Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ
Ðû²¼Ê±¼ä 2026-01-191. Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ
1ÔÂ15ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬WordPress¶àÕ¾µãÖÎÀí²å¼þModular DSµÄ2.5.1¼°¸üÔç°æ±¾±£´æÑÏÖØÎó²îCVE-2026-23550£¬£¬£¬£¬¸ÃÎó²îÒѱ»ºÚ¿ÍʹÓ㬣¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÈÆ¹ýÈÏÖ¤£¬£¬£¬£¬ÒÔÖÎÀíԱȨÏÞ»á¼ûÊÜÓ°ÏìÍøÕ¾¡£¡£¡£¡£¡£Modular DS×÷Ϊһ¿îÖÎÀí¶à¸öWordPressÕ¾µãµÄ¹¤¾ß£¬£¬£¬£¬×°ÖÃÁ¿Òѳ¬4Íò´Î£¬£¬£¬£¬Æä¹¦Ð§°üÀ¨Ô¶³Ì¼à¿Ø¡¢Ö´ÐиüС¢Óû§ÖÎÀí¡¢Ð§ÀÍÆ÷ÐÅÏ¢»á¼û¼°Î¬»¤Ê¹ÃüµÈ¡£¡£¡£¡£¡£¾ÝPatchstackÍŶӱ¨¸æ£¬£¬£¬£¬Îó²îÊ״ι¥»÷±¬·¢ÔÚ2026Äê1ÔÂ13ÈÕUTCʱ¼ä02:00×óÓÒ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Îó²îÔ´ÓÚ²å¼þÔÚÆôÓÃ"Ö±½ÓÇëÇó"ģʽʱ£¬£¬£¬£¬Î´¶ÔÇëÇóȪԴ¾ÙÐмÓÃÜÑéÖ¤¼´ÊÓΪ¿ÉÐÅ£¬£¬£¬£¬µ¼ÖÂÃô¸Ð·ÓÉ̻¶²¢´¥·¢×Ô¶¯ÖÎÀíÔ±µÇ¼»ØÍË»úÖÆ¡£¡£¡£¡£¡£Ïêϸ¶øÑÔ£¬£¬£¬£¬ÔÚsrc/app/Http/Controllers/AuthController.phpµÄgetLoginÒªÁìÖУ¬£¬£¬£¬´úÂëʵÑé´ÓÇëÇóÌå¶ÁÈ¡Óû§ID£¬£¬£¬£¬ÈôδÌṩÔò×Ô¶¯»ñÈ¡ÏÖÓÐÖÎÀíÔ±»ò³¬µÈÖÎÀíÔ±Óû§²¢µÇ¼£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÓû§¿ÉʹÓôË·¾¶ÊµÏÖȨÏÞÌáÉý¡£¡£¡£¡£¡£Modular DSÔÚÊÕµ½Îó²î±¨¸æºóÊýСʱÄÚÐû²¼2.5.2°æ±¾ÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/
2. ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄÊý¾Ýй¶ӰÏ쳬14.5Íò»¼Õß
1ÔÂ15ÈÕ£¬£¬£¬£¬ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄ¿ËÈÕÅû¶һÆðÖØ´óÊý¾ÝÇå¾²ÊÂÎñ£¬£¬£¬£¬Ó°Ïì145,381Ãû»¼Õß¡£¡£¡£¡£¡£¸Ã·ÇÓªÀûÐÔÒ½ÁÆÏµÍ³ÓÚ2025Äê6ÔÂ1ÈÕ¼ì²âµ½ITϵͳÒì³£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬Ëæ¼´Æô¶¯Çå¾²¼Ó¹Ì²¢ÁªºÏµÚÈý·½ÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ죬£¬£¬£¬Í¬²½×ª´ïÖ´·¨²¿·Ö¡£¡£¡£¡£¡£ÊÓ²ìÓÚ11ÔÂ6ÈÕÍê³É£¬£¬£¬£¬È·ÈÏ2025Äê3ÔÂ19ÈÕÖÁ6ÔÂ1ÈÕʱ´ú£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäITÇéÐΣ¬£¬£¬£¬¿ÉÄÜ»ñÈ¡»¼ÕßÃô¸ÐÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÖÎÁÆÏêÇ顢ЧÀÍÈÕÆÚ¡¢Ò½ÁÆÌṩÕßÐÕÃû¡¢°ü¹ÜÐÅÏ¢£¬£¬£¬£¬²¿·Ö²¡Àý»¹Éæ¼°Éç»á°ü¹ÜºÅÂë¡£¡£¡£¡£¡£×÷ΪÃåÒòÖÝÖв¿¼°Î÷²¿µØÇøÒªº¦Ò½ÁÆÐ§ÀÍÉÌ£¬£¬£¬£¬¸Ã»ú¹¹ÔËÓª¶à¼ÒÒ½Ôº¡¢ÕïËù¼°×¨¿ÆÐ§ÀÍ£¬£¬£¬£¬ÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£¡£¡£¡£¡£»£»£»£»£»£»£»ú¹¹ÓÚ2025Äê7ÔÂ31ÈÕÖÁ12ÔÂ29ÈÕʱ´úͨ¹ýÊéÃæÍ¨Öª¡¢ÈÈÏߵ绰¼°ÍøÕ¾Í¨¸æ¼û¸æÊÜÓ°Ï컼Õߣ¬£¬£¬£¬²¢ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓñ£»£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¸ÃЧÀÍÓÉTransUnionÆìÏÂCyberScout¹«Ë¾³Ð±££¬£¬£¬£¬º¸Çµ¥¾ÖÐÅÓÃ¼à¿Ø¡¢ÊµÊ±ÐÅÓñ¨¸æ¡¢ÐÅÓÃÆÀ·Ö±ä»»ÌáÐѼ°×Ô¶¯Ú²ÆÔ®Öú£¬£¬£¬£¬ÐÖúÉí·Ý͵ÇÔÊܺ¦Õß½â¾öÎÊÌâ¡£¡£¡£¡£¡£
https://securityaffairs.com/186959/uncategorized/central-maine-healthcare-data-breach-impacted-over-145000-patients.html
3. WhisperPairÎó²î̻¶ÊýÒÚÀ¶ÑÀ×°±¸Ç徲Σº¦
1ÔÂ15ÈÕ£¬£¬£¬£¬Â³ãë´óѧÅÌËã»úÇå¾²ÍŶӷ¢Ã÷¹È¸è¿ìËÙÅä¶ÔÐÒé±£´æ¸ßΣÎó²îCVE-2025-36911£¨´úºÅWhisperPair£©£¬£¬£¬£¬Ó°ÏìÈ«ÇòÊýÒŲ֧́³Ö¸Ã¹¦Ð§µÄÎÞÏß¶ú»ú¡¢¶úÈûºÍÑïÉùÆ÷£¬£¬£¬£¬Éæ¼°Google¡¢Jabra¡¢JBL¡¢Ë÷ÄᡢСÃ×µÈÊ®Óà¸öÆ·ÅÆ¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ×°±¸ÖÆÔìÉ̶ԿìËÙÅä¶ÔÐÒéµÄ²»µ±ÊµÏÖ£¬£¬£¬£¬¹æ·¶ÒªÇó×°±¸ÔÚ·ÇÅä¶ÔģʽÏÂÓ¦ºöÂÔÅä¶ÔÇëÇ󣬣¬£¬£¬µ«´ó¶¼³§ÉÌÎ´Ç¿ÖÆÖ´Ðд˼ì²é£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿Éδ¾Óû§ÊÚÈ¨Ç¿ÖÆÅä¶Ô×°±¸¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÈκÎÀ¶ÑÀ×°±¸£¨ÈçÌõ¼Ç±¾µçÄÔ¡¢Ê÷Ý®ÅÉ»òÊÖ»ú£©£¬£¬£¬£¬ÔÚ14Ã×¹æÄ£ÄÚÎÞÐèÓû§½»»¥¼´¿ÉÍê³ÉÅä¶Ô¡£¡£¡£¡£¡£Åä¶Ôºó£¬£¬£¬£¬¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÒôƵװ±¸£ºÒÔ¸ßÒôÁ¿²¥·ÅÒôƵ×ÌÈÅÓû§£¬£¬£¬£¬»òͨ¹ýÂó¿Ë·çÇÔÌý¶Ô»°¡£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬Í¨¹ýGoogleµÄFind HubÍøÂ磬£¬£¬£¬¹¥»÷Õ߿ɽ«Êܺ¦Õß×°±¸°ó¶¨ÖÁ×Ô¼ºµÄGoogleÕË»§£¬£¬£¬£¬ÊµÏÖ¿ç×°±¸Î»Öøú×Ù¡£¡£¡£¡£¡£Êܺ¦Õß¿ÉÄÜÊÕµ½×°±¸×Ô´øµÄ¸ú×Ù֪ͨ£¬£¬£¬£¬µ«ÒòÏÔʾΪ×ÔÉí×°±¸¶øºöÊÓÖÒÑÔ£¬£¬£¬£¬µ¼Öºã¾ÃÒþ²Ø¸ú×Ù¡£¡£¡£¡£¡£¹È¸èÏòÑо¿Ö°Ô±·¢·Å1.5ÍòÃÀÔª×î¸ßÉͽ𣬣¬£¬£¬²¢Óë³§ÉÌÏàÖúÔÚ150ÌìÅû¶ÆÚÄÚÐû²¼²¹¶¡¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/
4. ¼ÓÄôóCIROÊý¾Ýй¶²¨¼°75ÍòͶ×ÊÕß
