¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180913

Ðû²¼Ê±¼ä 2018-09-13
1¡¢VeeamÒòMongoDBÉèÖùýʧµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


9ÔÂ5ÈÕÇå¾²Ñо¿Ö°Ô±Bob Diachenko·¢Ã÷Êý¾ÝÖÎÀí¹«Ë¾VeeamµÄMongoDBЧÀÍÆ÷¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬Ò»¸öÁè¼Ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£ ¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨Ô¼4.45ÒÚÌõÓû§¼Í¼£¬£¬£¬£¬£¬£¬°üÀ¨Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÆÜÉí¹ú¼Ò/µØÇøµÈСÎÒ˽¼ÒÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØµã¡¢Ïà¹ØURL¡¢Óû§ÊðÀíµÈÓªÏúÏà¹ØÐÅÏ¢¡£ ¡£¡£¡£¡£VeeamÒѶԸÃÊý¾Ý¿â½ÓÄÉÁ˱£»£»£»£»£»£»¤²½·¥¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/

2¡¢Ñо¿Ö°Ô±Åû¶SafariÖеÄÒ»¸öÉÐδÐÞ¸´µÄµØµãÀ¸URLÓÕÆ­Îó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


°Í»ù˹̹Çå¾²Ñо¿Ö°Ô±Rafay Baloch·¢Ã÷Ò»¸öä¯ÀÀÆ÷µØµãÀ¸URLÓÕÆ­Îó²î£¨CVE-2018-8383£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËEdgeä¯ÀÀÆ÷ºÍSafariä¯ÀÀÆ÷¡£ ¡£¡£¡£¡£ËäȻ΢ÈíÔÚ8ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬£¬µ«SafariÈÔδÐû²¼ÐÞ¸´²¹¶¡¡£ ¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉä¯ÀÀÆ÷µÄ¾ºÕùÌõ¼þµ¼ÖµÄ£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíJavaScriptÔÚÒ³Ãæ¼ÓÔØÊ±¸üеصãÀ¸ÖеÄURLµØµã¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËEdgeºÍSafariµÄPOCÊÓÆµ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/browser-address-spoofing-vulnerability.html

3¡¢AdobeÐû²¼9ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Flash PlayerºÍColdFusionÖеÄ10¸öÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


AdobeÐû²¼2018Äê9ÔµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Flash PlayerºÍColdFusionÖеÄ10¸öÎó²î¡£ ¡£¡£¡£¡£ÆäÖаüÀ¨Flash PlayerÖеÄÌáȨÎó²î£¨CVE-2018-15967£©¡¢ColdFusionÖеķ´ÐòÁл¯Îó²î£¨CVE-2018-15965¡¢CVE-2018-15957¡¢CVE-2018-15958ºÍCVE-2018-15959£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-15961£©¡¢í§ÒâÎļþÁýÕÖÎó²î£¨CVE-2018-15960£©¡¢Çå¾²ÈÆ¹ýÎó²î£¨CVE-2018-15963£©ÒÔ¼°ÐÅϢй¶Îó²î£¨CVE-2018-15962ºÍCVE-2018-15964£©¡£ ¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/adobe-software-updates.html


4¡¢SAPÐû²¼9ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ14¸öÎó²î

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

SAPÐû²¼2018Äê9ÔµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä²úÆ·ÖеÄ14¸öÎó²î¡£ ¡£¡£¡£¡£½ÏÑÏÖØµÄÎó²î°üÀ¨SAP ECCÖеÄÊÚȨ¼ì²éȱʧÎó²î¡¢Business OneºÍHANA×°ÖóÌÐòÖеÄÐÅϢй¶Îó²îÒÔ¼°BEx Web JavaÔËÐÐʱÖеÄXXEÎó²îµÈ¡£ ¡£¡£¡£¡£ÁíÍâSAP HANAÖеĿɵ¼Ö¾ܾøÐ§À͵ÄÎó²î£¨CVE-2018-2465£©Ò²±»ÒÔΪΣº¦½Ï¸ß¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sap-patches-critical-vulnerability-business-client

5¡¢Check PointÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíRamnitµÄ¹¥»÷»î¶¯ì­Éý

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Check PointÑо¿ÍŶӷ¢Ã÷8Ô·ÝÒøÐÐľÂíRamnitµÄ¹¥»÷»î¶¯´ó·ùÔöÌí¡£ ¡£¡£¡£¡£Æ¾Ö¤Æä×îÐÂÈ«ÇòÍþвָÊý£¬£¬£¬£¬£¬£¬RamnitÔÚ8Ô·ÝÉÏÉýÖÁµÚÁù룬£¬£¬£¬£¬£¬³ÉΪÉÏÉýÇ÷ÊÆ×î´óµÄÒøÐÐľÂí£¬£¬£¬£¬£¬£¬Ëü´Ó2018Äê6ÔÂÒÔÀ´ÒѾ­ÉÏÉýÁËÒ»±¶ÒÔÉÏ¡£ ¡£¡£¡£¡£Õâ±ê¼Ç׏¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃÒøÐÐľÂíÀ´¿ìËÙ»ñÈ¡¿î×ÓÊÕÒæ¡£ ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬CoinhiveÈÔÈ»ÊÇ×îÊ¢ÐеĶñÒâÈí¼þ£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÈ«Çò17%µÄ×éÖ¯¡£ ¡£¡£¡£¡£DorkbotºÍAndromedaÅÅÁжþÈý룬£¬£¬£¬£¬£¬»®·ÖÓ°ÏìÁË6%µÄ×éÖ¯¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/09/11/augusts-most-wanted-malware-banking-trojan-attacks-turn-up-the-heat/


6¡¢Ñо¿Ö°Ô±·¢Ã÷2ÃëÄÚ¸´ÖÆÌØË¹À­µç¶¯Æû³µÔ¿³×µÄ¹¥»÷ÒªÁì


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±ÈÀûʱ³ãë´óѧµÄÑо¿ÍŶӷ¢Ã÷ÌØË¹À­£¨Tesla£©Model SÖеÄPKES£¨ÎÞÔ¿³×½øÈëϵͳ£©ÓëÎÞÏßÔ¿³×µÄÈÏÖ¤Àú³Ì±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚ¼¸ÃëÄÚ¸´ÖÆÆû³µÔ¿³×½«Æû³µÍµ×ß¡£ ¡£¡£¡£¡£Õû¸öÆÆ½âÀú³ÌÖ»Ðè×¼±¸Ô¼Äª600ÃÀÔª£¨Ô¼ºÏÈËÃñ±Ò4120Ôª£©µÄÎÞÏßµçºÍÅÌËã×°±¸¡£ ¡£¡£¡£¡£Tesla»ØÓ¦³Æ¸ÃÎó²îÒѱ»ÐÞ¸´¡£ ¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/tesla-model-s-remote-hack.html



ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí