Handala×éÖ¯Éù³Æ¶Ô°¢ÁªÇõ·¢¶¯ÖØ´óÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2026-04-151. Handala×éÖ¯Éù³Æ¶Ô°¢ÁªÇõ·¢¶¯ÖØ´óÍøÂç¹¥»÷
4ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬ÃûΪHandalaµÄºÚ¿Í×éÖ¯¿ËÈÕÉù³Æ¶Ô°¢ÁªÇõ·¢¶¯ÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ä¿µÄ°üÀ¨µÏ°Ý·¨Ôº²¿·Ö¡¢µÏ°ÝÍÁµØ²¿·ÖºÍµÏ°Ýõè¾¶½»Í¨ÖÎÀí¾Ö¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ðû³ÆÏú»ÙÁË6PBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁË149TBµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢½«´Ë´Î¹¥»÷¶¨ÐÔΪ¶ÔµØÇøÕþ¸®µÄÅê»÷ºÍÖÒÑÔ¡£¡£¡£¡£¡£¡£¡£HandalaÔÚÆäTorÍøÕ¾ÉÏÌåÏÖ£º¡°¼øÓÚ°¢ÁªÇõÏòµ¼È˹ûÕæÆðÒå¶Ô¿¹ÖáÐÄ£¬£¬£¬£¬£¬£¬²¢×÷Ϊ¶Ô¸ÃµØÇøËùÓÐÅѹúÕþ¸®µÄÑÏËàÏÈ·¢ÖÆÈËÖÒÑÔ£¬£¬£¬£¬£¬£¬ºº´ïÀ×éÖ¯ÒѶԸùúÒªº¦»ù´¡ÉèÊ©·¢¶¯ÁËÆù½ñΪֹÍþÁ¦×îǿʢµÄÍøÂç¹¥»÷Ö®Ò»¡£¡£¡£¡£¡£¡£¡£ÔÚ´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬£¬6PBµÄÊý¾ÝÒѱ»³¹µ×Ïú»Ù¡£¡£¡£¡£¡£¡£¡£¡±ÏÖÔÚÕâЩ˵·¨ÉÐδ»ñµÃ×ÔÁ¦Ö¤Êµ¡£¡£¡£¡£¡£¡£¡£HandalaÍâòÉÏÊÇÒ»¸öÖ§³Ö°ÍÀÕ˹̹µÄºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬µ«ÆÕ±éÒÔΪËüÊÇÒÁÀÊÖ§³ÖµÄVoid ManticoreµÄ»Ï×Ó¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÒÔÍøÂç´¹ÂÚ¡¢Êý¾ÝÇÔÈ¡¡¢ÀÕË÷ºÍÆÆËðÐÔ²Á³ý¹¥»÷¶øÖøÃû£¬£¬£¬£¬£¬£¬Í¬Ê±´ÓÊÂÐÅÏ¢Õ½ºÍÐÄÀíÕ½¡£¡£¡£¡£¡£¡£¡£×ÔÒÁÀʳåÍ»±¬·¢ÒÔÀ´£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Ò»Ö±ÒÔÒÔÉ«Áоü·½Ð§ÀÍÆ÷¡¢Ç鱨ְԱºÍ¹«Ë¾ÎªÄ¿µÄ£¬£¬£¬£¬£¬£¬ÇÔÈ¡»ò²Á³ýÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/190716/hacking/iran-linked-group-handala-claims-to-have-breached-three-major-uae-organizations.html
2. KrakenÔâÄÚ²¿ÍþвÀÕË÷£¬£¬£¬£¬£¬£¬¾Ü¾øÖ§¸¶Êê½ð
