Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵصãÀ¸ÓÕÆÎó²î£»£»Oracle 10ÔÂÇå¾²¸üÐÂÐÞ¸´402¸öÎó²î
Ðû²¼Ê±¼ä 2020-10-221.Rapid7Åû¶10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵصãÀ¸ÓÕÆÎó²î

ÍøÂçÇå¾²¹«Ë¾Rapid7Åû¶ÁË10¸öÕë¶ÔÆß¿îä¯ÀÀÆ÷Ó¦ÓõĵصãÀ¸ÓÕÆÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÅû¶µÄÎó²î»®·ÖΪUCä¯ÀÀÆ÷ÖеÄCVE-2020-7363ºÍCVE-2020-7364¡¢Opera MiniºÍOpera TouchÖеÄCVE TBD-Opera¡¢Yandexä¯ÀÀÆ÷ÖеÄCVE-2020-7369¡¢Boltä¯ÀÀÆ÷ÖеÄCVE-2020-7370¡¢RITSä¯ÀÀÆ÷ÖеÄCVE-2020-7371ºÍApple SafariÖеÄCVE-2020-9987¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâÓÚ½ñÄêÄêÍ·±»·¢Ã÷£¬£¬£¬²¢ÓÚ8Ô±¨¸æ¸øÖÆÔìÉÌ£¬£¬£¬ÏÖÔÚ´óÐͳ§ÉÌÁ¬Ã¦¾ÙÐÐÁËÐÞ¸´£¬£¬£¬¶øÐ¡Ðͳ§ÉÌÈÔÎÞÈËÆÊÎö¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/seven-mobile-browsers-vulnerable-to-address-bar-spoofing-attacks/
2.Group-IB³Æ£¬£¬£¬¶íÂÞ˹¾ü¹¤ÆóÒµÔø¶à´ÎÔâµ½³¯Ïʺڿ͹¥»÷

¾Ý±¨µÀ£¬£¬£¬³¯ÏʺڿÍ×éÖ¯KimsukyÒѶԶíÂÞ˹¾ü¹¤ÆóÒµ¾ÙÐÐÁ˶à´Î¹¥»÷£¬£¬£¬ÒÔ»ñÈ¡¶íÂÞ˹µÄ¾üʺÍÊÖÒÕÉñÃØ¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍøÂçÇå¾²¹«Ë¾Group-IBÊý¾Ý£¬£¬£¬³¯ÏʺڿÍÓÚ2020Äê´º¼¾¶Ô¶íÂÞ˹¹ú·À»ú¹¹¾ÙÐÐÁ˹¥»÷£¬£¬£¬ÊÔͼ´ÓÆäº½¿Õº½Ìì¡¢¹ú·À»ú¹¹ÒÔ¼°Éú²ú»ðÅÚ×°±¸µÄ¹«Ë¾»ñÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£µçÐÅÆµµÀSecAtor±¨¸æ³Æ£¬£¬£¬RostecÒ²ÔøÔâµ½¹ý¹¥»÷¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬RostecµÄ×Ó¹«Ë¾RT-Inform»¹Ö¸³ö£¬£¬£¬´Ó4Ôµ½9ÔÂÕë¶Ô¹úÓÐÆóÒµµÄÍøÂç¹¥»÷ÊýÄ¿ÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/10/russian-military-companies-were.html
3.ÃÉÌØÀû¶û¹«½»ÏµÍ³ÔâRansomExx¹¥»÷£¬£¬£¬ÔÚÏßϵͳÊܵ½Ó°Ïì

10ÔÂ19ÈÕ£¬£¬£¬ÃÉÌØÀû¶ûµÄSTM¹«¹²½»Í¨ÏµÍ³Ôâµ½RansomExxÀÕË÷Èí¼þ¹¥£¬£¬£¬ÆäITϵͳ¡¢ÍøÕ¾ºÍ¿Í»§Ö§³ÖÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£ËäÈ»´Ë´ÎÖÐÖ¹²¢Ã»ÓÐÓ°Ïìµ½¹«¹²Æû³µ»òµØÌúϵͳµÄÔËÐУ¬£¬£¬µ«ÓÉÓÚSTMʹÓõÄÊÇÔÚÏßϵͳ£¬£¬£¬ÒÀÀµSTM°¤¼Ò°¤»§¸¨ÖúЧÀ͵IJм²ÈËÊܵ½ÁËÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚSTMÍøÕ¾ÈÔÈ»´¦ÓÚ̱»¾×´Ì¬£¬£¬£¬»á¼ûÕß»á±»ÖØ¶¨Ïòµ½Ðû²¼ÁËÓйع«¹²½»Í¨Ð§Àͺ͹¥»÷ÐÅÏ¢µÄwww.lastm.infoÍøÕ¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/montreals-stm-public-transport-system-hit-by-ransomware-attack/
4.OracleÐû²¼10Ô²¹¶¡¸üУ¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖÐ402¸öÎó²î

