-
-
笑喷:赶集网出漏洞 当当员工中枪
-
发表于: 2015-3-24 07:04 1010
-
新闻链接:aefK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2Q4x3X3g2E0P5h3c8J5K9i4k6W2M7Y4y4Q4x3X3g2U0L8$3#2Q4x3V1k6F1k6i4N6K6N6X3W2W2N6#2)9J5c8U0b7H3y4o6x3^5y4q4)9J5k6h3S2@1L8h3H3`.
新闻时间:2015年3月23日
新闻正文:
77cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4N6G2L8%4W2#2L8W2)9J5k6h3!0J5k6#2)9J5c8X3u0#2k6%4y4Q4x3V1k6%4L8$3!0&6N6h3&6Q4x3X3b7J5x3o6p5#2i4K6u0V1x3o6V1#2y4o6t1%4i4@1f1^5i4@1t1#2i4@1t1$3i4@1f1&6i4K6W2n7i4K6R3$3i4@1f1%4i4@1u0p5i4K6V1I4i4@1f1#2i4K6R3%4i4@1u0m8i4@1f1@1i4@1u0m8i4K6R3$3i4@1f1&6i4K6V1%4i4@1q4q4i4@1f1&6i4@1p5J5i4K6V1^5i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4@1u0p5i4K6V1K6i4@1f1#2i4@1u0p5i4K6V1K6i4@1f1#2i4K6V1I4i4K6V1^5i4@1f1#2i4@1t1%4i4@1p5#2i4@1f1#2i4K6V1J5i4K6S2n7i4@1f1@1i4@1u0o6i4K6W2m8i4@1f1@1i4@1t1^5i4@1q4p5i4@1f1$3i4K6W2q4i4@1q4m8i4@1f1#2i4K6V1I4i4@1p5J5i4@1g2r3i4@1u0o6i4K6W2r3i4@1f1@1i4@1t1^5i4K6V1@1i4@1f1#2i4K6V1H3i4@1q4o6i4@1f1@1i4@1t1&6i4K6S2o6i4@1f1@1i4@1u0m8i4K6V1I4i4@1f1$3i4@1u0o6i4K6S2r3i4@1f1$3i4@1t1@1i4K6W2q4i4@1f1$3i4K6S2m8i4@1p5#2i4@1f1#2i4K6V1I4i4K6S2m8i4@1f1#2i4@1t1&6i4@1t1K6i4@1f1#2i4K6S2r3i4@1t1H3i4@1f1%4i4@1u0n7i4K6R3$3i4@1f1%4i4@1u0n7i4K6R3$3i4@1f1#2i4K6R3^5i4K6R3$3i4@1f1^5i4@1p5%4i4@1p5K6i4@1f1K6i4K6R3H3i4K6R3J5
乌云漏洞报告平台曝光的信息显示,赶集网某业务存在URL跳转漏洞,而且已经被利用做钓鱼邮件。
虽然该漏洞的危害等级标注为“低”,但似乎还是有不少人都中枪了,数据显示中招的人大部分似乎都是当当的员工。
目前该漏洞已经通知了赶集网,赶集网则对此回应称正在联系当当网解决此事。
手机发帖,排版可能不好看。
新闻时间:2015年3月23日
新闻正文:
77cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4N6G2L8%4W2#2L8W2)9J5k6h3!0J5k6#2)9J5c8X3u0#2k6%4y4Q4x3V1k6%4L8$3!0&6N6h3&6Q4x3X3b7J5x3o6p5#2i4K6u0V1x3o6V1#2y4o6t1%4i4@1f1^5i4@1t1#2i4@1t1$3i4@1f1&6i4K6W2n7i4K6R3$3i4@1f1%4i4@1u0p5i4K6V1I4i4@1f1#2i4K6R3%4i4@1u0m8i4@1f1@1i4@1u0m8i4K6R3$3i4@1f1&6i4K6V1%4i4@1q4q4i4@1f1&6i4@1p5J5i4K6V1^5i4@1g2r3i4@1u0o6i4K6S2o6i4@1f1#2i4@1u0p5i4K6V1K6i4@1f1#2i4@1u0p5i4K6V1K6i4@1f1#2i4K6V1I4i4K6V1^5i4@1f1#2i4@1t1%4i4@1p5#2i4@1f1#2i4K6V1J5i4K6S2n7i4@1f1@1i4@1u0o6i4K6W2m8i4@1f1@1i4@1t1^5i4@1q4p5i4@1f1$3i4K6W2q4i4@1q4m8i4@1f1#2i4K6V1I4i4@1p5J5i4@1g2r3i4@1u0o6i4K6W2r3i4@1f1@1i4@1t1^5i4K6V1@1i4@1f1#2i4K6V1H3i4@1q4o6i4@1f1@1i4@1t1&6i4K6S2o6i4@1f1@1i4@1u0m8i4K6V1I4i4@1f1$3i4@1u0o6i4K6S2r3i4@1f1$3i4@1t1@1i4K6W2q4i4@1f1$3i4K6S2m8i4@1p5#2i4@1f1#2i4K6V1I4i4K6S2m8i4@1f1#2i4@1t1&6i4@1t1K6i4@1f1#2i4K6S2r3i4@1t1H3i4@1f1%4i4@1u0n7i4K6R3$3i4@1f1%4i4@1u0n7i4K6R3$3i4@1f1#2i4K6R3^5i4K6R3$3i4@1f1^5i4@1p5%4i4@1p5K6i4@1f1K6i4K6R3H3i4K6R3J5
乌云漏洞报告平台曝光的信息显示,赶集网某业务存在URL跳转漏洞,而且已经被利用做钓鱼邮件。
虽然该漏洞的危害等级标注为“低”,但似乎还是有不少人都中枪了,数据显示中招的人大部分似乎都是当当的员工。
目前该漏洞已经通知了赶集网,赶集网则对此回应称正在联系当当网解决此事。
手机发帖,排版可能不好看。
赞赏
赞赏
雪币:
留言: