MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÌáȨÎó²î£»£»£»£»£»£»£»Concrete5 CMS±£´æRCEÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ
Ðû²¼Ê±¼ä 2020-08-201.MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÌáȨÎó²î
MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2Ðû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬Ö¼ÔÚÐÞ¸´ÌáȨÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²î»áÓ°ÏìWindowsÔ¶³Ì»á¼ûЧÀÍ¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÁ½¸öÎó²î±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÀÖ³ÉʹÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£¡£¡£¡£¡£¿ÉÊÇÔÚʹÓÃÕâЩÎó²î֮ǰ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒªÏÈÔÚÊܺ¦ÕßµÄ×°±¸ÉϱàдִÐÐÌØÈ¨´úÂë¡£¡£¡£¡£¡£´Ë´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦Öóͷ£ÄÚ´æºÍÎļþ²Ù×÷µÄ·½·¨À´½â¾öÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/
2.Concrete5 CMS±£´æRCEÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ
EdgescanµÄÑо¿Ö°Ô±Åû¶ÁËConcrete5 CMSÖеĵÄÔ¶³ÌÖ´ÐдúÂ루RCE£©Îó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»ÍêÈ«½ÓÊÜ£¬£¬£¬£¬£¬£¬Ó°ÏìÁËConcrete5°æ±¾8.5.2¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓôËÎó²îʱ£¬£¬£¬£¬£¬£¬ÐèÒªÓÐÊʵ±µÄȨÏÞ£¨ÖÎÀíÔ±½ÇÉ«£©²Å»ª»á¼ûÔÊÐíÎļþÀàÐ͹¦Ð§£¬£¬£¬£¬£¬£¬ÒÔ½«PHPÎļþÀàÐͰüÀ¨ÔÚÔÊÐíµÄÀ©Õ¹ÃûÁбíÖС£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«ÉÏÔØPHP shellÒÔ»á¼ûЧÀÍÆ÷ϵͳ²¢»ñµÃЧÀÍÆ÷»òϵͳµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¸ÃÎó²îÏÖÔÚÒÑÔÚConcrete5°æ±¾8.5.4ÖÐÐÞ¸´¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/107294/security/concrete5-cms-rce.html
3.ºÚ¿ÍʹÓÃMailtoÁ´½Ó¹¥»÷Óʼþ¿Í»§¶Ë£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÍâµØÎļþ
µÂ¹úÑо¿Ö°Ô±·¢Ã÷ºÚ¿ÍʹÓÃMailtoÁ´½Ó¹¥»÷Óʼþ¿Í»§¶Ë£¬£¬£¬£¬£¬£¬ÀýÈçGNOME Evolution¡¢KDE KMail¡¢IBM / HCL NotesºÍ¾É°æ±¾µÄThunderbird£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÍâµØÎļþ¡£¡£¡£¡£¡£Mailto ÊÇÒ»ÖÖÌØÊâÀàÐ͵ÄÁ´½Ó£¬£¬£¬£¬£¬£¬ÔÚµã»÷ÕâЩÁ´½Óʱ»á·¿ªÒ»¸öеĵç×ÓÓʼþ׫д»ò»Ø¸´´°¿Ú¶ø²»ÊÇÒ»¸öеÄÍøÒ³¡£¡£¡£¡£¡£Ê¹ÓÃÕâÖÖ¹¥»÷£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔ´ÓÓû§ÏµÍ³ÇÔÈ¡Ãô¸ÐÎļþ£¬£¬£¬£¬£¬£¬ÀýÈç¼ÓÃÜ£¨PGP£©ÃÜÔ¿¡¢SSHÃÜÔ¿¡¢ÉèÖÃÎļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÎļþ¡¢ÃÜÂë´æ´¢»òÖ÷ÒªµÄÓªÒµÎĵµ£¬£¬£¬£¬£¬£¬Ö»ÒªËüÃÇ´æ´¢ÔÚ¹¥»÷ÕßÒÑÖªµÄÎļþ·¾¶ÖС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/some-email-clients-are-vulnerable-to-attacks-via-mailto-links/
