ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ4ÖÜ
Ðû²¼Ê±¼ä 2019-01-28±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇƾ¾ÝGDPRÌõÀý£¬·¨¹úÊý¾Ý¼à¹Ü»ú¹¹¶ÔGoogle·£¿î5000ÍòÅ·Ôª;Linux±£Ö¤ÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´ÐЩ¶´;ÃÀ¹ú¶à¼Ò¶ÄÇ®Íøվй¶1.08ÒÚ¶ÄÇ®ÐÅÏ¢£¬°üÂÞÓû§Ö§¸¶Êý¾Ý;Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯£¬ÒÑѬȾԼ100ÍòÓû§;PHP±£Ö¤ÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬°²×°Îļþ±»ÎÛȾ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
ÖØÒªÄþ¾²Â©¶´Áбí
Schneider Electric IIoT MonitorʹÓÃÁËÓ²±àÂëÃÜÔ¿£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÑé֤δÊÚȨ·ÃÎÊ¡£
http://www.schneider-electric.com/sites/corporate/en/support/
2. Adobe AcrobatºÍReader CVE-2018-19722»º³åÇøÒç³ö©¶´
Adobe AcrobatºÍReader´¦ÖÃÄڴ湤¾ß´æÔÚÔ½½ç¶Á©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇ󣬿ɽøÐоܾø·þÎñ¹¥»÷»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://helpx.adobe.com/security/products/acrobat/apsb18-30.html
3. Advantech WebAccess/SCADA SQL×¢È멶´
Advantech WebAccess/SCADA´æÔÚSQL×¢È멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄSQLÇëÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://support.advantech.com/support/DownloadSRDetail_New.aspx?SR_ID=1-MS9MJV&Doc_Source=Download
4. Cisco Small Business RV320ºÍRV325 CVE-2019-1652ÃüÁî×¢È멶´
Cisco Small Business RV320ºÍRV325´¦ÖÃHTTP POSTÇëÇ󩶴£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-rv-inject
5. PLC Wireless Router GPN2.4P21-C-CNÎÞÏßÃÜÂë·ÃÎÊ©¶´
PLC Wireless Router GPN2.4P21-C-CN cgi-bin/webproc?getpage=html/index.html subpage=wlsecurity URI´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬸ü¸ÄÎÞÏßÄþ¾²ÃÜÂë¡£
https://packetstormsecurity.com/files/151274/PLC-Wireless-Router-GPN2.4P21-C-CN-Incorrect-Access-Control.html
ÖØÒªÄþ¾²Ê¼þ×ÛÊö

ƾ¾ÝÅ·ÃËÓÚ2018Äê5ÔÂÉúЧµÄGDPRÌõÀý£¬·¨¹úÊý¾Ý±£»¤¼à¹Ü»ú¹¹CNIL¶ÔGoogle·¢³öÁË5000ÍòÅ·Ôª£¨Ô¼ºÏ5700ÍòÃÀÔª£©µÄ·£µ¥¡£CNIL³ÆÕâ±Ê·£¿îµÄÔÒòÊÇGoogle¹«Ë¾¡°È±·¦Í¸Ã÷¶È¡¢ÐÅÏ¢²î³Ø³ÆÒÔ¼°ÔÚ¸öÐÔ»¯¹ã¸æ·½ÃæûÓлñµÃÓû§µÄÓÐЧͬÒ⡱¡£ÕâÊÇCNILÒÀ¾ÝGDPR¿ª³öµÄÊ×ÕÅ·£µ¥¡£Google»ØÓ¦³Æ¡°ÎÒÃǷdz£ÖÂÁ¦ÓÚÂú×ãÈËÃǶÔÊý¾Ý͸Ã÷¶ÈµÄÆÚÍûºÍGDPRµÄÒªÇó£¬ÎÒÃÇÕýÔÚÑо¿¾ö¶¨ÎÒÃǽÓÏÂÀ´µÄ²½Ö衱¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/google-privacy-gdpr-fine.html
2¡¢Linux±£Ö¤ÀíÆ÷apt/apt-getÔ¶³Ì´úÂëÖ´ÐЩ¶´
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/linux-apt-http-hacking.html
3¡¢ÃÀ¹ú¶à¼Ò¶ÄÇ®Íøվй¶1.08ÒÚ¶ÄÇ®ÐÅÏ¢£¬°üÂÞÓû§Ö§¸¶Êý¾Ý
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/online-casino-group-leaks-information-on-108-million-bets-including-user-details/
4¡¢Õë¶ÔMacÓû§µÄ´ó¹æÄ£¶ñÒâ¹ã¸æ»î¶¯£¬ÒÑѬȾԼ100ÍòÓû§
ÔÎÄÁ´½Ó£º
https://threatpost.com/malware-in-ad-based-images-targets-mac-users/141115/
5¡¢PHP±£Ö¤ÀíÆ÷PEAR¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬°²×°Îļþ±»ÎÛȾ
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/01/php-pear-hacked.html
ÉùÃ÷£º±¾×ÊѶÓɶ«Éƽ̨άËûÃüÄþ¾²Ð¡×é·ÒëºÍÕûÀí