ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ39ÖÜ
Ðû²¼Ê±¼ä 2018-10-03Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇFacebookÔâ0dayÎó²î¹¥»÷£¬£¬£¬£¬Ô¼5000ÍòÓû§µÄ»á¼ûÁîÅÆ±»ÇÔ£»£»£»£»£»Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚUSBÍþвÏÖ×´µÄÆÊÎö±¨¸æ£»£»£»£»£»¿¨°Í˹»ùÐû²¼¹ØÓÚICSϵͳÖеÄRATΣº¦µÄÆÊÎö±¨¸æ£»£»£»£»£»Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶£»£»£»£»£»ÔÆÅÌË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ð¡Ê±£¬£¬£¬£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1. Foxit Reader for Windows¶à¸ö¹¤¾ßÊͷźóʹÓÃÎó²î
Foxit Reader for Windows CalculateÊÂÎñ´¦Öóͷ£±£´æÊͷźóʹÓÃÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
2. Wecon LeviStudioU CVE-2018-10610»º³åÇøÒç³öÎó²î
Wecon LeviStudioU TIFFͼÏñµÄÆÊÎö±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþ£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
3. Cisco Video Surveillance Manager ApplianceĬÈÏÃÜÂëÎó²î
Cisco Video Surveillance Manager Appliance ROOTÕË»§Ê¹ÓÃÓ²±àÂëÆ¾Ö¤£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔrootÓû§Éí·ÝÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
4. ISC BIND CVE-2018-5741Çå¾²ÏÞÖÆÈÆ¹ýÎó²î
ISC BINDʵÏÖ±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÈƹýÇå¾²ÏÞÖÆ£¬£¬£¬£¬Ö´ÐÐδÊÚȨµÄ²Ù×÷¡£¡£¡£¡£
5. DedeCMS XML×¢Èëí§Òâ´úÂëÎó²î
DedeCMS´¦Öóͷ£<file type='file' name='../×Ö·û´®±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

9ÔÂ28ÈÕFacebookÈ·ÈÏÆäÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬¹¥»÷ÕßʹÓÃ0dayÎó²îÇÔÈ¡ÁËÁè¼Ý5000ÍòÓû§µÄ»á¼ûÁîÅÆ¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚFacebookµÄView As¹¦Ð§ÖУ¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÇÔÈ¡Óû§µÄ»á¼ûÁîÅÆ²¢»á¼ûÓû§µÄ˽ÈËÐÅÏ¢£¬£¬£¬£¬¶øÎÞÐèÕË»§ÃÜÂë»òË«ÒòËØÑéÖ¤Âë¡£¡£¡£¡£FacebookÒѽÓÄɲ½·¥×ÊÖú½ü9000ÍòÓû§ÖØÖÃÁË»á¼ûÁîÅÆ£¬£¬£¬£¬²¢½ûÓÃÁËView As¹¦Ð§¡£¡£¡£¡£ÓÉÓÚÊÓ²ìÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬£¬£¬£¬FacebookÉÐδȷ¶¨ÊÇ·ñÓÐÈκÎÕË»§±»ÀÄÓûòÐÅÏ¢±»»á¼û¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/09/facebook-account-hack.html
