Handala×éÖ¯Éù³Æ¶Ô°¢ÁªÇõ·¢¶¯ÖØ´óÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2026-04-15

1. Handala×éÖ¯Éù³Æ¶Ô°¢ÁªÇõ·¢¶¯ÖØ´óÍøÂç¹¥»÷


4ÔÂ13ÈÕ£¬£¬£¬£¬£¬ £¬ÃûΪHandalaµÄºÚ¿Í×éÖ¯¿ËÈÕÉù³Æ¶Ô°¢ÁªÇõ·¢¶¯ÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬ £¬Ä¿µÄ°üÀ¨µÏ°Ý·¨Ôº²¿·Ö¡¢µÏ°ÝÍÁµØ²¿·ÖºÍµÏ°Ýõè¾¶½»Í¨ÖÎÀí¾Ö¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ðû³ÆÏú»ÙÁË6PBµÄÊý¾Ý£¬£¬£¬£¬£¬ £¬ÇÔÈ¡ÁË149TBµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ £¬²¢½«´Ë´Î¹¥»÷¶¨ÐÔΪ¶ÔµØÇøÕþ¸®µÄÅê»÷ºÍÖÒÑÔ¡£¡£¡£¡£¡£¡£¡£HandalaÔÚÆäTorÍøÕ¾ÉÏÌåÏÖ£º¡°¼øÓÚ°¢ÁªÇõÏòµ¼È˹ûÕæÆðÒå¶Ô¿¹ÖáÐÄ£¬£¬£¬£¬£¬ £¬²¢×÷Ϊ¶Ô¸ÃµØÇøËùÓÐÅѹúÕþ¸®µÄÑÏËàÏÈ·¢ÖÆÈËÖÒÑÔ£¬£¬£¬£¬£¬ £¬ºº´ïÀ­×éÖ¯ÒѶԸùúÒªº¦»ù´¡ÉèÊ©·¢¶¯ÁËÆù½ñΪֹÍþÁ¦×îǿʢµÄÍøÂç¹¥»÷Ö®Ò»¡£¡£¡£¡£¡£¡£¡£ÔÚ´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬ £¬6PBµÄÊý¾ÝÒѱ»³¹µ×Ïú»Ù¡£¡£¡£¡£¡£¡£¡£¡±ÏÖÔÚÕâЩ˵·¨ÉÐδ»ñµÃ×ÔÁ¦Ö¤Êµ¡£¡£¡£¡£¡£¡£¡£HandalaÍâòÉÏÊÇÒ»¸öÖ§³Ö°ÍÀÕ˹̹µÄºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬ £¬µ«ÆÕ±éÒÔΪËüÊÇÒÁÀÊÖ§³ÖµÄVoid ManticoreµÄ»Ï×Ó¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÒÔÍøÂç´¹ÂÚ¡¢Êý¾ÝÇÔÈ¡¡¢ÀÕË÷ºÍÆÆËðÐÔ²Á³ý¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬ £¬Í¬Ê±´ÓÊÂÐÅÏ¢Õ½ºÍÐÄÀíÕ½¡£¡£¡£¡£¡£¡£¡£×ÔÒÁÀʳåÍ»±¬·¢ÒÔÀ´£¬£¬£¬£¬£¬ £¬¸Ã×éÖ¯Ò»Ö±ÒÔÒÔÉ«Áоü·½Ð§ÀÍÆ÷¡¢Ç鱨ְԱºÍ¹«Ë¾ÎªÄ¿µÄ£¬£¬£¬£¬£¬ £¬ÇÔÈ¡»ò²Á³ýÊý¾Ý¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/190716/hacking/iran-linked-group-handala-claims-to-have-breached-three-major-uae-organizations.html


