2020-10-20

Ðû²¼Ê±¼ä 2020-10-21

ÐÂÔöÊÂÎñ


ÊÂÎñÃû³Æ£º

HTTP_Çå¾²Îó²î_MidaSolutionseFramework_ajaxreq.phpÏÂÁî×¢ÈëÎó²î

[CVE-2020-15920][CNNVD-202007-1517]

Çå¾²ÀàÐÍ£º

Çå¾²Îó²î

ÊÂÎñÐÎò£º

Mida SolutionsÊÇÒ»¼ÒרעÓÚͳһͨѶ(UC)µÄ¸ßÊÖÒÕÒâ´óÀû¹«Ë¾,MidaÍŶÓÒѳÉΪͳһЭ×÷ºÍרҵÏàͬµÄÈ«ÇòÏòµ¼Õß,ÏÕЩËùÓÐÐÐÒµµÄ·þÎñÌṩÉÌ£¬ÏµÍ³¼¯³ÉÉÌ¡£ÆäÏàÖúͬ°éÓÐ΢Èí,˼¿Æ,»ÝÆÕ,ÖйúµçÐŵÈ40¸öÌìÏÂ×ÅÃûÆóÒµ¡£Mida eFrameworkÊÇMida Solutions¹«Ë¾ÆìÏÂÊÓƵºÍÓïÒôÓ¦ÓóÌÐòµÄÍêÕû·þÎñÌ×¼þ£¬ÓëÏÕЩËùÓÐÖ÷ÒªµÄUCƽ̨¼æÈÝ¡£¸ÃÌ×¼þ°üÀ¨»°ÎñÔ±¿ØÖÆ̨£¬¼Í¼Æ÷£¬´«Õæ·þÎñÆ÷£¬¼Æ·Ñ£¬ÐÐÁÐÖÎÀíÆ÷£¬×Ô¶¯»°ÎñÔ±£¬Òƶ¯Ó¦ÓóÌÐò£¬µç»°·þÎñ¡£

¸üÐÂʱ¼ä£º

20201020


ÊÂÎñÃû³Æ£º

TCP_Java·´ÐòÁл¯_MozillaRhino1_ʹÓÃÁ´¹¥»÷

Çå¾²ÀàÐÍ£º

Çå¾²Îó²î

ÊÂÎñÐÎò£º

¼ì²âµ½Ô´IPÖ÷»úÕýÔÚʹÓÃMozillaRhino1µÄJava·´ÐòÁл¯Ê¹ÓÃÁ´¶ÔÄ¿µÄÖ÷»ú¾ÙÐй¥»÷µÄÐÐΪ. rhinoÊÇʹÓÃjava´úÂëʵÏÖµÄjavascriptÚ¹ÊÍÆ÷£¬ËüʵÏÖÁËjavascriptµÄ½¹µã£¬ÇкÏEcma-262±ê×¼£¬Ö§³Öjavascript±ê×¼µÄËùÓÐÌØÕ÷¡£

¸üÐÂʱ¼ä£º

20201020


ÊÂÎñÃû³Æ£º

HTTP_JBossMQ_JMS_·´ÐòÁл¯Îó²î[CVE-2017-7504][CNNVD-201705-937]

Çå¾²ÀàÐÍ£º

ÍøÂçͨѶ

ÊÂÎñÐÎò£º

Red Hat JBoss Application Server ÊÇÒ»¿î»ùÓÚJavaEEµÄ¿ªÔ´Ó¦Ó÷þÎñÆ÷¡£JBoss AS 4.x¼°Ö®Ç°°æ±¾ÖУ¬JbossMQʵÏÖÀú³ÌµÄJMS over HTTP Invocation LayerµÄHTTPServerILServlet.javaÎļþ±£´æ·´ÐòÁл¯Îó²î£¬Ô¶³Ì¹¥»÷Õ߿ɽèÖúÌØÖƵÄÐòÁл¯Êý¾ÝʹÓøÃÎó²îÖ´ÐÐí§Òâ´úÂë¡£

¸üÐÂʱ¼ä£º

20201020


ÊÂÎñÃû³Æ£º

TCP_ͨÓÃ_JavaRMI·´ÐòÁл¯_Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î

Çå¾²ÀàÐÍ£º

Çå¾²Îó²î

ÊÂÎñÐÎò£º

¼ì²âµ½Ô´IPʹÓÃJavaRMI·´ÐòÁл¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î¾ÙÐй¥»÷µÄÐÐΪ£¬JavaRMI·´ÐòÁл¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î¾ÙÐй¥»÷µÄÐÐΪÔÊÐíÔ¶³Ì¹¥»÷ÕßÖ´ÐÐí§ÒâÏÂÁî¡£