4.IcedIDÉý¼¶»Ø¹é£¬£¬£¬£¬£¬£¬Ê¹ÓÃÒªº¦×Ö»ìÏýµÈÕ½ÂÔÌӱܼì²â
Õ°²©ÍøÂçÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ×î½üµÄÍøÂç´¹ÂڻÖÐʹÓÃÁËÉý¼¶µÄÒøÐÐľÂí³ÌÐòIcedID£¬£¬£¬£¬£¬£¬´Ó¶øÊµÏÖÁ˶àÏîй¦Ð§£¬£¬£¬£¬£¬£¬°üÀ¨ÊÜÃÜÂë±£»£»£»£»£»£»£»¤µÄ¸½¼þ¡¢Òªº¦×Ö»ìÏýºÍ×îµÍÏ޶ȵĺê´úÂë¡£¡£¡£¡£¡£IcedIDбäÌåÊÇͨ¹ý±»ÈëÇֵįóÒµÕÊ»§·Ö·¢£¬£¬£¬£¬£¬£¬²¢ÓÃÒªº¦×Ö»ìÏýµÄ·½·¨ÌÓ¹ý´¹ÂÚÓʼþ¹ýÂËÆ÷µÄ¼ì²â¡£¡£¡£¡£¡£È»ºóÌí¼Ó´øÓÐÃÜÂëµÄ¸½¼þ£¬£¬£¬£¬£¬£¬²¢Éù³ÆÃÜÂëÔÚÓʼþÕýÎÄÖÐÒÔÓÕʹÊܺ¦Õß·¿ªÎļþ¡£¡£¡£¡£¡£ÎļþÖаüÀ¨ÓкêWordÎĵµ£¬£¬£¬£¬£¬£¬µ±Êܺ¦Õß·¿ªºó±ã»á×°ÖÃľÂí³ÌÐòIcedID¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/icedid-trojan-rebooted-evasive-tactics/158425/
5.Â×¶ØÊý¾ÝÖÐÐÄUPS¹ÊÕÏÖÂЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬¶à¸öISPÔËÓªÉÌÊÜÓ°Ïì
Â×¶Ø»¥ÁªÍøÉúÒâËùÊý¾ÝÖÐÐĵÄUPS±¬·¢¹ÊÕϵ¼ÖÂЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬¶à¸öISPºÍµçÐŹ«Ë¾ÊÜÓ°Ïì¡£¡£¡£¡£¡£EquinixÌåÏÖ£¬£¬£¬£¬£¬£¬8ÔÂ18ÈÕÆÆÏþ4µã40·Ö£¬£¬£¬£¬£¬£¬Equinix IBX LD8±¬·¢ÁËÍ£µç²¢·ºÆðÁË»ðÔÖ(ûÓлðÔÖ)£¬£¬£¬£¬£¬£¬µ¼ÖÂEquinixµÄLD8Êý¾ÝÖÐÐĹرա£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬£¬£¬¸ÃÊÂÎñÊÇÓÉÒ»¸ö¹ÊÕϵÄUPSϵͳÒýÆðµÄ¡£¡£¡£¡£¡£Õâ´ÎÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÉϰټÒÖ÷»ú¡¢ÔÆÅÌËãºÍµçÐŲ¿·ÖµÄ¿Í»§£¬£¬£¬£¬£¬£¬°üÀ¨Ó¢¹úµçÐÅ(BT)¡¢Ìì¿Õ¹ã²¥¹«Ë¾(Sky)ºÍάÕäýÌå(Virgin Media)µÈ»¥ÁªÍøÐ§ÀÍÌṩÉÌ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.com/2020/08/18/outage_london_internet_exchange/
6.AI¹«Ë¾Cense¹ûÕæÒò´æ´¢¿âÉèÖùýʧй¶µÄ250ÍòÌõÒ½ÁÆÊý¾Ý
λÓÚŦԼµÄÈ˹¤ÖÇÄܹ«Ë¾Cense¹ûÕæÁË250ÍòÌõ°üÀ¨Ãô¸ÐºÍÉñÃØÊý¾ÝµÄÒ½ÁƼͼ¡£¡£¡£¡£¡£´Ë´Îй¶ÁË2594261·ÝÒ½ÁƼͼ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼Ò¿Éʶ±ðÐÅÏ¢(PII)ºÍÆäËûÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬È综ÕßÐÕÃû¡¢°ü¹Ü¼Í¼¡¢Ò½ÁÆÕï¶ÏºÍ¸¶¿îÐÅÏ¢¡£¡£¡£¡£¡£Security DiscoveryÊ×´´ÈËJeremiah FowlerÊÓ²ìй¶Ե¹ÊÔÓÉʱ·¢Ã÷£¬£¬£¬£¬£¬£¬ÕâЩ¼Í¼ΪÔÝ´æÊý¾Ý£¬£¬£¬£¬£¬£¬×÷Ϊ´æ´¢¿â£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚCense Bot»òCenseµÄÖÎÀíϵͳÉϼÓÔØÊý¾Ý֮ǰÔÝʱÉúÑÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒԱ༡¢É¾³ýÉõÖÁÏÂÔØÎļþ£¬£¬£¬£¬£¬£¬¶ø²»ÐèÒªÈκÎÖÎÀíÆ¾Ö¤¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/ai-firm-exposes-sensitive-medical-data-online/