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬¼ÓÃÜÇ®±ÒÉúÒâËùKraken¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Ò»¸öÍøÂç·¸·¨ÍÅ»ïÕýÊÔͼͨ¹ýÍþвÐû²¼ÏÔʾÍйܿͻ§Êý¾ÝµÄÄÚ²¿ÏµÍ³ÊÓÆµÀ´Ú²Æ¸Ã¹«Ë¾¡£¡£¡£¡£¡£¡£¡£KrakenÊ×ϯÇå¾²¹ÙÄá¿Ë¡¤Åå¶û¿Æ¿ÆÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ²¢Î´Î£¼°¿Í»§×ʽ𣬣¬£¬£¬£¬£¬¶øÊÇÉæ¼°ÄÚ²¿Íþв£¬£¬£¬£¬£¬£¬ÆäÖÐÁ½ÃûÖ§³ÖÖ°Ô±²»µ±»á¼ûÁËÓÐÏ޵Ŀͻ§Êý¾Ý¡£¡£¡£¡£¡£¡£¡£KrakenÃ÷È·ÌåÏÖ²»»áÏòÍþвÐÐΪÕßÖ§¸¶ÈκÎÓöȻò¾ÙÐÐÈκÎ̸ÅС£¡£¡£¡£¡£¡£¡£2025Äê2Ô£¬£¬£¬£¬£¬£¬KrakenÊÕµ½¡°À´×Ô¿É¿¿ÈªÔ´µÄÏßË÷¡±£¬£¬£¬£¬£¬£¬³ÆÍøÂç·¸·¨·Ö×ÓÉ¢²¼ÁËÒ»¶ÎÊÓÆµ£¬£¬£¬£¬£¬£¬ÑÝʾÔõÑù»á¼ûÆä¿Í»§Ö§³Öϵͳ¡£¡£¡£¡£¡£¡£¡£ËæºóÕö¿ªÊӲ죬£¬£¬£¬£¬£¬·¢Ã÷Ò»ÃûÖ§³ÖÖ°Ô±±»¸ÃÍþвÐÐΪÕßÕÐļ¡£¡£¡£¡£¡£¡£¡£×î½ü£¬£¬£¬£¬£¬£¬KrakenÔÙ´ÎÊÕµ½Ïß±¨£¬£¬£¬£¬£¬£¬³ÆÓÐÒ»¶Î¸üеÄÊÓÆµÏÔʾÓÐÈË¿ÉÒÔ»á¼ûÆäϵͳµÄÄÚ²¿È¨ÏÞ¡£¡£¡£¡£¡£¡£¡£ÔÚÁ½ÆðÊÂÎñÖУ¬£¬£¬£¬£¬£¬¹«Ë¾¶¼Ñ¸ËÙ×ö³ö·´Ó¦£¬£¬£¬£¬£¬£¬×÷·ÏÁËÉæÊÂÔ±¹¤µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬Õö¿ªÊӲ첢ÔöÇ¿¹Ü¿Ø²½·¥¡£¡£¡£¡£¡£¡£¡£Èç·¢Ã÷Óû§Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Kraken»áÖ±½Ó֪ͨÊÜÓ°ÏìµÄÓû§¡£¡£¡£¡£¡£¡£¡£¾ÝÅå¶û¿Æ¿Æ³Æ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ½öÓ°ÏìÔ¼2000¸öÕË»§£¬£¬£¬£¬£¬£¬Õ¼KrakenÓû§×ÜÊýµÄ0.02%£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢½öÉæ¼°¿Í»§Ö§³ÖÊý¾Ý¡£¡£¡£¡£¡£¡£¡£KrakenÌåÏÖÆäÊÓ²ìÒÑÍøÂçµ½×ã¹»µÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬¿ÉÒÔÒÀ·¨ÆðËßËùÓÐÊÔͼÀÕË÷ËûÃǵÄÉæ°¸Ö°Ô±£¬£¬£¬£¬£¬£¬¹«Ë¾ÕýÔÚÓë¶à¸ö˾·¨Í³ÁìÇøµÄÁª°îÖ´·¨²¿·ÖÇ×½üÏàÖú¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/
3. ChromeÊÐËÁÏÖ³¬100¸ö¶ñÒâÀ©Õ¹
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬¹Ù·½ChromeÍøÉÏÓ¦ÓÃÊÐËÁÖз¢Ã÷ÁËÁè¼Ý100¸ö¶ñÒâÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬ÕâЩÀ©Õ¹ÊÔͼÇÔÈ¡Google OAuth2 BearerÁîÅÆ¡¢°²ÅźóÃŲ¢¾ÙÐÐ¹ã¸æÚ²Æ¡£¡£¡£¡£¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾SocketµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâÀ©Õ¹ÊÇʹÓÃÏàͬÏÂÁîÓë¿ØÖÆ£¨C2£©»ù´¡ÉèÊ©µÄÐͬ¹¥»÷»î¶¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÒÔÎå¸ö²î±ðµÄÐû²¼ÕßÉí·ÝÔÚ¶à¸öÖÖ±ðÖÐÐû²¼ÁËÕâЩÀ©Õ¹£¬£¬£¬£¬£¬£¬°üÀ¨Telegram²à±ßÀ¸¿Í»§¶Ë¡¢ÀÏ»¢»úºÍ»ùŵÓÎÏ·¡¢YouTubeºÍTikTokÔöÇ¿Æ÷¡¢Îı¾·Ò빤¾ßºÍÊÊÓóÌÐò¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷»î¶¯Ê¹ÓÃÍйÜÔÚContabo