1ÔÂ18ÈÕ£¬£¬£¬£¬¼ÓÄôóͶ×Êî¿Ïµ×éÖ¯£¨CIRO£©¿ËÈÕ֤ʵ£¬£¬£¬£¬È¥Äê8ÔÂÔâÓöµÄÍøÂçÇå¾²ÊÂÎñ×îÖÕÈ·ÈÏÓ°ÏìÔ¼75ÍòÃû¼ÓÄôóͶ×ÊÕߣ¬£¬£¬£¬³ÉΪ¸Ã¹úÈ¥Äê×îÑÏÖØµÄÍøÂçÇå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£CIRO×÷Ϊ2023Ä꽨ÉèµÄ¼ÓÄôóͶ×ÊÉúÒâÉÌ¡¢ÅäºÏ»ù½ðÉúÒâÉ̼°ÉúÒâ»î¶¯µÄ¹ú¼Ò×ÔÂÉ»ú¹¹£¬£¬£¬£¬ÊǽðÈÚî¿Ïµ¿ò¼ÜµÄ½¹µãÖ§ÖùÖ®Ò»¡£¡£¡£¡£¡£CIRO·¢Ã÷ϵͳ±£´æÍøÂçÇå¾²Íþвºó£¬£¬£¬£¬Á¬Ã¦¹Ø±Õ²¿·Ö·ÇÒªº¦ÏµÍ³²¢Æô¶¯ÊӲ졣¡£¡£¡£¡£Ö»¹Ü8ÔÂ18ÈÕ¶ÔÍâÅû¶ÊÂÎñ£¬£¬£¬£¬µ«ÍêÕûÓ°Ïì¹æÄ£Ö±ÖÁ½ñÄê1ÔÂ14ÈÕÍê³ÉÆÕ±é·¨Ö¤ÊÓ²ìºó²ÅµÃÒÔÃ÷È·¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬²¿·Ö³ÉÔ±¹«Ë¾¼°Æä×¢²áÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Ôâй¶£¬£¬£¬£¬ÏêϸÊý¾ÝÒòÈ˶øÒ죬£¬£¬£¬¿ÉÄܰüÀ¨³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÄêÊÕÈë¡¢Éç»á°ü¹ÜºÅÂë¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅÂ롢Ͷ×ÊÕË»§ºÅÂë¼°ÕË»§±¨±íµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬CIROÇ¿µ÷Æäϵͳδ´æ´¢µÇ¼ƾ֤»òÕË»§Çå¾²ÎÊÌ⣬£¬£¬£¬Òò´ËÕâЩÐÅϢδÊÜÓ°Ïì¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬£¬CIRO½«ÎªËùÓÐÊÜÓ°ÏìͶ×ÊÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬ÊÜÓ°ÏìÕß½«ÊÕµ½Ö±½Ó֪ͨ¼°×¢²áÖ¸Òý£¬£¬£¬£¬Î´ÊÕµ½Í¨ÖªÕß¿É×Ô¶¯ÁªÏµCIROÈ·ÈÏ״̬¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/
5. ¶ñÒâGhostPosterä¯ÀÀÆ÷À©Õ¹³ÌÐò×°ÖÃÁ¿´ï84Íò´Î
1ÔÂ17ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚChrome¡¢FirefoxºÍEdgeÓ¦ÓÃÊÐËÁÖз¢Ã÷17¸öÓëGhostPoster¹¥»÷»î¶¯Ïà¹ØµÄ¶ñÒâä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬£¬£¬£¬×Ü×°ÖÃÁ¿´ï84Íò´Î¡£¡£¡£¡£¡£¸Ã»î¶¯×îÔçÓÉKoi SecurityÓÚ2025Äê12ÔÂÅû¶£¬£¬£¬£¬Éæ¼°À©Õ¹Í¨¹ýͼ±êÒþ²Ø¶ñÒâJavaScript´úÂ룬£¬£¬£¬¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯²¢Ö²ÈëºóÃÅ¡£¡£¡£¡£¡£ÕâЩ´úÂë»á´ÓÍⲿ»ñÈ¡»ìÏýµÄÓÐÓÃÔØºÉ£¬£¬£¬£¬¸ú×Ùä¯ÀÀÐÐΪ£¬£¬£¬£¬Ð®ÖƵçÉÌÆ½Ì¨Í¬ÃËÁ´½Ó£¬£¬£¬£¬²¢×¢Èë²»¿É¼ûiframeʵÑé¹ã¸æÚ²ÆºÍµã»÷ڲơ£¡£¡£¡£¡£LayerXµÄ×îб¨¸æÖ¸³ö£¬£¬£¬£¬Ö»¹Ü»î¶¯ÒÑÆØ¹â£¬£¬£¬£¬µ«ÈÔÒ»Á¬»îÔ¾¡£¡£¡£¡£¡£17¸öÀ©Õ¹ÖУ¬£¬£¬£¬×°ÖÃÁ¿×î¸ßµÄ"ÓÒ¼üµã»÷¹È¸è·Òë"´ï52.2Íò´Î£¬£¬£¬£¬"ʹÓÃGoogle·ÒëÑ¡¶¨Îı¾"´ï15.9Íò´Î£¬£¬£¬£¬ÆäÓàÈç"Ads Block