2¡¢Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚUSBÍþвÏÖ×´µÄÆÊÎö±¨¸æ
ÔÎÄÁ´½Ó£º
https://securelist.com/usb-threats-from-malware-to-miners/87989/
3¡¢¿¨°Í˹»ùÐû²¼¹ØÓÚICSϵͳÖеÄRATΣº¦µÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚICSÖеÄRATΣº¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£Ô¶³ÌÖÎÀí¹¤¾ß£¨RAT£©±»ÆÕ±éÓÃÓÚ¹¤ÒµÍøÂçÖ®ÖУ¬£¬£¬£¬ÓÃÓÚ¾ÙÐÐICS¼à²â¡¢¿ØÖƺÍά»¤¡£¡£¡£¡£Ô¶³Ì²Ù×÷ICSµÄÄÜÁ¦¿ÉÒÔ´ó´ó½µµÍά»¤±¾Ç®£¬£¬£¬£¬µ«²»ÊÜ¿ØÖƵÄÔ¶³Ì»á¼û¡¢ÎÞ·¨100%µØÌṩԶ³Ì¿Í»§¶ËµÄÕýµ±ÐÔÑéÖ¤ÒÔ¼°RAT´úÂëºÍÉèÖÃÖеÄÎó²î¶¼´ó´óÔöÌíÁ˹¥»÷Ãæ¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬¹¥»÷ÕßÔ½À´Ô½¶àµØÊ¹ÓÃRATºÍÆäËüÕýµ±¹¤¾ßÀ´ÑÚÊÎÆä¶ñÒâ»î¶¯£¬£¬£¬£¬Ê¹µÃ¶Ô¶ñÒâ»î¶¯¾ÙÐйéÒòÔ½·¢ÄÑÌâ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/threats-posed-by-using-rats-in-ics/88011/
4¡¢Ê±×°ÁãÊÛÉÌSHEINÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶
ʱװÁãÊÛÉÌSHEINÉÏÖÜÎåÐû²¼ÆäÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬Ô¼642ÍòÓû§µÄÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¹¥»÷ÊÂÎñ±¬·¢ÔÚÑ×Ì죬£¬£¬£¬¼´6ÔµÄij¸öʱ¼ä£¬£¬£¬£¬¹¥»÷Õß»á¼ûÁËÓû§µÄµç×ÓÓʼþµØµãºÍ¼ÓÃܵÄÃÜÂë¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ8ÔÂ22ÈÕ·¢Ã÷ÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬²¢ÕýÔÚÁªÏµÊÜÓ°ÏìµÄÓû§ÐÞ¸ÄÆäÃÜÂë¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÖв»°üÀ¨ÈκÎÐÅÓÿ¨ÐÅÏ¢¡£¡£¡£¡£¸Ã¹«Ë¾ÕýÔÚ¾ÙÐнøÒ»²½µÄÊӲ졣¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/shein-fashion-retailer-announces-breach-affecting-6-42-million-users/
5¡¢ÔÆÅÌË㹫˾ZohoµÄÓòÃû±»½ûÓýüÁ½Ð¡Ê±£¬£¬£¬£¬Ô¼3000ÍòÓû§ÊÜÓ°Ïì
Ó¡¶È×ÅÃûÔÆÅÌËã¿Æ¼¼¹«Ë¾ZohoµÄÓòÃû£¨zoho.com£©±»ÆäÓòÃû×¢²áÉÌTierraNet½ûÓýüÁ½¸öСʱ£¬£¬£¬£¬ÔÚ´Ëʱ´úÓû§±»Öض¨ÏòÖÁÒ»¸ö¿ÕÈ±Ò³Ãæ£¬£¬£¬£¬Ô¼3000ÍòÓû§Êܵ½Ó°Ïì¡£¡£¡£¡£Æ¾Ö¤TierraNetµÄ˵·¨£¬£¬£¬£¬Æä¶à´ÎÊÕµ½¹ØÓÚʹÓÃZohoÓʼþЧÀÍ·¢ËÍ´¹ÂÚÓʼþµÄͶËߣ¬£¬£¬£¬µ«ÔÚÊý´ÎÓëZohoÏàͬºó¸ÃÎÊÌâûÓлñµÃ½â¾ö£¬£¬£¬£¬×îÖÕÒ»Ì××Ô¶¯»¯ÏµÍ³µ¼ÖÂÁË´ËÊÂÎñµÄ±¬·¢¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/domain-registrar-oversteps-taking-down-zoho-domain-impacts-over-30mil-users/
ÉùÃ÷£º±¾×ÊѶÓÉ¿Ðý¹ú¼ÊÓÎϷάËûÃüÇ徲С×é·ÒëºÍÕûÀí