¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180913
Ðû²¼Ê±¼ä 2018-09-13
9ÔÂ5ÈÕÇå¾²Ñо¿Ö°Ô±Bob Diachenko·¢Ã÷Êý¾ÝÖÎÀí¹«Ë¾VeeamµÄMongoDB·þÎñÆ÷¿É¹ûÕæ»á¼û£¬Ò»¸öÁè¼Ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£¸ÃÊý¾Ý¿â°üÀ¨Ô¼4.45ÒÚÌõÓû§¼Í¼£¬°üÀ¨Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÆÜÉí¹ú¼Ò/µØÇøµÈСÎÒ˽¼ÒÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØµã¡¢Ïà¹ØURL¡¢Óû§ÊðÀíµÈÓªÏúÏà¹ØÐÅÏ¢¡£VeeamÒѶԸÃÊý¾Ý¿â½ÓÄÉÁ˱£»¤²½·¥¡£
2¡¢Ñо¿Ö°Ô±Åû¶SafariÖеÄÒ»¸öÉÐδÐÞ¸´µÄµØµãÀ¸URLÓÕÆÎó²î
°Í»ù˹̹Çå¾²Ñо¿Ö°Ô±Rafay Baloch·¢Ã÷Ò»¸öä¯ÀÀÆ÷µØµãÀ¸URLÓÕÆÎó²î£¨CVE-2018-8383£©£¬¸ÃÎó²îÓ°ÏìÁËEdgeä¯ÀÀÆ÷ºÍSafariä¯ÀÀÆ÷¡£ËäȻ΢ÈíÔÚ8ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î£¬µ«SafariÈÔδÐû²¼ÐÞ¸´²¹¶¡¡£¸ÃÎó²îÊÇÓÉä¯ÀÀÆ÷µÄ¾ºÕùÌõ¼þµ¼Öµģ¬¿ÉÔÊÐíJavaScriptÔÚÒ³Ãæ¼ÓÔØÊ±¸üеصãÀ¸ÖеÄURLµØµã¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËEdgeºÍSafariµÄPOCÊÓÆµ¡£
3¡¢AdobeÐû²¼9ÔÂÇå¾²¸üУ¬ÐÞ¸´Flash PlayerºÍColdFusionÖеÄ10¸öÎó²î
AdobeÐû²¼2018Äê9ÔµÄÇå¾²¸üУ¬ÐÞ¸´Flash PlayerºÍColdFusionÖеÄ10¸öÎó²î¡£ÆäÖаüÀ¨Flash PlayerÖеÄÌáȨÎó²î£¨CVE-2018-15967£©¡¢ColdFusionÖеķ´ÐòÁл¯Îó²î£¨CVE-2018-15965¡¢CVE-2018-15957¡¢CVE-2018-15958ºÍCVE-2018-15959£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-15961£©¡¢í§ÒâÎļþÁýÕÖÎó²î£¨CVE-2018-15960£©¡¢Çå¾²ÈÆ¹ýÎó²î£¨CVE-2018-15963£©ÒÔ¼°ÐÅϢй¶Îó²î£¨CVE-2018-15962ºÍCVE-2018-15964£©¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/adobe-software-updates.html
4¡¢SAPÐû²¼9ÔÂÇå¾²¸üУ¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ14¸öÎó²î
SAPÐû²¼2018Äê9ÔµÄÇå¾²¸üУ¬ÐÞ¸´Æä²úÆ·ÖеÄ14¸öÎó²î¡£½ÏÑÏÖØµÄÎó²î°üÀ¨SAP ECCÖеÄÊÚȨ¼ì²éȱʧÎó²î¡¢Business OneºÍHANA×°ÖóÌÐòÖеÄÐÅϢй¶Îó²îÒÔ¼°BEx Web JavaÔËÐÐʱÖеÄXXEÎó²îµÈ¡£ÁíÍâSAP HANAÖеĿɵ¼Ö¾ܾø·þÎñµÄÎó²î£¨CVE-2018-2465£©Ò²±»ÒÔΪΣº¦½Ï¸ß¡£
5¡¢Check PointÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíRamnitµÄ¹¥»÷Ô˶¯ìÉý
Check PointÑо¿ÍŶӷ¢Ã÷8Ô·ÝÒøÐÐľÂíRamnitµÄ¹¥»÷Ô˶¯´ó·ùÔöÌí¡£Æ¾Ö¤Æä×îÐÂÈ«ÇòÍþвָÊý£¬RamnitÔÚ8Ô·ÝÉÏÉýÖÁµÚÁù룬³ÉΪÉÏÉýÇ÷ÊÆ×î´óµÄÒøÐÐľÂí£¬Ëü´Ó2018Äê6ÔÂÒÔÀ´ÒѾÉÏÉýÁËÒ»±¶ÒÔÉÏ¡£Õâ±ê¼Ç׏¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃÒøÐÐľÂíÀ´¿ìËÙ»ñÈ¡¿î×ÓÊÕÒæ¡£Í¬Ê±£¬CoinhiveÈÔÈ»ÊÇ×îÊ¢ÐеĶñÒâÈí¼þ£¬Ó°ÏìÁËÈ«Çò17%µÄ×éÖ¯¡£DorkbotºÍAndromedaÅÅÁжþÈý룬»®·ÖÓ°ÏìÁË6%µÄ×éÖ¯¡£
ÔÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/09/11/augusts-most-wanted-malware-banking-trojan-attacks-turn-up-the-heat/
6¡¢Ñо¿Ö°Ô±·¢Ã÷2ÃëÄÚ¸´ÖÆÌØË¹Àµç¶¯Æû³µÔ¿³×µÄ¹¥»÷ÒªÁì
±ÈÀûʱ³ãë´óѧµÄÑо¿ÍŶӷ¢Ã÷ÌØË¹À£¨Tesla£©Model SÖеÄPKES£¨ÎÞÔ¿³×½øÈëϵͳ£©ÓëÎÞÏßÔ¿³×µÄÈÏÖ¤Àú³Ì±£´æÇå¾²Îó²î£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚ¼¸ÃëÄÚ¸´ÖÆÆû³µÔ¿³×½«Æû³µÍµ×ß¡£Õû¸öÆÆ½âÀú³ÌÖ»Ðè×¼±¸Ô¼Äª600ÃÀÔª£¨Ô¼ºÏÈËÃñ±Ò4120Ôª£©µÄÎÞÏßµçºÍÅÌËã×°±¸¡£Tesla»ØÓ¦³Æ¸ÃÎó²îÒѱ»ÐÞ¸´¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/tesla-model-s-remote-hack.html
ÉùÃ÷£º±¾×ÊѶÓÉ×ðÁú¿Ê±Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