Ultimate""¸¡¶¯²¥·ÅÆ÷"µÈ×°ÖÃÁ¿´ÓÊýǧµ½ÊýÍò²»µÈ¡£¡£¡£¡£¡£»£»£»£»£»£»£»î¶¯×î³õÔÚMicrosoft Edgeƽ̨Ìᳫ£¬£¬£¬£¬ºóÀ©Õ¹ÖÁFirefoxºÍChrome£¬£¬£¬£¬²¿·ÖÀ©Õ¹×Ô2020ÄêÆð±ã±£´æÓÚ²å¼þÊÐËÁ£¬£¬£¬£¬ÏÔʾÆäºã¾ÃÔËÓªµÄÀÖ³ÉÐÔ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬MozillaºÍ΢ÈíÒѽ«Ïà¹ØÀ©Õ¹Ï¼ܣ¬£¬£¬£¬¹È¸èҲȷÈÏChromeÊÐËÁÖеÄÕâЩÀ©Õ¹Òѱ»É¾³ý¡£¡£¡£¡£¡£µ«ÒÑ×°ÖõÄÓû§ÈÔÃæÁÙΣº¦£¬£¬£¬£¬Ðè×Ô¶¯Ð¶Ôز¢¼à¿ØÕË»§Òì³£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-ghostposter-browser-extensions-found-with-840-000-installs/
6. Fortinet FortiSIEM¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ
1ÔÂ16ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬Fortinet FortiSIEM±»ÆØ±£´æÑÏÖØÎó²î£¨CVE-2025-64155£©£¬£¬£¬£¬Æä¿´·¨Ñé֤ʹÓôúÂëÒѹûÕæ£¬£¬£¬£¬ÇÒÕý±»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£¡£¡£¸ÃÎó²îÓÉHorizon3.aiÇå¾²Ñо¿Ô±Zach Hanley·¢Ã÷£¬£¬£¬£¬ÊµÖÊÊDzÙ×÷ϵͳÏÂÁî×¢È루CWE-78£©ÓëȨÏÞÌáÉýµÄ×éºÏ£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýÈ«ÐĽṹµÄTCPÇëÇóÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬×îÖÕ¿É»ñÈ¡root»á¼ûȨÏÞ¡£¡£¡£¡£¡£Îó²îÓ°ÏìFortiSIEM 6.7ÖÁ7.5°æ±¾£¬£¬£¬£¬FortinetÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬½¨ÒéÓû§Éý¼¶ÖÁ7.4.1¼°ÒÔÉÏ¡¢7.3.5¼°ÒÔÉÏ¡¢7.2.7¼°ÒÔÉÏ»ò7.1.9¼°ÒÔÉϰ汾£»£»£»£»£»£»£»Ê¹Óþɰ汾µÄÓû§ÐèǨáãÖÁÐÞ¸´°æ±¾¡£¡£¡£¡£¡£ÔÝʱ½â¾ö¼Æ»®ÎªÏÞÖÆphMonitorЧÀͶ˿ڣ¨7900£©µÄ»á¼û£¬£¬£¬£¬ÒÔ»º½âÎÞ·¨Á¬Ã¦Éý¼¶µÄÇéÐΡ£¡£¡£¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬£¬£¬Îó²îȪԴÔÚÓÚphMonitorЧÀÍ̻¶µÄÊýÊ®¸öδÂÄÀúÖ¤µÄÔ¶³Ì¿ÉŲÓÃÏÂÁî´¦Öóͷ£³ÌÐò¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÀÄÓòÎÊý×¢ÈëÁýÕÖ/opt/charting/redishb.shÎļþ£¬£¬£¬£¬´Ó¶øÒÔrootȨÏÞÖ´ÐдúÂë¡£¡£¡£¡£¡£Horizon3.aiÒÑÐû²¼ÊÖÒÕÎÄÕ¼°ÈëÇÖÖ¸±ê£¬£¬£¬£¬ÖÎÀíÔ±¿Éͨ¹ý¼ì²é/opt/phoenix/log/phoenix.logsÖеÄphMonitorÈÕÖ¾£¬£¬£¬£¬²éÕÒ°üÀ¨PHL_ERRORÌõÄ¿ÖеĶñÒâÔØºÉURLÒÔʶ±ðÈëÇÖ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-fortinet-fortisiem-vulnerability-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