VPSÉϵÄÖÐÑëºó¶Ë£¬£¬£¬£¬£¬£¬¶à¸ö×ÓÓò»®·Ö´¦Öóͷ£»á»°Ð®ÖÆ¡¢Éí·ÝÍøÂç¡¢ÏÂÁîÖ´ÐкÍÇ®±Ò»¯²Ù×÷¡£¡£¡£¡£¡£¡£¡£Socketƾ֤Éí·ÝÑéÖ¤ºÍ»á»°ÇÔÈ¡´úÂëÖеÄ×¢ÊÍ£¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÅú×¢±£´æ¶íÂÞ˹¶ñÒâÈí¼þ¼´Ð§ÀͲÙ×÷µÄÖ¤¾Ý¡£¡£¡£¡£¡£¡£¡£ÔÚÊý¾ÝÊÕÂÞºÍÕË»§Ð®ÖÆ·½Ã棬£¬£¬£¬£¬£¬×î´óµÄ¼¯Èº°üÀ¨78¸öÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýinnerHTMLÊôÐÔ½«¹¥»÷Õß¿ØÖƵÄHTML×¢Èëµ½Óû§½çÃæÖС£¡£¡£¡£¡£¡£¡£µÚ¶þ´ó×é°üÀ¨54¸öÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬£¬ÍøÂçÊܺ¦Õߵĵç×ÓÓʼþ¡¢ÐÕÃû¡¢Ð¡ÎÒ˽¼Ò×ÊÁÏͼƬºÍGoogleÕÊ»§ID£¬£¬£¬£¬£¬£¬Í¬Ê±ÇÔÈ¡Google OAuth2 BearerÁîÅÆ¡£¡£¡£¡£¡£¡£¡£µÚÈýÅú45¸öÀ©Õ¹³ÌÐò°üÀ¨Ò»¸öÒþ²Ø¹¦Ð§£¬£¬£¬£¬£¬£¬¸Ã¹¦Ð§ÔÚä¯ÀÀÆ÷Æô¶¯Ê±ÔËÐУ¬£¬£¬£¬£¬£¬³äµ±ºóÃÅ£¬£¬£¬£¬£¬£¬´ÓC2ЧÀÍÆ÷»ñÈ¡ÏÂÁî²¢·¿ªí§ÒâURL£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¼´¿ÉÆô¶¯¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/
4. SalesforceÉèÖùýʧÖÂMcGraw-HillÊý¾Ýй¶
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬½ÌÓý¾ÞÍ·McGraw-Hill¿ËÈÕ֤ʵ£¬£¬£¬£¬£¬£¬ÒòSalesforceÉèÖùýʧ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÀֳɻá¼ûÁËÆäÄÚ²¿Êý¾Ý¡£¡£¡£¡£¡£¡£¡£McGraw-Hill½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄ»á¼ûËÆºõÔ´ÓÚSalesforceÇéÐÎÉèÖùýʧ£¬£¬£¬£¬£¬£¬ÕâÊÇÒÑÓ°Ïì¶à¼ÒÓëSalesforceÏàÖúµÄ×éÖ¯µÄ¸üÆÕ±éÎÊÌâµÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£¹«Ë¾Ôö²¹µÀ£¬£¬£¬£¬£¬£¬Õâ²»Éæ¼°¶ÔÆäSalesforceÕÊ»§¡¢¿Í»§Êý¾Ý¿â¡¢¿Î¼þ»òÄÚ²¿ÏµÍ³µÄδ¾ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£ÔÚÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÏ£¬£¬£¬£¬£¬£¬ÊÓ²ìÏÔʾй¶ÐÅÏ¢²»º¬Éç»á°ü¹ÜºÅÂë¡¢²ÆÎñÕË»§ÐÅÏ¢»òÀ´×ÔÆä½ÌÓýƽ̨µÄѧÉúÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´Ë·¬ÉùÃ÷Ðû²¼Ç°£¬£¬£¬£¬£¬£¬ÀÕË÷×éÖ¯ShinyHuntersÔÚÆä°µÍøÃÅ»§ÉÏÐû²¼McGraw-Hill³ÉΪÊܺ¦Õߣ¬£¬£¬£¬£¬£¬²¢Íþв³Æ³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬²»È»½«ÔÚ4ÔÂ14ÈÕǰй¶±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÍþвÐÐΪÕßÉù³ÆÕÆÎÕÁË4500ÍòÌõSalesforce¼Í¼£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬ÕâÓ빫˾Éù³ÆÊý¾Ý²»Ãô¸ÐµÄ˵·¨Ïàì¶Ü¡£¡£¡£¡£¡£¡£¡£McGraw-HillÌåÏÖ£¬£¬£¬£¬£¬£¬¼ì²âµ½Î´¾ÊÚȨ»î¶¯ºó£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÍøÒ³ÒÑÁ¬Ã¦»ñµÃ±£»£»£»¤£¬£¬£¬£¬£¬£¬¹«Ë¾ÕýÓëSalesforceÇ×½üÏàÖúÒÔ½øÒ»²½ÔöÇ¿±£»£»£»¤²½·¥¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/
5. ³ÉÈËÒ¹×Ü»á¾ÞÍ·RCI HospitalityÊý¾Ýй¶
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬³ÉÈËÒ¹×Ü»á¾ÞÍ·RCI Hospitality Holdings¿ËÈÕÅû¶ÁËÒ»ÆðÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÃô¸ÐСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÆìÏÂ×Ó¹«Ë¾RCI Internet ServicesÓÚ3ÔÂ23ÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬ÆäIIS WebЧÀÍÆ÷Öб£´æ²»Çå¾²µÄÖ±½Ó¹¤¾ßÒýÓÃÎó²î£¬£¬£¬£¬£¬£¬µ¼ÖÂСÎÒ˽¼ÒÐÅÏ¢Ô⵽δ¾ÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£±¾Ô³õ¿¢ÊµÄÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÏÖʵʼÓÚ3ÔÂ19ÈÕ¡£¡£¡£¡£¡£¡£¡£RCIÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾ÝÐ¹Â¶Éæ¼°¶Ô¡°Öڶࡱ×ÔÁ¦³Ð°üÉÌÐÅÏ¢µÄδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬°üÀ¨ËûÃǵÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÁªÏµ·½·¨¡¢Éç»á°ü¹ÜºÅÂëºÍ¼ÝʻִÕÕºÅÂë¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÏòSECÇ¿µ÷£¬£¬£¬£¬£¬£¬¾ÝÆäËùÖª£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄÐÐΪÕßÉÐδ¹ûÕæÈö²¥ÕâЩÊý¾Ý£¬£¬£¬£¬£¬£¬Í¬Ê±¿Í»§ÐÅÏ¢ºÍ²ÆÎñϵͳ¾ùδ±»»á¼û¡£¡£¡£¡£¡£¡£¡£RCI»¹Ö¸³ö£¬£¬£¬£¬£¬£¬ÆäÓªÒµÔËӪδÊÜÓ°Ï죬£¬£¬£¬£¬£¬²¢ÒÔΪ¸ÃÊÂÎñ²»»á¶Ô¹«Ë¾±¬·¢ÊµÖÊÐÔÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÏêϸÊÜÓ°ÏìÈËÊý£¬£¬£¬£¬£¬£¬µ«RCI