2. KrakenÔâÄÚ²¿ÍþвÀÕË÷£¬£¬£¬£¬£¬ £¬¾Ü¾øÖ§¸¶Êê½ð


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬ £¬¼ÓÃÜÇ®±ÒÉúÒâËùKraken¿ËÈÕÅû¶£¬£¬£¬£¬£¬ £¬Ò»¸öÍøÂç·¸·¨ÍÅ»ïÕýÊÔͼͨ¹ýÍþвÐû²¼ÏÔʾÍйܿͻ§Êý¾ÝµÄÄÚ²¿ÏµÍ³ÊÓÆµÀ´Ú²Æ­¸Ã¹«Ë¾¡£¡£¡£¡£¡£¡£¡£KrakenÊ×ϯÇå¾²¹ÙÄá¿Ë¡¤Åå¶û¿Æ¿ÆÌåÏÖ£¬£¬£¬£¬£¬ £¬¸ÃÊÂÎñ²¢Î´Î£¼°¿Í»§×ʽ𣬣¬£¬£¬£¬ £¬¶øÊÇÉæ¼°ÄÚ²¿Íþв£¬£¬£¬£¬£¬ £¬ÆäÖÐÁ½ÃûÖ§³ÖÖ°Ô±²»µ±»á¼ûÁËÓÐÏ޵Ŀͻ§Êý¾Ý¡£¡£¡£¡£¡£¡£¡£KrakenÃ÷È·ÌåÏÖ²»»áÏòÍþвÐÐΪÕßÖ§¸¶ÈκÎÓöȻò¾ÙÐÐÈκÎ̸ÅС£¡£¡£¡£¡£¡£¡£2025Äê2Ô£¬£¬£¬£¬£¬ £¬KrakenÊÕµ½¡°À´×Ô¿É¿¿ÈªÔ´µÄÏßË÷¡±£¬£¬£¬£¬£¬ £¬³ÆÍøÂç·¸·¨·Ö×ÓÉ¢²¼ÁËÒ»¶ÎÊÓÆµ£¬£¬£¬£¬£¬ £¬ÑÝʾÔõÑù»á¼ûÆä¿Í»§Ö§³Öϵͳ¡£¡£¡£¡£¡£¡£¡£ËæºóÕö¿ªÊӲ죬£¬£¬£¬£¬ £¬·¢Ã÷Ò»ÃûÖ§³ÖÖ°Ô±±»¸ÃÍþвÐÐΪÕßÕÐļ¡£¡£¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬ £¬KrakenÔÙ´ÎÊÕµ½Ïß±¨£¬£¬£¬£¬£¬ £¬³ÆÓÐÒ»¶Î¸üеÄÊÓÆµÏÔʾÓÐÈË¿ÉÒÔ»á¼ûÆäϵͳµÄÄÚ²¿È¨ÏÞ¡£¡£¡£¡£¡£¡£¡£ÔÚÁ½ÆðÊÂÎñÖУ¬£¬£¬£¬£¬ £¬¹«Ë¾¶¼Ñ¸ËÙ×ö³ö·´Ó¦£¬£¬£¬£¬£¬ £¬×÷·ÏÁËÉæÊÂÔ±¹¤µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ £¬Õö¿ªÊӲ첢ÔöÇ¿¹Ü¿Ø²½·¥¡£¡£¡£¡£¡£¡£¡£Èç·¢Ã÷Óû§Êý¾Ýй¶£¬£¬£¬£¬£¬ £¬Kraken»áÖ±½Ó֪ͨÊÜÓ°ÏìµÄÓû§¡£¡£¡£¡£¡£¡£¡£¾ÝÅå¶û¿Æ¿Æ³Æ£¬£¬£¬£¬£¬ £¬´Ë´ÎÊÂÎñ½öÓ°ÏìÔ¼2000¸öÕË»§£¬£¬£¬£¬£¬ £¬Õ¼KrakenÓû§×ÜÊýµÄ0.02%£¬£¬£¬£¬£¬ £¬Ð¹Â¶µÄÐÅÏ¢½öÉæ¼°¿Í»§Ö§³ÖÊý¾Ý¡£¡£¡£¡£¡£¡£¡£KrakenÌåÏÖÆäÊÓ²ìÒÑÍøÂçµ½×ã¹»µÄÖ¤¾Ý£¬£¬£¬£¬£¬ £¬¿ÉÒÔÒÀ·¨ÆðËßËùÓÐÊÔͼÀÕË÷ËûÃǵÄÉæ°¸Ö°Ô±£¬£¬£¬£¬£¬ £¬¹«Ë¾ÕýÔÚÓë¶à¸ö˾·¨Í³ÁìÇøµÄÁª°îÖ´·¨²¿·ÖÇ×½üÏàÖú¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/


3. ChromeÊÐËÁÏÖ³¬100¸ö¶ñÒâÀ©Õ¹


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬ £¬¹Ù·½ChromeÍøÉÏÓ¦ÓÃÊÐËÁÖз¢Ã÷ÁËÁè¼Ý100¸ö¶ñÒâÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬ £¬ÕâЩÀ©Õ¹ÊÔͼÇÔÈ¡Google OAuth2 BearerÁîÅÆ¡¢°²ÅźóÃŲ¢¾ÙÐÐ¹ã¸æÚ²Æ­¡£¡£¡£¡£¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾SocketµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬ £¬ÕâЩ¶ñÒâÀ©Õ¹ÊÇʹÓÃÏàͬÏÂÁîÓë¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©µÄЭͬ¹¥»÷»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÒÔÎå¸ö²î±ðµÄÐû²¼ÕßÉí·ÝÔÚ¶à¸öÖÖ±ðÖÐÐû²¼ÁËÕâЩÀ©Õ¹£¬£¬£¬£¬£¬ £¬°üÀ¨Telegram²à±ßÀ¸¿Í»§¶Ë¡¢ÀÏ»¢»úºÍ»ùŵÓÎÏ·¡¢YouTubeºÍTikTokÔöÇ¿Æ÷¡¢Îı¾·­Ò빤¾ßºÍÊÊÓóÌÐò¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬ £¬¸Ã¹¥»÷»î¶¯Ê¹ÓÃÍйÜÔÚContabo VPSÉϵÄÖÐÑëºó¶Ë£¬£¬£¬£¬£¬ £¬¶à¸ö×ÓÓò»®·Ö´¦Öóͷ£»á»°Ð®ÖÆ¡¢Éí·ÝÍøÂç¡¢ÏÂÁîÖ´ÐкÍÇ®±Ò»¯²Ù×÷¡£¡£¡£¡£¡£¡£¡£Socketƾ֤Éí·ÝÑéÖ¤ºÍ»á»°ÇÔÈ¡´úÂëÖеÄ×¢ÊÍ£¬£¬£¬£¬£¬ £¬·¢Ã÷ÁËÅú×¢±£´æ¶íÂÞ˹¶ñÒâÈí¼þ¼´Ð§ÀͲÙ×÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÔÚÊý¾ÝÊÕÂÞºÍÕË»§Ð®ÖÆ·½Ã棬£¬£¬£¬£¬ £¬×î´óµÄ¼¯Èº°üÀ¨78¸öÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬ £¬Í¨¹ýinnerHTMLÊôÐÔ½«¹¥»÷Õß¿ØÖƵÄHTML×¢Èëµ½Óû§½çÃæÖС£¡£¡£¡£¡£¡£¡£µÚ¶þ´ó×é°üÀ¨54¸öÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬ £¬ÍøÂçÊܺ¦Õߵĵç×ÓÓʼþ¡¢ÐÕÃû¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬºÍGoogleÕÊ»§ID£¬£¬£¬£¬£¬ £¬Í¬Ê±ÇÔÈ¡Google OAuth2 BearerÁîÅÆ¡£¡£¡£¡£¡£¡£¡£µÚÈýÅú45¸öÀ©Õ¹³ÌÐò°üÀ¨Ò»¸öÒþ²Ø¹¦Ð§£¬£¬£¬£¬£¬ £¬¸Ã¹¦Ð§ÔÚä¯ÀÀÆ÷Æô¶¯Ê±ÔËÐУ¬£¬£¬£¬£¬ £¬³äµ±ºóÃÅ£¬£¬£¬£¬£¬ £¬´ÓC2ЧÀÍÆ÷»ñÈ¡ÏÂÁî²¢·­¿ªí§ÒâURL£¬£¬£¬£¬£¬ £¬ÎÞÐèÓû§½»»¥¼´¿ÉÆô¶¯¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/


