sqlite-web 0.7.2
jinse.db
lives
Create
Query
lives
sqlite_sequence
Toggle helper tables
Structure
Content
Query
Insert
Drop
Import
Export
Update row 451339 in lives
id
Primary key.
INTEGER
live_id
7443
TEXT NOT NULL
title
黑客利用甲骨文漏洞盗取611个门罗币
TEXT
content
【黑客利用甲骨文漏洞盗取611个门罗币】SANS Technology Institute近日发布了一份报告称,攻击者利用甲骨文去年年底修补的Web应用程序服务器漏洞,针对PeopleSoft和WebLogic服务器开展了多轮攻击。然而攻击者并没有利用这个漏洞来窃取数据,而是将PeopleSoft和WebLogic服务器变成了挖矿工具。研究人员表示,有一名攻击者利用这个漏洞获得了至少611个门罗币(XMR),总价值约为22.6万美元。
TEXT
content_prefix
黑客利用甲骨文漏洞盗取611个门罗币
TEXT
published_date
2018-01-10
TEXT
link_name
TEXT
link
TEXT
grade
INTEGER
created_at
2018-01-10 11:55:14
TEXT
created_at_unix
INTEGER
created_at_zh
2018-01-10
TEXT
updated_at
TEXT
source
TEXT
category
INTEGER
reading
INTEGER (default 0
flag
TEXT
attribute
TEXT
up_counts
INTEGER
down_counts
INTEGER
comment_count
INTEGER
highlight_color
TEXT
images
[]
TEXT
extra_type
INTEGER
extra
null
TEXT
is_show_comment
INTEGER
is_forbid_comment
INTEGER
show_source_name
TEXT
vote_id
INTEGER
vote
null
TEXT
zan_status
TEXT
readings
[]
TEXT
word_blocks
[]
TEXT
raw_data
{"id": 7443, "content": "【黑客利用甲骨文漏洞盗取611个门罗币】SANS Technology Institute近日发布了一份报告称,攻击者利用甲骨文去年年底修补的Web应用程序服务器漏洞,针对PeopleSoft和WebLogic服务器开展了多轮攻击。然而攻击者并没有利用这个漏洞来窃取数据,而是将PeopleSoft和WebLogic服务器变成了挖矿工具。研究人员表示,有一名攻击者利用这个漏洞获得了至少611个门罗币(XMR),总价值约为22.6万美元。", "content_prefix": "黑客利用甲骨文漏洞盗取611个门罗币", "link_name": "", "link": "", "grade": 4, "sort": "", "category": 0, "highlight_color": "", "images": [], "created_at": 1515556514, "created_at_zh": "2018-01-10", "attribute": "", "up_counts": 0, "down_counts": 0, "zan_status": "", "readings": [], "extra_type": 0, "extra": null, "prev": null, "next": null, "word_blocks": [], "is_show_comment": 0, "is_forbid_comment": 1, "comment_count": 0, "analyst_user": null, "show_source_name": "", "vote_id": 0, "vote": null, "date": "2018-01-10"}
TEXT
saved_at
TIMESTAMP (default CURRENT_TIMESTAMP
Update
Cancel