓÃÉí·ÝÑéÖ¤¡¢¼ÓÃÜ»ò»á¼û¿ØÖÆ£¬£¬£¬£¬£¬Ì»Â¶ÁË2025Äê8ÔÂ13ÈÕÖÁ26ÈÕʱ´ú³¬621,000ÌõʵʱÈÕÖ¾ÌõÄ¿£¬£¬£¬£¬£¬º¸ÇÓû§µç×ÓÓʼþ¡¢IPµØµã¡¢¼ÓÃÜÇ®°üµØµã£¨Ö§³Ö±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈÇø¿éÁ´£©¡¢Í¨»°¼ÓÈë¼Í¼¡¢¹ú¼Ò¡¢Ê±¼ä¡¢Ê±³¤µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÒÔÃ÷ÎÄÐÎʽʵʱ´«Ê䣬£¬£¬£¬£¬ÈκεÚÈý·½¾ù¿ÉÎÞÕϰ»á¼û¡£¡£¡£¡£¡£¡£Ö»¹ÜHuddle01ÔÚÓ¦ÓÃÊÐËÁÉùÃ÷¡°²»ÍøÂç»ò¹²ÏíÓû§Êý¾Ý¡±£¬£¬£¬£¬£¬ÇÒÒþ˽Õþ²ßÇ¿µ÷¡°È¥ÖÐÐÄ»¯Í¨Ñ¶ÖеÄÊý¾Ý͸Ã÷ÓëÓû§¿ØÖÆ¡±£¬£¬£¬£¬£¬µ«ÏÖʵ̻¶µÄÊý¾ÝÏÔʾÆä±£´æÑÏÖØÇå¾²Îó²î¡£¡£¡£¡£¡£¡£Æ½Ì¨ÓÉÃÀ¹úÌØÀ»ªÖÝGraphene01 Labs¿ª·¢£¬£¬£¬£¬£¬ÔÚGoogle PlayÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬£¬£¬iOS¶Ëƽ¾ùÆÀ·Ö4.7ÐÇ£¬£¬£¬£¬£¬ÉîÊܼÓÃÜÇ®±Òϲ»¶ÕßÇàíù¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Çø¿éÁ´¼¯³É·´¶ø¼Ó¾çÁËΣº¦£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃй¶µÄÇ®°üµØµã¹ØÁªÕæÊµÉí·Ý£¬£¬£¬£¬£¬»æÖÆÓû§¹ØÏµÍ¼£¬£¬£¬£¬£¬½ø¶øÊµÑ龫׼´¹ÂÚ¹¥»÷»òÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/video-call-app-huddle01-leaks-sensitive-user-data/
2. CISA½ôÆÈ¸üÐÂKEVĿ¼£ºAdobeÓëSKYSEAÎó²îÔâ×Ô¶¯Ê¹ÓÃ
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÓÚ¿ËÈÕ½«Á½¸öÑÏÖØÇå¾²Îó²îÄÉÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬Í¹ÏÔÄ¿½ñÍøÂçÇå¾²ÍþвµÄ½ôÆÈÐÔ¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Ó°ÏìAdobe Experience Manager£¨AEM£©µÄCVE-2025-54253Îó²î±»ÆÀ¶¨Îª×î¸ßÑÏÖØÐÔÆ·¼¶£¨CVSS 10.0£©£¬£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚAEM Forms JEE 6.5.23.0¼°¸üÔç°æ±¾Öб£´æÎ´ÂÄÀúÖ¤µÄ/adminui/debug servlet¶Ëµã£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓô˶˵ãÌá½»¶ñÒâOGNL±í´ïʽ£¬£¬£¬£¬£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÖ´ÐÐí§ÒâϵͳÏÂÁî¡£¡£¡£¡£¡£¡£AdobeÒÑÓÚ2025Äê8ÔÂÐû²¼µÄ6.5.0-0108°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬Í¬Ê±ÐÞ¸´µÄÉÐÓÐCVSS 8.6·ÖµÄCVE-2025-54254¡£¡£¡£¡£¡£¡£Ö»¹ÜAdobeÈϿɱ£´æ¹ûÕæ¿´·¨ÑéÖ¤£¬£¬£¬£¬£¬µ«ÏÖʵ¹¥»÷ϸ½ÚÉÐδÅû¶¡£¡£¡£¡£¡£¡£CISAÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹±ØÐèÔÚ2025Äê11ÔÂ5ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£ÁíÒ»ÔòÖ÷Òª¸üÐÂÉæ¼°SKYSEA