¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180913

°ä²¼¹¦·ò 2018-09-13
1¡¢VeeamÒòMongoDBÅäÖÃÃýÎóµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


9ÔÂ5ÈÕ°²È«×êÑÐÈËÔ±Bob Diachenko·¢ÏÖÊý¾ÝÖÎÀí¹«Ë¾VeeamµÄMongoDB·þÎñÆ÷¿É¹«¿ª½Ó¼û£¬Ò»¸ö³¬¹ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£¸ÃÊý¾Ý¿âÔ̺¬Ô¼4.45ÒÚÌõÓû§¼Í¼£¬Ô̺¬Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¾Óס¹ú¶È/µØÓòµÈÓ×ÎÒÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØÖ·¡¢ÓйØURL¡¢Óû§´úÀíµÅתÏúÓйØÐÅÏ¢¡£VeeamÒѶԸÃÊý¾Ý¿â²ÉÈ¡Á˱£»¤´ëÊ©¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/

2¡¢×êÑÐÈËÔ±Åû¶SafariÖеÄÒ»¸öÉÐ佨¸´µÄµØÖ·À¸URLºýŪ·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°Í»ù˹̹°²È«×êÑÐÈËÔ±Rafay Baloch·¢ÏÖÒ»¸öä¯ÀÀÆ÷µØÖ·À¸URLºýŪ·ì϶£¨CVE-2018-8383£©£¬¸Ã·ì϶ӰÏìÁËEdgeä¯ÀÀÆ÷ºÍSafariä¯ÀÀÆ÷¡£¹ÌȻ΢ÈíÔÚ8Եݲȫ¸üÐÂÖн¨¸´Á˸÷ì϶£¬µ«SafariÈÔδ°ä²¼½¨¸´²¹¶¡¡£¸Ã·ì϶ÊÇÓÉä¯ÀÀÆ÷µÄ¾ºÕùǰÌᵼֵģ¬¿ÉÔÊÐíJavaScriptÔÚÒ³Ãæ¼ÓÔØÊ±¸üеØÖ·À¸ÖеÄURLµØÖ·¡£×êÑÐÈËÔ±»¹°ä²¼ÁËEdgeºÍSafariµÄPOCÊÓÆµ¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/browser-address-spoofing-vulnerability.html

3¡¢Adobe°ä²¼9Ô°²È«¸üУ¬½¨¸´Flash PlayerºÍColdFusionÖеÄ10¸ö·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Adobe°ä²¼2018Äê9Եݲȫ¸üУ¬½¨¸´Flash PlayerºÍColdFusionÖеÄ10¸ö·ì϶¡£ÆäÖÐÔ̺¬Flash PlayerÖеÄÌáȨ·ì϶£¨CVE-2018-15967£©¡¢ColdFusionÖеķ´ÐòÁл¯·ì϶£¨CVE-2018-15965¡¢CVE-2018-15957¡¢CVE-2018-15958ºÍCVE-2018-15959£©¡¢ÎļþÉÏ´«·ì϶£¨CVE-2018-15961£©¡¢ËÁÒâÎļþ¸²¸Ç·ì϶£¨CVE-2018-15960£©¡¢°²È«Èƹý·ì϶£¨CVE-2018-15963£©ÒÔ¼°ÐÅϢй¶·ì϶£¨CVE-2018-15962ºÍCVE-2018-15964£©¡£


 Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/adobe-software-updates.html


4¡¢SAP°ä²¼9Ô°²È«¸üУ¬½¨¸´¶à¿î²úÆ·ÖеÄ14¸ö·ì϶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

SAP°ä²¼2018Äê9Եݲȫ¸üУ¬½¨¸´Æä²úÆ·ÖеÄ14¸ö·ì϶¡£½ÏÑϳÁµÄ·ì϶Ô̺¬SAP ECCÖеÄÊÚȨ²é³­È±Ê§·ì϶¡¢Business OneºÍHANA×°Ö÷¨Ê½ÖеÄÐÅϢй¶·ì϶ÒÔ¼°BEx Web JavaÔËÐÐʱÖеÄXXE·ì϶µÈ¡£Áí±íSAP HANAÖеĿɵ¼Ö»ؾø·þÎñµÄ·ì϶£¨CVE-2018-2465£©Ò²±»ÒÔΪ·çÏսϸß¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sap-patches-critical-vulnerability-business-client

5¡¢Check Point×êÑÐÍŶӷ¢ÏÖÒøÐÐľÂíRamnitµÄ¹¥»÷»î¶¯ì­Éý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Check Point×êÑÐÍŶӷ¢ÏÖ8Ô·ÝÒøÐÐľÂíRamnitµÄ¹¥»÷»î¶¯´ó·ùÔö³¤¡£Æ¾¾ÝÆä×îÐÂÈ«ÇòÍþвָÊý£¬RamnitÔÚ8Ô·ÝÉÏÉýÖÁµÚÁù룬³ÉΪÉÏÉýÇ÷Ïò×î´óµÄÒøÐÐľÂí£¬Ëü´Ó2018Äê6ÔÂÒÔÀ´ÒѾ­ÉÏÉýÁËÒ»±¶ÒÔÉÏ¡£Õâ±ê־ȡ¹¥»÷ÕßÔ½À´Ô½¶àµØÀûÓÃÒøÐÐľÂíÀ´¼±¾ç»ñÈ¡½ðÇ®ÊÕÒæ¡£Í¬Ê±£¬CoinhiveÒÀÈ»ÊÇ×îÊ¢ÐеĶñÒâÈí¼þ£¬Ó°ÏìÁËÈ«Çò17%µÄ×éÖ¯¡£DorkbotºÍAndromeda·ÖÁжþÈý룬±ðÀëÓ°ÏìÁË6%µÄ×éÖ¯¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/09/11/augusts-most-wanted-malware-banking-trojan-attacks-turn-up-the-heat/


6¡¢×êÑÐÈËÔ±·¢ÏÖ2ÃëÄÚ¸´ÔìÌØË¹À­µç¶¯Æû³µÔ¿³×µÄ¹¥»÷²½Öè


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±ÈÀûʱ³ãë´óѧµÄ×êÑÐÍŶӷ¢ÏÖÌØË¹À­£¨Tesla£©Model SÖеÄPKES£¨ÎÞÔ¿³×½øÈëϵͳ£©ÓëÎÞÏßÔ¿³×µÄÈÏÖ¤¹ý³Ì´æÔÚ°²È«·ì϶£¬¹¥»÷Õß¿ÉÀûÓø÷ì϶ÔÚ¼¸ÃëÄÚ¸´ÔìÆû³µÔ¿³×½«Æû³µÍµ×ß¡£Õû¸öÆÆ½â¹ý³ÌÖ»Ðè³ï±¸Ô¼Äª600ÃÀÔª£¨Ô¼ºÏÈËÃñ±Ò4120Ôª£©µÄÎÞÏßµçºÍÍÆËãÉ豸¡£Tesla»ØÓ¦³Æ¸Ã·ì϶Òѱ»½¨¸´¡£


 Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/tesla-model-s-remote-hack.html



ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù