1¡¢VxWorksÐÞ¸´11¸öÇå¾²Îó²î£¬£¬£¬Ó°ÏìÁè¼Ý20ÒŲ́װ±¸
ArmisÑо¿Ö°Ô±ÔÚVxWorks RTOSÖз¢Ã÷11¸öÇå¾²Îó²î£¬£¬£¬ÕâЩÎó²îÓ°ÏìÁ˺½¿Õº½Ìì¡¢¹ú·À¡¢¹¤Òµ¡¢Ò½ÁÆ¡¢Æû³µ¡¢ÏûºÄµç×ÓµÈÁìÓòµÄ20¶àÒŲ́װ±¸¡£¡£¡£ÕâЩÎó²î±»Í³³ÆÎªURGENT/11£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÈÆ¹ý¹Å°åµÄÇå¾²½â¾ö¼Æ»®²¢ÍêÈ«¿ØÖÆÊÜÓ°ÏìµÄ×°±¸»òÀàËÆÓÀºãÖ®À¶Ò»Ñùµ¼Ö´ó¹æÄ£µÄ×°±¸ÖÐÖ¹£¬£¬£¬²¢ÇÒÎÞÐèÓû§½»»¥¡£¡£¡£ÕâЩÎó²î±£´æÓÚVxWorks 6.5Ö®ºóµÄTCP/IPÐÒéÕ»ÖУ¬£¬£¬Ó°ÏìÁËÒÑÍù13ÄêÀ´Ðû²¼µÄËùÓÐVxWorks°æ±¾¡£¡£¡£¸Ã¹«Ë¾ÒѾÔÚÉϸöÔÂÐû²¼ÁËÐÞ¸´²¹¶¡£¬£¬£¬µ«ÕâЩ²¹¶¡Í¨¹ý×°±¸³§É̵ִïÏûºÄÕß¿ÉÄÜ»¹ÐèÒªÒ»¶¨µÄʱ¼ä¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html
2¡¢¹È¸èÑо¿Ö°Ô±Åû¶iOSÖеÄ4¸öRCEÎó²î¼°ÆäPoC
¹È¸èÑо¿Ö°Ô±Åû¶iOSÖеÄ4¸öÎó²îµÄÏêϸÐÅÏ¢ºÍPoC£¬£¬£¬ÕâЩÎó²î¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýiMessage·¢ËͶñÒâÐÂÎÅÀ´¹¥»÷Ä¿µÄiOS×°±¸¡£¡£¡£Îó²îÀàÐͰüÀ¨use-after-free£¨CVE-2019-8647ºÍCVE-2019-8662£©¡¢ÄÚ´æË𻵣¨CVE-2019-8660£©ÒÔ¼°Ô½½ç¶Á£¨CVE-2019-8646£©£¬£¬£¬ËùÓÐÎó²î¶¼ÎÞÐèÓû§½»»¥£¬£¬£¬²¢Çҿɵ¼ÖÂRCE»òÔ¶³ÌÎļþ¶ÁÈ¡¡£¡£¡£±ðµÄ£¬£¬£¬Ñо¿Ö°Ô±»¹Åû¶ÁËwatchOSÖеÄÔ½½ç¶ÁÎó²î£¨CVE-2019-8624£©µÄPoC¡£¡£¡£ËùÓÐÎó²î¶¼ÒÑÔÚÆ»¹û±¾ÔÂÐû²¼µÄ¸üÐÂÖÐÐÞ¸´¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/apple-ios-vulnerabilities.html
3¡¢µç×ÓÉÌÎñƽ̨OXIDÐÞ¸´¿Éµ¼ÖÂÍøÕ¾±»½ÓÊܵÄÎó²î
µç×ÓÉÌÎñƽ̨OXIDÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß½ÓÊÜÍøÕ¾µÄÎó²î¡£¡£¡£OXIDÊǵ¹úµÄÒ»¸öÊ¢ÐеçÉ̽â¾ö¼Æ»®£¬£¬£¬°üÀ¨Ã·ÈüµÂ˹µÈ×ÅÃûÆ·ÅÆ¶¼ÔÚʹÓÃËü£¬£¬£¬ÆäÏÂÔØÁ¿Áè¼Ý50Íò´Î¡£¡£¡£¸ÃÎó²î£¨CVE-2019-13026£©ÊÇSQL×¢ÈëÎó²îºÍPHP¹¤¾ß×¢ÈëÎó²îµÄÁ¬Ïµ£¬£¬£¬×îÖտɵ¼ÖÂRCE¡£¡£¡£OXID eShop°æ±¾6.0.0µ½6.0.4¡¢6.1.0µ½6.1.3¾ùÊÜÓ°Ï죬£¬£¬½¨ÒéÖÎÀíÔ±¸üÐÂÖÁ°æ±¾6.0.5ºÍ6.1.4¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/oxid-eshop-used-by-mercedes-fixes-remote-takeover-security-bug/
4¡¢ÂåÉ¼í¶¾¯¾Öй¶2500Ãû¾¯Ô±¼°1.75ÍòÉêÇëÈ˵ÄÒþ˽ÐÅÏ¢
¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬ÂåÉ¼í¶¾¯¾Ö£¨LAPD£©ÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬µ¼ÖÂ2500Ãû¾¯Ô±ºÍÔ¼1.75ÍòÃû¾¯Ô±ÉêÇëÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢ÆØ¹â¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂëÒÔ¼°³öÉúÈÕÆÚ¡£¡£¡£LAPDÒѾ֤ʵÁËÕâÒ»ÊÂÎñ£¬£¬£¬²¢ÌåÏÖÕýÔÚÈ·¶¨ÊÂÎñÓ°ÏìµÄ¹æÄ£ÒÔ¼°Í¨ÖªÊÜÓ°ÏìµÄСÎÒ˽¼Ò¡£¡£¡£Êг¤Eric GarcettiÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ¸ÃÊÂÎñÓëÈËʲ¿·Ö²»ÔÙʹÓõÄÒ»¸ö¾ÉÊý¾Ý¿âÓйء£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/lapd-data-breach-exposes-personal-info-of-roughly-25k-officers/
5¡¢×ôÖÎÑÇÖÝѲÂß»ú¹¹ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÓʼþϵͳÒṈ̃»¾
ƾ֤ÍâµØÐÂÎÅ»ú¹¹WHNT±¨µÀ£¬£¬£¬7ÔÂ26ÈÕ×ôÖÎÑÇÖÝѲÂß¶Ó£¨GSP£©Ôâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¸Ã²¿·ÖÒѹرÕÁËЧÀÍÆ÷ºÍÍøÂç×÷ΪԤ·À²½·¥¡£¡£¡£GSPÊÇ×ôÖÎÑÇÖݹ«¹²Çå¾²²¿µÄÒ»¸ö²¿·Ö£¬£¬£¬Ò»ÃûÖ°Ô±ÔÚÆäÅÌËã»úÉϵ¯³öÒ»ÌõÏ£ÆæµÄ֪ͨºó±¨¸æÁËÕâÒ»ÎÊÌâ¡£¡£¡£GSPÒÑÈ·ÈϸÃÊÂÎñ¿ÉÄÜ»áÂÔ΢ӰÏìÆäÏìӦʱ¼ä£¬£¬£¬µ«²¿·Ö³ÉÔ±ÈÔÓÐÆäËüͨѶÇþµÀ£¬£¬£¬ÀýÈçÎÞÏßµçµ÷Àí¡£¡£¡£¸Ã²¿·Ö²¢Î´×èÖ¹ÔËÓª¡£¡£¡£×èÖ¹ÖÜÒ»£¬£¬£¬¹¥»÷Õß²¢Î´Ìá³öÈκÎÊê½ðÒªÇ󡣡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.scmagazine.com/home/security-news/ransomware/georgia-state-patrol-agency-infected-with-ransomware/
6¡¢ÐÂAndroidÀÕË÷Èí¼þFileCoder£¬£¬£¬Ö÷Ҫͨ¹ýÀ¬»ø¶ÌÐÅÈö²¥
ESETÑо¿ÍŶӷ¢Ã÷ÐÂAndroidÀÕË÷Èí¼þAndroid/Filecoder.C¡£¡£¡£¸ÃÀÕË÷Èí¼þÔÚ7ÔÂ12ÈÕ±»Ê״η¢Ã÷£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚRedditºÍXDA DevelopersÉçÇøÉÏÐû²¼Ìû×ÓÀ´·Ö·¢payload¡£¡£¡£ÔÚѬȾװ±¸ºó£¬£¬£¬Filecoder.C»áÏòÓû§µÄÁªÏµÈËÁÐ±í·¢ËͰüÀ¨¶ñÒâÁ´½ÓµÄ¶ÌÐÅÒÔ¾ÙÐÐÈö²¥¡£¡£¡£¸ÃÀÕË÷Èí¼þÒªÇóµÄÊê½ðΪ94ÖÁ188ÃÀÔªÖ®¼ä¡£¡£¡£ÓÉÓÚ¸ÃÀÕË÷Èí¼þÔÚ´úÂëÖÐÓ²±àÂëÁ˼ÓÃÜ˽ԿµÄÖµ£¬£¬£¬Òò´ËÊܺ¦ÕßÎÞÐèÖ§¸¶Êê½ðÒ²¿É½âÃÜÊý¾Ý¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-android-ransomware-uses-sms-spam-to-infect-its-victims/