Client ViewµÄCVE-2016-7836Îó²î£¨CVSS 9.8·Ö£©£¬£¬£¬£¬£¬¸ÃÎó²îÔ´ÓÚÉí·ÝÑéÖ¤»úÖÆÈ±ÏÝ£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÖÎÀí¿ØÖÆÌ¨µÄTCPÅþÁ¬Ô¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£ÈÕ±¾Îó²î˵Ã÷£¨JVN£©ÔÚ2016Äêµ×µÄÇ徲ͨ¸æÖÐÃ÷È·Ö¸³ö£¬£¬£¬£¬£¬Ò°ÍâÒѼì²âµ½Õë¶Ô´ËÎó²îµÄ¹¥»÷ÐÐΪ¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html
3. ËÕ¸»±ÈÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬¿Í»§Ãô¸ÐÐÅÏ¢ÔâÇÔÈ¡
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬È«Çò×ÅÃûÒÕÊõÆ·ÅÄÂôÐÐËÕ¸»±È¿ËÈÕת´ïÒ»ÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Ãô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂ루SSN£©¼°½ðÈÚÕË»§ÏêÇé¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñÓÚ2025Äê7ÔÂ24ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬¾ÓÉÁ½¸öÔµÄÏêϸÊӲ죬£¬£¬£¬£¬¹«Ë¾·½È·Èϱ»µÁÊý¾ÝÀàÐͼ°ÊÜÓ°ÏìСÎÒ˽¼Ò¹æÄ£¡£¡£¡£¡£¡£¡£×÷ΪȫÇòÁìÏȵĸ߼ÛÖµÎïÆ·ÅÄÂôÐÐÓë×ʲúÖ§³Ö´û¿îЧÀÍÉÌ£¬£¬£¬£¬£¬ËÕ¸»±ÈÿÄê´¦Öóͷ£ÊýÊ®ÒÚÃÀÔªÅÄÂôÉúÒ⣬£¬£¬£¬£¬2024Äê×ÜÏúÊÛ¶î´ï60ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬Æ¾Ö¤ÏòÃÀ¹úÃåÒòÖÝÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþ£¬£¬£¬£¬£¬ÒÑÈ·ÈϰüÀ¨ÃåÒòÖݺÍÂ޵µºÖÝÔÚÄڵIJ¿·Ö¿Í»§ÐÅÏ¢Ôâ²»·¨»ñÈ¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬µ«ÏêϸÊÜÓ°Ïì×ÜÈËÊýÉÐδÍêÈ«Åû¶¡£¡£¡£¡£¡£¡£ËÕ¸»±ÈÔÚ֪ͨÖÐÇ¿µ÷£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ºóÁ¬Ã¦Æô¶¯ÖÜÈ«ÊӲ죬£¬£¬£¬£¬Í¨¹ýÊý¾ÝÉó²éÈ·¶¨ÐÅϢй¶¹æÄ£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£ÎªÓ¦¶Ô´Ë´ÎΣ»£»£»£»£»£»ú£¬£¬£¬£¬£¬ËÕ¸»±ÈΪÊÜÓ°Ïì¿Í»§Ìṩµ÷½â²½·¥£ºÍ¨¹ýTransUnionÌṩΪÆÚ12¸öÔµÄÃâ·ÑÉí·Ý±£»£»£»£»£»£»¤ÓëÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬¿Í»§ÐèÔÚ90ÌìÄÚÍê³É×¢²á¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/auction-giant-sothebys-says-data-breach-exposed-customer-information/
4. ProsperÔâ´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬1760ÍòÓû§ÐÅÏ¢±»ÇÔ
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úµã¶Ôµã½è´ûƽ̨ProsperÅû¶Æäϵͳ9ÔÂ2ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬µ¼ÖÂÁè¼Ý1760ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°¿Í»§¼°´û¿îÉêÇëÈ˵ÄÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡¢ÐÕÃû¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅ¡¢¾Íҵ״̬¡¢ÐÅÓÃÆÀ·Ö¡¢ÊÕÈëˮƽ¡¢³öÉúÈÕÆÚ¡¢ÏÖʵµØµã¡¢IPµØµã¼°ä¯ÀÀÆ÷Óû§ÊðÀíÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£Ö»¹ÜProsperÌåÏÖÉÐδ·¢Ã÷¹¥»÷Õß»ñÈ¡¿Í»§ÕË»§»ò×ʽð»á¼ûȨÏÞµÄÖ¤¾Ý£¬£¬£¬£¬£¬µ«È·ÈÏÉñÃØÊý¾ÝÒÑͨ¹ýδ¾ÊÚȨÅÌÎʹ«Ë¾Êý¾Ý¿âµÄ·½·¨±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£×÷Ϊ½¨ÉèÓÚ2005ÄêµÄÀÏÅÆ½ðÈÚÆ½Ì¨£¬£¬£¬£¬£¬ProsperÒÑ×ÊÖú³¬200Íò¿Í»§Íê³É³¬300ÒÚÃÀÔª´û¿îÉúÒâ¡£¡£¡£¡£¡£¡£±¾´ÎÇå¾²Îó²îδӰÏìÆäÃæÏò¿Í»§µÄÒ»Ñùƽ³£ÔËÓª£¬£¬£¬£¬£¬¹«Ë¾ÒÑÏòî¿Ïµ²¿·ÖºÍÖ´·¨»ú¹Ø±¨°¸£¬£¬£¬£¬£¬²¢Æô¶¯ÁªºÏÊӲ졣¡£¡£¡£¡£¡£ProsperÇ¿µ÷£¬£¬£¬£¬£¬ÊÓ²ìÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬£¬£¬£¬£¬ÔÚÈ·¶¨ÏêϸÊÜÓ°ÏìÊý¾Ý¹æÄ£ºó£¬£¬£¬£¬£¬½«ÏòÊÜÓ°ÏìÓû§ÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬Êý¾Ýй¶֪ͨЧÀÍHave I Been Pwned£¨HIBP£©Åû¶ÊÂÎñÓ°Ïì¹æÄ£´ï1760Íò¸öΨһµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬µ«Prosper½²»°ÈËÌåÏÖ¡°ÎÞ·¨ÑéÖ¤¡±¸ÃÊý¾ÝµÄ׼ȷÐÔ£¬£¬£¬£¬£¬²¢ÖØÉ깫˾ÈÔÔÚºËʵÏêϸÊÜÓ°ÏìÊý¾Ý¼°ËùÓÐÕßÉí·Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-prosper-data-breach-impacting-176-million-accounts/
5. Ó¡¶ÈNetcoreCloudЧÀÍÆ÷ÉèÖùýʧÖÂ400ÒÚÌõÃô¸ÐÊý¾Ýй¶
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬Ó¡¶ÈÈ«Çòµç×ÓÓʼþÓªÏúÓë×Ô¶¯»¯ÆóÒµNetcoreCloudÒòЧÀÍÆ÷ÉèÖùýʧ£¬£¬£¬£¬£¬µ¼Ö°üÀ¨400ÒÚÌõ¼Í¼¡¢×ܼÆ13.4TBµÄÃô¸ÐÊý¾Ýй¶£¬£¬£¬£¬£¬Éæ¼°È«Çò¿Í»§µç×ÓÓʼþ¡¢ÄÚ²¿ÏêϸÐÅÏ¢¼°ÊÖÒÕÉèÖõȽ¹µãÊý¾Ý¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÔÚ¹ûÕæÊý¾Ý¿âÖз¢Ã÷¸ÃÎó²î£¬£¬£¬£¬£¬Êý¾Ý¿âδ¼ÓÃÜÇÒδÊܱ£»£»£»£»£»£»¤£¬£¬£¬£¬£¬ÈκλñÈ¡IPµØµãÕß¾ù¿É»á¼ûº£Á¿ÓʼþͨѶ¼Í¼£¬£¬£¬£¬£¬°üÀ¨Ò½ÁƱ£½¡Í¨Öª¡¢ÒøÐл¾¯±¨¡¢¾ÍÒµÏà¹ØÓʼþ¼°²¿·ÖÕË»§ÊÖÒÕÐÅÏ¢£¨ÈçIPµØµã