4. SalesforceÉèÖùýʧÖÂMcGraw-HillÊý¾Ýй¶


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬ £¬½ÌÓý¾ÞÍ·McGraw-Hill¿ËÈÕ֤ʵ£¬£¬£¬£¬£¬ £¬ÒòSalesforceÉèÖùýʧ£¬£¬£¬£¬£¬ £¬ºÚ¿ÍÀֳɻá¼ûÁËÆäÄÚ²¿Êý¾Ý¡£¡£¡£¡£¡£¡£¡£McGraw-Hill½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬ £¬Î´¾­ÊÚȨµÄ»á¼ûËÆºõÔ´ÓÚSalesforceÇéÐÎÉèÖùýʧ£¬£¬£¬£¬£¬ £¬ÕâÊÇÒÑÓ°Ïì¶à¼ÒÓëSalesforceÏàÖúµÄ×éÖ¯µÄ¸üÆÕ±éÎÊÌâµÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£¹«Ë¾Ôö²¹µÀ£¬£¬£¬£¬£¬ £¬Õâ²»Éæ¼°¶ÔÆäSalesforceÕÊ»§¡¢¿Í»§Êý¾Ý¿â¡¢¿Î¼þ»òÄÚ²¿ÏµÍ³µÄδ¾­ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£ÔÚÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÏ£¬£¬£¬£¬£¬ £¬ÊÓ²ìÏÔʾй¶ÐÅÏ¢²»º¬Éç»á°ü¹ÜºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢»òÀ´×ÔÆä½ÌÓýƽ̨µÄѧÉúÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´Ë·¬ÉùÃ÷Ðû²¼Ç°£¬£¬£¬£¬£¬ £¬ÀÕË÷×éÖ¯ShinyHuntersÔÚÆä°µÍøÃÅ»§ÉÏÐû²¼McGraw-Hill³ÉΪÊܺ¦Õߣ¬£¬£¬£¬£¬ £¬²¢Íþв³Æ³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬£¬£¬ £¬²»È»½«ÔÚ4ÔÂ14ÈÕǰй¶±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÍþвÐÐΪÕßÉù³ÆÕÆÎÕÁË4500ÍòÌõSalesforce¼Í¼£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬ £¬ÕâÓ빫˾Éù³ÆÊý¾Ý²»Ãô¸ÐµÄ˵·¨Ïàì¶Ü¡£¡£¡£¡£¡£¡£¡£McGraw-HillÌåÏÖ£¬£¬£¬£¬£¬ £¬¼ì²âµ½Î´¾­ÊÚȨ»î¶¯ºó£¬£¬£¬£¬£¬ £¬ÊÜÓ°ÏìµÄÍøÒ³ÒÑÁ¬Ã¦»ñµÃ±£»£»£»¤£¬£¬£¬£¬£¬ £¬¹«Ë¾ÕýÓëSalesforceÇ×½üÏàÖúÒÔ½øÒ»²½ÔöÇ¿±£»£»£»¤²½·¥¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/


5. ³ÉÈËÒ¹×Ü»á¾ÞÍ·RCI HospitalityÊý¾Ýй¶


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬ £¬³ÉÈËÒ¹×Ü»á¾ÞÍ·RCI Hospitality Holdings¿ËÈÕÅû¶ÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬ £¬µ¼ÖÂÃô¸ÐСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþ£¬£¬£¬£¬£¬ £¬¸Ã¹«Ë¾ÆìÏÂ×Ó¹«Ë¾RCI Internet ServicesÓÚ3ÔÂ23ÈÕ·¢Ã÷£¬£¬£¬£¬£¬ £¬ÆäIIS WebЧÀÍÆ÷Öб£´æ²»Çå¾²µÄÖ±½Ó¹¤¾ßÒýÓÃÎó²î£¬£¬£¬£¬£¬ £¬µ¼ÖÂСÎÒ˽¼ÒÐÅÏ¢Ô⵽δ¾­ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£±¾Ô³õ¿¢ÊµÄÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬ £¬¸ÃÊÂÎñÏÖʵʼÓÚ3ÔÂ19ÈÕ¡£¡£¡£¡£¡£¡£¡£RCIÌåÏÖ£¬£¬£¬£¬£¬ £¬´Ë´ÎÊý¾ÝÐ¹Â¶Éæ¼°¶Ô¡°Öڶࡱ×ÔÁ¦³Ð°üÉÌÐÅÏ¢µÄδ¾­ÊÚȨ»á¼û£¬£¬£¬£¬£¬ £¬°üÀ¨ËûÃǵÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢Éç»á°ü¹ÜºÅÂëºÍ¼ÝʻִÕÕºÅÂë¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÏòSECÇ¿µ÷£¬£¬£¬£¬£¬ £¬¾ÝÆäËùÖª£¬£¬£¬£¬£¬ £¬Î´¾­ÊÚȨµÄÐÐΪÕßÉÐδ¹ûÕæÈö²¥ÕâЩÊý¾Ý£¬£¬£¬£¬£¬ £¬Í¬Ê±¿Í»§ÐÅÏ¢ºÍ²ÆÎñϵͳ¾ùδ±»»á¼û¡£¡£¡£¡£¡£¡£¡£RCI»¹Ö¸³ö£¬£¬£¬£¬£¬ £¬ÆäÓªÒµÔËӪδÊÜÓ°Ï죬£¬£¬£¬£¬ £¬²¢ÒÔΪ¸ÃÊÂÎñ²»»á¶Ô¹«Ë¾±¬·¢ÊµÖÊÐÔÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÏêϸÊÜÓ°ÏìÈËÊý£¬£¬£¬£¬£¬ £¬µ«RCI HospitalityÊÇÃÀ¹ú×î´óµÄ³ÉÈËÒ¹×Ü»áÔËÓªÉÌÖ®Ò»£¬£¬£¬£¬£¬ £¬ÆìÏÂÓµÓÐÊýÊ®¼ÒÃŵ꣬£¬£¬£¬£¬ £¬°üÀ¨Rick'sºÍTootsie'sµÈÆ·ÅÆ£¬£¬£¬£¬£¬ £¬ÓªÒµ×éºÏ»¹º­¸ÇÌåÓý¾Æ°ÉºÍÎèÌü¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞÒÑÖªµÄÍøÂç·¸·¨×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/nightclub-giant-rci-hospitality-reports-data-breach/