¸üÐÂʱ¼ä£º

20201020


ÐÞ¸ÄÊÂÎñ


ÊÂÎñÃû³Æ£º

TCP_RDPÔ¶³Ì×ÀÃæµÇ¼_»á»°ÅþÁ¬

Çå¾²ÀàÐÍ£º

Çå¾²Éó¼Æ

ÊÂÎñÐÎò£º

¼ì²âµ½Ô´IPµØµãÖ÷»úÕýÔÚÏòÄ¿µÄIPµØµãÖ÷»úÔ¶³Ì×ÀÃæµÇ¼¿ÚÁî²Â½âµÄÐÐΪ¡£

      Ô¶³Ì×ÀÃæÅþÁ¬×é¼þÊÇ´ÓWindows 2000 Server×îÏÈÓÉ΢Èí¹«Ë¾ÌṩµÄ£¬ÔÚWINDOWS 2000 SERVERÖÐËû²»ÊÇĬÈÏ×°ÖõÄ¡£¸Ã×é¼þÒ»¾­ÍƳöÊܵ½ÁËÐí¶àÓû§µÄÓµ»¤ºÍϲ»¶£¬ÒÔÊÇÔÚWINDOWS     WINDOWS2003¿ªÆôÒªÁìºÍXPÀàËÆ£¬Í¬Ñù¶Ô²Ù×÷°ì·¨¾ÙÐÐÁ˼ò»¯¡£ÒªÁìÈçÏ£º

µÚÒ»²½£ºÔÚ×ÀÃæ¡°ÎҵĵçÄÔ¡±ÉϵãÊó±êÓÒ¼ü£¬Ñ¡Ôñ¡°ÊôÐÔ¡±¡£XPºÍ2003ÖÐ΢Èí¹«Ë¾½«¸Ã×é¼þµÄÆôÓÃÒªÁì¾ÙÐÐÁËˢУ¬ÎÒÃÇͨ¹ý¼òÆӵĹ´Ñ¡¾Í¿ÉÒÔÍê³ÉÔÚXPºÍ2003ÏÂÔ¶³Ì×ÀÃæÅþÁ¬¹¦Ð§µÄ¿ªÆô¡£ÈôÊÇÄ¿µÄÖ÷»ú¿ªÆôÁËÔ¶³ÌÖն˷þÎñ£¬Ä¬È϶˿ÚÊÇ3389£¬¹¥»÷Õßͨ¹ý¶à´ÎʵÑéÓû§ÃûºÍÃÜÂëµÄ·½·¨À´²Â½âÓû§¿ÚÁÈôÊDZ»ÁÏÖй¥»÷Õ߾ͿÉÒÔ»ñÊÊÄ¿½ñÓû§µÄËùÓÐȨÏÞ£¬½ø¶øÓÐÓпÉÄÜ»ñµÃÖÎÀíԱȨÏÞ¡£

µÚ¶þ²½£ºÔÚµ¯³öµÄϵͳÊôÐÔ´°¿ÚÖÐÑ¡Ôñ¡°Ô¶³Ì¡±±êÇ©¡£

µÚÈý²½£ºÔÚÔ¶³Ì±êÇ©ÖÐÕÒµ½¡°Ô¶³Ì×ÀÃ桱£¬ÔÚ¡°ÔÊÐíÓû§ÅþÁ¬µ½Õą̂ÅÌËã»ú¡±Ç°¶Ô¹´È¥µôºóÈ·¶¨¼´¿ÉÍê³ÉÔ¶³Ì×ÀÃæÅþÁ¬¹¦Ð§µÄ¹Ø±Õ¡£

¸üÐÂʱ¼ä£º

20201020


ÊÂÎñÃû³Æ£º

TCP_Oracle_WebLogic_·´ÐòÁл¯Îó²î[CVE-2016-3510]

Çå¾²ÀàÐÍ£º

Çå¾²Îó²î

ÊÂÎñÐÎò£º

¼ì²âµ½Ô´IPÖ÷»úÕýÔÚʹÓÃOracle WebLogic·´ÐòÁл¯Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¬ÊÔͼͨ¹ý´«ÈëÈ«ÐĽṹµÄ¶ñÒâ´úÂë»òÏÂÁîÀ´ÈëÇÖÄ¿µÄIPÖ÷»ú¡£

¸üÐÂʱ¼ä£º

20201013