¡¢SMTPÉèÖã©£¬£¬£¬£¬£¬²¿·Ö¼Í¼ÉõÖÁ±ê¼ÇΪÉñÃØ¡£¡£¡£¡£¡£¡£NetcoreCloud×ܲ¿Î»ÓÚÓ¡¶ÈÃÏÂò£¬£¬£¬£¬£¬Îª40¸ö¹ú¼Ò/µØÇøµÄ6500Óà¸öÆ·ÅÆÌṩµç×ÓÓʼþ¼°×Ô¶¯»¯Ð§ÀÍ£¬£¬£¬£¬£¬ÁýÕÖµçÉÌ¡¢½ðÈÚ¡¢Ã½Ìå¡¢ÂÃÓεÈÐÐÒµ¡£¡£¡£¡£¡£¡£Fowler·¢Ã÷ºóÁ¬Ã¦Í¨Öª¸Ã¹«Ë¾£¬£¬£¬£¬£¬Êý¾Ý¿âÓÚµ±ÈÕ±»½ôÆÈ±£»£»£»£»£»£»¤²¢ÏÞÖÆ»á¼û¡£¡£¡£¡£¡£¡£Netcore»ØÓ¦³Æ½«¿ªÕ¹ÄÚ²¿Éó²é£¬£¬£¬£¬£¬µ«ÏÖÔÚÈÔ±£´æÈý´óÒɵ㣺й¶Êý¾Ý¿âÓÉNetcoreÖ±½ÓÖÎÀí»òµÚÈý·½ÍйÜδÃ÷£»£»£»£»£»£»Êý¾Ý̻¶ʱ³¤¼°ÊÇ·ñ±»¶ñÒâ»á¼ûδȷÈÏ£»£»£»£»£»£»ÊÇ·ñÓÐÆäËûÖ÷ÌåÏÂÔØ»ò¸´ÖÆÊý¾ÝÐèͨ¹ý·¨ÎñÉó¼ÆºËʵ¡£¡£¡£¡£¡£¡£
https://hackread.com/misconfigured-netcorecloud-server-40-billion-records/
6. ³¯ÏʺڿÍʹÓÃEtherHidingÔÚÇø¿éÁ´ÉÏÒþ²Ø¶ñÒâÈí¼þ
10ÔÂ16ÈÕ£¬£¬£¬£¬£¬³¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯UNC5342×Ô2025Äê2ÔÂÆð£¬£¬£¬£¬£¬ÔÚÕë¶ÔÈí¼þ¼°ÍøÂ翪·¢Ö°Ô±µÄÉç»á¹¤³Ì¹¥»÷ÖУ¬£¬£¬£¬£¬Ê״νÓÄÉÃûΪ"EtherHiding"µÄÇø¿éÁ´ÖÇÄܺÏÔ¼¶ñÒâÈí¼þÈö²¥ÊÖÒÕ¡£¡£¡£¡£¡£¡£¸ÃÊÖÒÕÓÉGuardio LabsÓÚ2023ÄêÌá³ö£¬£¬£¬£¬£¬Í¨¹ý½«¶ñÒâÔØºÉǶÈë±Ò°²ÖÇÄÜÁ´»òÒÔÌ«·»µÄÖÇÄܺÏÔ¼ÖУ¬£¬£¬£¬£¬ÊµÏֵͱ¾Ç®¡¢¸ßÄäÃûÐԵĶñÒâÈí¼þÍйÜÓ붯̬¸üС£¡£¡£¡£¡£¡£¹¥»÷Á÷³ÌÒÔÐéαÇóÖ°ÃæÊÔΪÓÕ¶ü£¬£¬£¬£¬£¬ÓÉαÔìʵÌ壨ÈçBlockNovas LLC¡¢Angeloper Agency£©Ìᳫ¡£¡£¡£¡£¡£¡£Êܺ¦ÕßÔÚÊÖÒÕÆÀ¹À»·½Ú±»ÓÕÆÖ´ÐÐJavaScriptÏÂÔØ³ÌÐò£¬£¬£¬£¬£¬¸Ã³ÌÐòͨ¹ýÖÇÄܺÏÔ¼ÓëÒÔÌ«·»½»»¥£¬£¬£¬£¬£¬»ñÈ¡°üÀ¨InvisibleFerretÌØ¹¤Èí¼þJS°æ±¾µÄµÚÈý½×¶ÎÓÐÓøºÔØ¡£¡£¡£¡£¡£¡£Çø¿éÁ´ÌØÕ÷ʹ¹¥»÷¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬£¬£¬£¬£¬Í¨¹ýÖ»¶ÁŲÓûñÈ¡ÔØºÉ²»ÁôÉúÒâ¼Í¼£¬£¬£¬£¬£¬Òþ²ØÐÔ¼«Ç¿£»£»£»£»£»£»Æä¶þ£¬£¬£¬£¬£¬ºÏÔ¼ÔÚǰËĸöÔ¸üг¬20´Î£¬£¬£¬£¬£¬Ã¿´Î½öÐè1.37ÃÀÔªgas·Ñ£¬£¬£¬£¬£¬Ö§³Ö¿ìËÙÎÞаµ÷½â£»£»£»£»£»£»ÆäÈý£¬£¬£¬£¬£¬¶àÁ´Ê¹ÓÃÅú×¢³¯ÏʺڿÍÍŶӱ£´æ²Ù×÷¸ôÀë¡£¡£¡£¡£¡£¡£¶ñÒâÈí¼þÔÚÄÚ´æÖÐÔËÐУ¬£¬£¬£¬£¬¿É¶¯Ì¬¼ÓÔØÆ¾Ö¤ÇÔȡģ¿£¿£¿£¿é£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸Chrome¡¢EdgeµÈä¯ÀÀÆ÷µÄÃÜÂë¡¢ÐÅÓÿ¨¼°¼ÓÃÜÇ®°üÊý¾Ý¡£¡£¡£¡£¡£¡£ÆäÏÂÁî¿ØÖÆ£¨C2£©Í¨µÀÖ§³ÖÖ´ÐÐí§ÒâÏÂÁî¡¢ZIPѹËõÎļþÍâйÖÁTelegramµÈ²Ù×÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-etherhiding-to-hide-malware-on-the-blockchain/


¾©¹«Íø°²±¸11010802024551ºÅ