6. ShowDocÑÏÖØÎó²îCVE-2025-0520ÔâÆð¾¢Ê¹ÓÃ


4ÔÂ14ÈÕ£¬£¬£¬£¬£¬ £¬ÔÚ¹ãÊܽӴýµÄÎĵµÖÎÀíºÍЭ×÷ЧÀÍShowDocÖУ¬£¬£¬£¬£¬ £¬Ò»¸öÑÏÖØÇå¾²Îó²îÒѱ»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2025-0520£¬£¬£¬£¬£¬ £¬CVSSÆÀ·ÖΪ9.4·Ö£¬£¬£¬£¬£¬ £¬ÊôÓÚÑÏÖØ¼¶±ð¡£¡£¡£¡£¡£¡£¡£Îó²îÉæ¼°²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ÎÊÌ⣬£¬£¬£¬£¬ £¬Ô´ÓÚ¶ÔÎļþÀ©Õ¹ÃûµÄÑéÖ¤²»µ±£¬£¬£¬£¬£¬ £¬Ê¹µÃ¹¥»÷ÕßÄܹ»ÉÏ´«í§ÒâPHPÎļþ²¢ÊµÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¾ÝVulhubÐû²¼µÄÇ徲ͨ¸æ£¬£¬£¬£¬£¬ £¬ÔÚShowDoc 2.8.7֮ǰµÄ°æ±¾Öб£´æ´ËÎÊÌ⣬£¬£¬£¬£¬ £¬¹¥»÷ÕßÄܹ»ÉÏ´«web shell²¢ÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÒÑÔÚShowDoc°æ±¾2.8.7ÖлñµÃÐÞ¸´£¬£¬£¬£¬£¬ £¬¸Ã°æ±¾ÓÚ2020Äê10ÔÂÐû²¼£¬£¬£¬£¬£¬ £¬¶øÈí¼þµÄÄ¿½ñ°æ±¾Îª3.8.1¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤VulnCheckÇå¾²Ñо¿¸±×ܲÃCaitlin Condon·ÖÏíµÄ×îÐÂϸ½Ú£¬£¬£¬£¬£¬ £¬CVE-2025-0520ÒÑÊ×´ÎÔâµ½Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£ÒÑ·¢Ã÷µÄ¹¥»÷ÊÖ¶ÎÊÇʹÓøÃÎó²îÏòλÓÚÃÀ¹úµÄÃÛ¹ÞͶ·ÅWeb Shell£¬£¬£¬£¬£¬ £¬¸ÃÃÛ¹ÞÔËÐÐ×ű£´æÎó²îµÄShowDoc°æ±¾¡£¡£¡£¡£¡£¡£¡£Ïà¹ØÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬ £¬ÏÖÔÚÓÐÁè¼Ý2000¸öShowDocʵÀýÔÚÏߣ¬£¬£¬£¬£¬ £¬ÆäÖд󲿷ÖλÓÚÖйú¡£¡£¡£¡£¡£¡£¡£½¨ÒéʹÓÃShowDocµÄÓû§¸üÐÂÖÁ×îа汾ÒÔ»ñµÃ×î¼Ñ·À»¤¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html