¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180913

Ðû²¼Ê±¼ä 2018-09-13
1¡¢VeeamÒòMongoDBÉèÖùýʧµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


9ÔÂ5ÈÕÇå¾²Ñо¿Ö°Ô±Bob Diachenko·¢Ã÷Êý¾ÝÖÎÀí¹«Ë¾VeeamµÄMongoDBЧÀÍÆ÷¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬Ò»¸öÁè¼Ý200GBµÄÊý¾Ý¿â¿ÉÄÜй¶¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨Ô¼4.45ÒÚÌõÓû§¼Í¼£¬£¬£¬£¬£¬°üÀ¨Óû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÆÜÉí¹ú¼Ò/µØÇøµÈСÎÒ˽¼ÒÐÅÏ¢ÒÔ¼°¿Í»§ÀàÐÍºÍÆóÒµ¹æÄ£¡¢IPµØµã¡¢Ïà¹ØURL¡¢Óû§ÊðÀíµÈÓªÏúÏà¹ØÐÅÏ¢¡£¡£¡£¡£VeeamÒѶԸÃÊý¾Ý¿â½ÓÄÉÁ˱£»£»£»£»£»¤²½·¥¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/

2¡¢Ñо¿Ö°Ô±Åû¶SafariÖеÄÒ»¸öÉÐδÐÞ¸´µÄµØµãÀ¸URLÓÕÆ­Îó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


°Í»ù˹̹Çå¾²Ñо¿Ö°Ô±Rafay Baloch·¢Ã÷Ò»¸öä¯ÀÀÆ÷µØµãÀ¸URLÓÕÆ­Îó²î£¨CVE-2018-8383£©£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËEdgeä¯ÀÀÆ÷ºÍSafariä¯ÀÀÆ÷¡£¡£¡£¡£ËäȻ΢ÈíÔÚ8ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬£¬µ«SafariÈÔδÐû²¼ÐÞ¸´²¹¶¡¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉä¯ÀÀÆ÷µÄ¾ºÕùÌõ¼þµ¼ÖµÄ£¬£¬£¬£¬£¬¿ÉÔÊÐíJavaScriptÔÚÒ³Ãæ¼ÓÔØÊ±¸üеصãÀ¸ÖеÄURLµØµã¡£¡£¡£¡£Ñо¿Ö°Ô±»¹Ðû²¼ÁËEdgeºÍSafariµÄPOCÊÓÆµ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/browser-address-spoofing-vulnerability.html

3¡¢AdobeÐû²¼9ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Flash PlayerºÍColdFusionÖеÄ10¸öÎó²î


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


AdobeÐû²¼2018Äê9ÔµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Flash PlayerºÍColdFusionÖеÄ10¸öÎó²î¡£¡£¡£¡£ÆäÖаüÀ¨Flash PlayerÖеÄÌáȨÎó²î£¨CVE-2018-15967£©¡¢ColdFusionÖеķ´ÐòÁл¯Îó²î£¨CVE-2018-15965¡¢CVE-2018-15957¡¢CVE-2018-15958ºÍCVE-2018-15959£©¡¢ÎļþÉÏ´«Îó²î£¨CVE-2018-15961£©¡¢í§ÒâÎļþÁýÕÖÎó²î£¨CVE-2018-15960£©¡¢Çå¾²ÈÆ¹ýÎó²î£¨CVE-2018-15963£©ÒÔ¼°ÐÅϢй¶Îó²î£¨CVE-2018-15962ºÍCVE-2018-15964£©¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/adobe-software-updates.html


4¡¢SAPÐû²¼9ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ14¸öÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

SAPÐû²¼2018Äê9ÔµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Æä²úÆ·ÖеÄ14¸öÎó²î¡£¡£¡£¡£½ÏÑÏÖØµÄÎó²î°üÀ¨SAP ECCÖеÄÊÚȨ¼ì²éȱʧÎó²î¡¢Business OneºÍHANA×°ÖóÌÐòÖеÄÐÅϢй¶Îó²îÒÔ¼°BEx Web JavaÔËÐÐʱÖеÄXXEÎó²îµÈ¡£¡£¡£¡£ÁíÍâSAP HANAÖеĿɵ¼Ö¾ܾøÐ§À͵ÄÎó²î£¨CVE-2018-2465£©Ò²±»ÒÔΪΣº¦½Ï¸ß¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/sap-patches-critical-vulnerability-business-client

5¡¢Check PointÑо¿ÍŶӷ¢Ã÷ÒøÐÐľÂíRamnitµÄ¹¥»÷»î¶¯ì­Éý

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

Check PointÑо¿ÍŶӷ¢Ã÷8Ô·ÝÒøÐÐľÂíRamnitµÄ¹¥»÷»î¶¯´ó·ùÔöÌí¡£¡£¡£¡£Æ¾Ö¤Æä×îÐÂÈ«ÇòÍþвָÊý£¬£¬£¬£¬£¬RamnitÔÚ8Ô·ÝÉÏÉýÖÁµÚÁù룬£¬£¬£¬£¬³ÉΪÉÏÉýÇ÷ÊÆ×î´óµÄÒøÐÐľÂí£¬£¬£¬£¬£¬Ëü´Ó2018Äê6ÔÂÒÔÀ´ÒѾ­ÉÏÉýÁËÒ»±¶ÒÔÉÏ¡£¡£¡£¡£Õâ±ê¼Ç׏¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃÒøÐÐľÂíÀ´¿ìËÙ»ñÈ¡¿î×ÓÊÕÒæ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬CoinhiveÈÔÈ»ÊÇ×îÊ¢ÐеĶñÒâÈí¼þ£¬£¬£¬£¬£¬Ó°ÏìÁËÈ«Çò17%µÄ×éÖ¯¡£¡£¡£¡£DorkbotºÍAndromedaÅÅÁжþÈý룬£¬£¬£¬£¬»®·ÖÓ°ÏìÁË6%µÄ×éÖ¯¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/09/11/augusts-most-wanted-malware-banking-trojan-attacks-turn-up-the-heat/


6¡¢Ñо¿Ö°Ô±·¢Ã÷2ÃëÄÚ¸´ÖÆÌØË¹À­µç¶¯Æû³µÔ¿³×µÄ¹¥»÷ÒªÁì


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


±ÈÀûʱ³ãë´óѧµÄÑо¿ÍŶӷ¢Ã÷ÌØË¹À­£¨Tesla£©Model SÖеÄPKES£¨ÎÞÔ¿³×½øÈëϵͳ£©ÓëÎÞÏßÔ¿³×µÄÈÏÖ¤Àú³Ì±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚ¼¸ÃëÄÚ¸´ÖÆÆû³µÔ¿³×½«Æû³µÍµ×ß¡£¡£¡£¡£Õû¸öÆÆ½âÀú³ÌÖ»Ðè×¼±¸Ô¼Äª600ÃÀÔª£¨Ô¼ºÏÈËÃñ±Ò4120Ôª£©µÄÎÞÏßµçºÍÅÌËã×°±¸¡£¡£¡£¡£Tesla»ØÓ¦³Æ¸ÃÎó²îÒѱ»ÐÞ¸´¡£¡£¡£¡£


 Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/09/tesla-model-s-remote-hack.html



ÉùÃ÷£º±¾×ÊѶÓÉ¿­·¢k8άËûÃüÇ徲С×é·­ÒëºÍÕûÀí