HospitalityÊÇÃÀ¹ú×î´óµÄ³ÉÈËÒ¹×Ü»áÔËÓªÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬ÆìÏÂÓµÓÐÊýÊ®¼ÒÃŵ꣬£¬£¬£¬£¬£¬°üÀ¨Rick'sºÍTootsie'sµÈÆ·ÅÆ£¬£¬£¬£¬£¬£¬ÓªÒµ×éºÏ»¹º¸ÇÌåÓý¾Æ°ÉºÍÎèÌü¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞÒÑÖªµÄÍøÂç·¸·¨×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/nightclub-giant-rci-hospitality-reports-data-breach/
6. ShowDocÑÏÖØÎó²îCVE-2025-0520ÔâÆð¾¢Ê¹ÓÃ
4ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬ÔÚ¹ãÊܽӴýµÄÎĵµÖÎÀíºÍÐ×÷ЧÀÍShowDocÖУ¬£¬£¬£¬£¬£¬Ò»¸öÑÏÖØÇå¾²Îó²îÒѱ»¹¥»÷Õ߯ð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£¸ÃÎó²î±àºÅΪCVE-2025-0520£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.4·Ö£¬£¬£¬£¬£¬£¬ÊôÓÚÑÏÖØ¼¶±ð¡£¡£¡£¡£¡£¡£¡£Îó²îÉæ¼°²»ÊÜÏÞÖÆµÄÎļþÉÏ´«ÎÊÌ⣬£¬£¬£¬£¬£¬Ô´ÓÚ¶ÔÎļþÀ©Õ¹ÃûµÄÑéÖ¤²»µ±£¬£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷ÕßÄܹ»ÉÏ´«í§ÒâPHPÎļþ²¢ÊµÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£¾ÝVulhubÐû²¼µÄÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬ÔÚShowDoc 2.8.7֮ǰµÄ°æ±¾Öб£´æ´ËÎÊÌ⣬£¬£¬£¬£¬£¬¹¥»÷ÕßÄܹ»ÉÏ´«web shell²¢ÔÚЧÀÍÆ÷ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÒÑÔÚShowDoc°æ±¾2.8.7ÖлñµÃÐÞ¸´£¬£¬£¬£¬£¬£¬¸Ã°æ±¾ÓÚ2020Äê10ÔÂÐû²¼£¬£¬£¬£¬£¬£¬¶øÈí¼þµÄÄ¿½ñ°æ±¾Îª3.8.1¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤VulnCheckÇå¾²Ñо¿¸±×ܲÃCaitlin Condon·ÖÏíµÄ×îÐÂϸ½Ú£¬£¬£¬£¬£¬£¬CVE-2025-0520ÒÑÊ×´ÎÔâµ½Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£ÒÑ·¢Ã÷µÄ¹¥»÷ÊÖ¶ÎÊÇʹÓøÃÎó²îÏòλÓÚÃÀ¹úµÄÃÛ¹ÞͶ·ÅWeb Shell£¬£¬£¬£¬£¬£¬¸ÃÃÛ¹ÞÔËÐÐ×ű£´æÎó²îµÄShowDoc°æ±¾¡£¡£¡£¡£¡£¡£¡£Ïà¹ØÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬ÏÖÔÚÓÐÁè¼Ý2000¸öShowDocʵÀýÔÚÏߣ¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚÖйú¡£¡£¡£¡£¡£¡£¡£½¨ÒéʹÓÃShowDocµÄÓû§¸üÐÂÖÁ×îа汾ÒÔ»ñµÃ×î¼Ñ·À»¤¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html


¾©¹«Íø°²±¸11010802024551ºÅ