MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÌáȨÎó²î£»£»£»£»£»Concrete5 CMS±£´æRCEÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ
Ðû²¼Ê±¼ä 2020-08-201.MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´ÌáȨÎó²î

MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2Ðû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬£¬Ö¼ÔÚÐÞ¸´ÌáȨÎó²î£¬£¬£¬£¬¸ÃÎó²î»áÓ°ÏìWindowsÔ¶³Ì»á¼ûЧÀÍ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÁ½¸öÎó²î±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬£¬£¬£¬¹¥»÷ÕßÔÚÀÖ³ÉʹÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇÔÚʹÓÃÕâЩÎó²î֮ǰ£¬£¬£¬£¬¹¥»÷ÕßÐèÒªÏÈÔÚÊܺ¦ÕßµÄ×°±¸ÉϱàдִÐÐÌØÈ¨´úÂë¡£¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦Öóͷ£ÄÚ´æºÍÎļþ²Ù×÷µÄ·½·¨À´½â¾öÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/
2.Concrete5 CMS±£´æRCEÎó²î£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»½ÓÊÜ

EdgescanµÄÑо¿Ö°Ô±Åû¶ÁËConcrete5 CMSÖеĵÄÔ¶³ÌÖ´ÐдúÂ루RCE£©Îó²î£¬£¬£¬£¬¿Éµ¼ÖÂЧÀÍÆ÷±»ÍêÈ«½ÓÊÜ£¬£¬£¬£¬Ó°ÏìÁËConcrete5°æ±¾8.5.2¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓôËÎó²îʱ£¬£¬£¬£¬ÐèÒªÓÐÊʵ±µÄȨÏÞ£¨ÖÎÀíÔ±½ÇÉ«£©²Å»ª»á¼ûÔÊÐíÎļþÀàÐ͹¦Ð§£¬£¬£¬£¬ÒÔ½«PHPÎļþÀàÐͰüÀ¨ÔÚÔÊÐíµÄÀ©Õ¹ÃûÁбíÖС£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬¹¥»÷Õß½«ÉÏÔØPHP shellÒÔ»á¼ûЧÀÍÆ÷ϵͳ²¢»ñµÃЧÀÍÆ÷»òϵͳµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÏÖÔÚÒÑÔÚConcrete5°æ±¾8.5.4ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/107294/security/concrete5-cms-rce.html
3.ºÚ¿ÍʹÓÃMailtoÁ´½Ó¹¥»÷Óʼþ¿Í»§¶Ë£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÍâµØÎļþ

µÂ¹úÑо¿Ö°Ô±·¢Ã÷ºÚ¿ÍʹÓÃMailtoÁ´½Ó¹¥»÷Óʼþ¿Í»§¶Ë£¬£¬£¬£¬ÀýÈçGNOME Evolution¡¢KDE KMail¡¢IBM / HCL NotesºÍ¾É°æ±¾µÄThunderbird£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡ÍâµØÎļþ¡£¡£¡£¡£¡£¡£¡£Mailto ÊÇÒ»ÖÖÌØÊâÀàÐ͵ÄÁ´½Ó£¬£¬£¬£¬ÔÚµã»÷ÕâЩÁ´½Óʱ»á·¿ªÒ»¸öеĵç×ÓÓʼþ׫д»ò»Ø¸´´°¿Ú¶ø²»ÊÇÒ»¸öеÄÍøÒ³¡£¡£¡£¡£¡£¡£¡£Ê¹ÓÃÕâÖÖ¹¥»÷£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔ´ÓÓû§ÏµÍ³ÇÔÈ¡Ãô¸ÐÎļþ£¬£¬£¬£¬ÀýÈç¼ÓÃÜ£¨PGP£©ÃÜÔ¿¡¢SSHÃÜÔ¿¡¢ÉèÖÃÎļþ¡¢¼ÓÃÜÇ®±ÒÇ®°üÎļþ¡¢ÃÜÂë´æ´¢»òÖ÷ÒªµÄÓªÒµÎĵµ£¬£¬£¬£¬Ö»ÒªËüÃÇ´æ´¢ÔÚ¹¥»÷ÕßÒÑÖªµÄÎļþ·¾¶ÖС£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/some-email-clients-are-vulnerable-to-attacks-via-mailto-links/
4.IcedIDÉý¼¶»Ø¹é£¬£¬£¬£¬Ê¹ÓÃÒªº¦×Ö»ìÏýµÈÕ½ÂÔÌӱܼì²â

Õ°²©ÍøÂçÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬ºÚ¿ÍÔÚ×î½üµÄÍøÂç´¹ÂڻÖÐʹÓÃÁËÉý¼¶µÄÒøÐÐľÂí³ÌÐòIcedID£¬£¬£¬£¬´Ó¶øÊµÏÖÁ˶àÏîй¦Ð§£¬£¬£¬£¬°üÀ¨ÊÜÃÜÂë±£»£»£»£»£»¤µÄ¸½¼þ¡¢Òªº¦×Ö»ìÏýºÍ×îµÍÏ޶ȵĺê´úÂë¡£¡£¡£¡£¡£¡£¡£IcedIDбäÌåÊÇͨ¹ý±»ÈëÇֵįóÒµÕÊ»§·Ö·¢£¬£¬£¬£¬²¢ÓÃÒªº¦×Ö»ìÏýµÄ·½·¨ÌÓ¹ý´¹ÂÚÓʼþ¹ýÂËÆ÷µÄ¼ì²â¡£¡£¡£¡£¡£¡£¡£È»ºóÌí¼Ó´øÓÐÃÜÂëµÄ¸½¼þ£¬£¬£¬£¬²¢Éù³ÆÃÜÂëÔÚÓʼþÕýÎÄÖÐÒÔÓÕʹÊܺ¦Õß·¿ªÎļþ¡£¡£¡£¡£¡£¡£¡£ÎļþÖаüÀ¨ÓкêWordÎĵµ£¬£¬£¬£¬µ±Êܺ¦Õß·¿ªºó±ã»á×°ÖÃľÂí³ÌÐòIcedID¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/icedid-trojan-rebooted-evasive-tactics/158425/
5.Â×¶ØÊý¾ÝÖÐÐÄUPS¹ÊÕÏÖÂЧÀÍÖÐÖ¹£¬£¬£¬£¬¶à¸öISPÔËÓªÉÌÊÜÓ°Ïì

Â×¶Ø»¥ÁªÍøÉúÒâËùÊý¾ÝÖÐÐĵÄUPS±¬·¢¹ÊÕϵ¼ÖÂЧÀÍÖÐÖ¹£¬£¬£¬£¬¶à¸öISPºÍµçÐŹ«Ë¾ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£EquinixÌåÏÖ£¬£¬£¬£¬8ÔÂ18ÈÕÆÆÏþ4µã40·Ö£¬£¬£¬£¬Equinix IBX LD8±¬·¢ÁËÍ£µç²¢·ºÆðÁË»ðÔÖ(ûÓлðÔÖ)£¬£¬£¬£¬µ¼ÖÂEquinixµÄLD8Êý¾ÝÖÐÐĹرա£¡£¡£¡£¡£¡£¡£¾ÊӲ죬£¬£¬£¬¸ÃÊÂÎñÊÇÓÉÒ»¸ö¹ÊÕϵÄUPSϵͳÒýÆðµÄ¡£¡£¡£¡£¡£¡£¡£Õâ´ÎÑÏÖØµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬Ó°ÏìÁËÉϰټÒÖ÷»ú¡¢ÔÆÅÌËãºÍµçÐŲ¿·ÖµÄ¿Í»§£¬£¬£¬£¬°üÀ¨Ó¢¹úµçÐÅ(BT)¡¢Ìì¿Õ¹ã²¥¹«Ë¾(Sky)ºÍάÕäýÌå(Virgin Media)µÈ»¥ÁªÍøÐ§ÀÍÌṩÉÌ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.com/2020/08/18/outage_london_internet_exchange/
6.AI¹«Ë¾Cense¹ûÕæÒò´æ´¢¿âÉèÖùýʧй¶µÄ250ÍòÌõÒ½ÁÆÊý¾Ý

λÓÚŦԼµÄÈ˹¤ÖÇÄܹ«Ë¾Cense¹ûÕæÁË250ÍòÌõ°üÀ¨Ãô¸ÐºÍÉñÃØÊý¾ÝµÄÒ½ÁƼͼ¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶ÁË2594261·ÝÒ½ÁƼͼ£¬£¬£¬£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼Ò¿Éʶ±ðÐÅÏ¢(PII)ºÍÆäËûÃô¸ÐÐÅÏ¢£¬£¬£¬£¬È综ÕßÐÕÃû¡¢°ü¹Ü¼Í¼¡¢Ò½ÁÆÕï¶ÏºÍ¸¶¿îÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Security DiscoveryÊ×´´ÈËJeremiah FowlerÊÓ²ìй¶Ե¹ÊÔÓÉʱ·¢Ã÷£¬£¬£¬£¬ÕâЩ¼Í¼ΪÔÝ´æÊý¾Ý£¬£¬£¬£¬×÷Ϊ´æ´¢¿â£¬£¬£¬£¬ÓÃÓÚÔÚCense Bot»òCenseµÄÖÎÀíϵͳÉϼÓÔØÊý¾Ý֮ǰÔÝʱÉúÑÄÊý¾Ý£¬£¬£¬£¬ÈκÎÈ˶¼¿ÉÒԱ༡¢É¾³ýÉõÖÁÏÂÔØÎļþ£¬£¬£¬£¬¶ø²»ÐèÒªÈκÎÖÎÀíÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/ai-firm-exposes-sensitive-medical-data-online/


¾©¹«Íø°²±¸11010802024551ºÅ