ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ4ÖÜ
°ä²¼¹¦·ò 2019-01-28±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÆ¾¾ÝGDPRÌõÀý£¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle·£¿î5000ÍòÅ·Ôª;Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶;ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢£¬Ô̺¬Óû§Ö§¸¶Êý¾Ý;Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒÑϰȾԼ100ÍòÓû§;PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬×°ÖÃÎļþ±»´«È¾¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
³ÁÒª°²È«·ì϶Áбí
Schneider Electric IIoT MonitorʹÓÃÁËÓ²±àÂëÃÜÔ¿£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û¡£
http://www.schneider-electric.com/sites/corporate/en/support/
2. Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç¶Âí½Å
Adobe AcrobatºÍReader´¦ÖÃÄÚ´æ¶ÔÏó´æÔÚÔ½½ç¶Á·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷»òÖ´ÐÐËÁÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb18-30.html
3. Advantech WebAccess/SCADA SQL×¢Èë·ì϶
Advantech WebAccess/SCADA´æÔÚSQL×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£
https://support.advantech.com/support/DownloadSRDetail_New.aspx?SR_ID=1-MS9MJV&Doc_Source=Download
4. Cisco Small Business RV320ºÍRV325 CVE-2019-1652ºÅÁî×¢Èë·ì϶
Cisco Small Business RV320ºÍRV325´¦ÖÃHTTP POSTÒªÇó·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject
5. PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë½Ó¼û·ì϶
PLC Wireless Router GPN2.4P21-C-CN cgi-bin/webproc?getpage=html/index.html subpage=wlsecurity URI´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬸ü¸ÄÎÞÏß°²È«ÃÜÂë¡£
https://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html
³ÁÒª°²È«ÊÂÎñ×ÛÊö
ƾ¾ÝÅ·ÃËÓÚ2018Äê5ÔÂÉúЧµÄGDPRÌõÀý£¬·¨¹úÊý¾Ý±£»¤¼à¹Ü»ú¹¹CNIL¶ÔGoogle·¢³öÁË5000ÍòÅ·Ôª£¨Ô¼ºÏ5700ÍòÃÀÔª£©µÄ·£µ¥¡£CNIL³ÆÕâ±Ê·£¿îµÄÔÒòÊÇGoogle¹«Ë¾¡°²»×ãͨÃ÷¶È¡¢ÐÅÏ¢²»ºÏ³ÆÒÔ¼°ÔÚ¸öÐÔ»¯¸æ°×·½ÃæÃ»ÓлñµÃÓû§µÄÓÐЧÔ޳ɡ±¡£ÕâÊÇCNILƾ¾ÝGDPR¿ª³öµÄÊ×ÕÅ·£µ¥¡£Google»ØÓ¦³Æ¡°ÎÒÃǼ«¶ÈÖÂÁ¦ÓÚÂú×ãÈËÃǶÔÊý¾ÝͨÃ÷¶ÈµÄ½øÕ¹ºÍGDPRµÄÒªÇó£¬ÎÒÃÇÔÚ×êÑоö¶¨ÎÒÃǽÓÏÂÀ´µÄ²½Ö衱¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/google-privacy-gdpr-fine.html
2¡¢Linux°üÖÎÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´Ðзì϶
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/linux-apt-http-hacking.html
3¡¢ÃÀ¹ú¶à¼Ò´ò¶ÄÍøÕ¾Ð¹Â¶1.08ÒÚ´ò¶ÄÐÅÏ¢£¬Ô̺¬Óû§Ö§¸¶Êý¾Ý
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/online-casino-group-leaks-information-on-108-million-bets-including-user-details/
4¡¢Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¸æ°×»î¶¯£¬ÒÑϰȾԼ100ÍòÓû§
ÔÎÄÁ´½Ó£º
https://threatpost.com/malware-in-ad-based-images-targets-mac-users/141115/
5¡¢PHP°üÖÎÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬×°ÖÃÎļþ±»´«È¾
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/php-pear-hacked.html
ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