OracleÐû²¼2020Äê10ÔÂÇå¾²¸üУ¬£¬£¬ÐÞ¸´Á˶à¿î²úÆ·ÖÐ402¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪ´óÊý¾ÝÊôÐÔͼÆÊÎöÖеÄÎó²î£¨CVE-2019-0192£©¡¢Oracle RESTÊý¾ÝЧÀÍÖÐÎó²î£¨CVE-2017-7658£©¡¢Oracle TimesTenÄÚ´æÊý¾Ý¿âÖÐÎó²î£¨CVE-2018-11058ºÍCVE-2017-5645£©¡¢OracleͨѶӦÓóÌÐòÖÐÎó²î£¨CVE-2019-10173¡¢CVE-2020-10683ºÍCVE-2019-10173£©ºÍOracleͨѶÖÐÎó²î£¨CVE-2020-10683¡¢CVE-2020-11973¡¢CVE-2020-2555¡¢ºÍCVE-2020-10683£©µÈÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.oracle.com/security-alerts/cpuoct2020.html
5.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ20¸öÎó²î

AdobeÐû²¼Çå¾²¸üУ¬£¬£¬×ܼÆÐÞ¸´ÁË20¸öÎó²î£¬£¬£¬ÆäÖаüÀ¨18¸ö¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÎó²î¡¢1¸öÌáȨÎó²îºÍ1¸öXSSÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÈí¼þ²úÆ·°üÀ¨Adobe Creative Cloud×ÀÃæÓ¦ÓóÌÐò¡¢Adobe InDesign¡¢Adobe Media Encoder¡¢Adobe Premiere Pro¡¢Adobe Photoshop¡¢Adobe After Effects¡¢Adobe Animate¡¢Adobe Dreamweaver¡¢Adobe IllustratorºÍMarketo¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-18-critical-bugs-affecting-its-windows-macos-apps/
6.Nefilimй¶LuxotticaÈËʺͲÆÎñ²¿·ÖÃô¸ÐÊý¾Ý

ÀÕË÷Èí¼þ×éÖ¯Nefilimй¶Òâ´óÀûÑÛ¾µ¹«Ë¾LuxotticaÈËʺͲÆÎñ²¿·ÖµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£Luxottica Group SpAÊÇÒ»¼ÒÈ«Çò×î´óµÄÑÛ¾µ¹«Ë¾£¬£¬£¬ÓÚ9ÔÂ18ÈÕÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬µ¼Ö¸ù«Ë¾µÄÄ³Ð©ÍøÕ¾Ì±»¾¡£¡£¡£¡£¡£¡£Çå¾²¹«Ë¾Bad packetÍÆ²âÊÇÓÉÓڸù«Ë¾Ê¹ÓÃÁËCitrixµÄADX¿ØÖÆÆ÷×°±¸Ê¹ÆäÒ×Êܵ½CVE-2019-19781Îó²î¹¥»÷¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Odysseus·¢Ã÷Nefilim¹ûÕæÁË´ó×ÚÓë¸Ã¹«Ë¾ÈËʺͲÆÎñ²¿·ÖÓйصÄÎļþ£¬£¬£¬°üÀ¨ÕÐÆ¸Á÷³Ì¡¢×¨Òµ¼òÀú¡¢¼¯ÍÅÈËÁ¦×ÊÔ´²¿·ÖÄÚ²¿½á¹¹¡¢²ÆÎñÔ¤Ëã¡¢Êг¡Õ¹ÍûÆÊÎöºÍÆäËûÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/109778/data-breach/luxottica-data-leak-ransomware.html


¾©¹«Íø°²±¸11010802024551ºÅ