Home
1
Hot News
2
Information Security3
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ubuntu Linux 核心存在多個漏洞 Ubuntu Linux核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Ubuntu 14.04 ESM Ubuntu 16.04 ESM Ubuntu 18.04 ESM Ubuntu 20.04 LTS Ubuntu 22.04 LTS Ubuntu 24.04 LTS 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7144-1https://ubuntu.com/security/notices/USN-7148-1https://ubuntu.com/security/notices/USN-7154-1https://ubuntu.com/security/notices/USN-7155-1https://ubuntu.com/security/notices/USN-7156-1https://ubuntu.com/security/notices/USN-7159-1 https://www.kjintelligent.com/en/hot_506219.html [Cybersecurity Vulnerability Notice] Ubuntu Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506219.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506219.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506219.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - ChromeOS 存在多個漏洞 ChromeOS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: 131.0.6778.96 之前的ChromeOS Stable版本(16063.45.0之前的平臺版本) 126.0.6478.260 之前的ChromeOS LTS版本 (15886.85.0之前的平臺版本 ) 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-chromeos.htmlhttps://chromereleases.googleblog.com/2024/12/long-term-support-channel-update-for.html https://www.kjintelligent.com/en/hot_506218.html [Cybersecurity Vulnerability Notice] ChromeOS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506218.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506218.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506218.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Apache Struts 存在遠端執行程式碼漏洞 Apache Struts 存在一個漏洞,允許遠端使用者利用此漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Struts 2.0.0 - Struts 2.3.37 (EOL) Struts 2.5.0 - Struts 2.5.33 Struts 6.0.0 - Struts 6.3.0.2 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Struts 6.4.0 或更高版本及使用Action File Upload Interceptor。 情資報告連結:https://cwiki.apache.org/confluence/display/WW/S2-067 https://www.kjintelligent.com/en/hot_506217.html [Cybersecurity Vulnerability Notice] Apache Struts 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506217.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506217.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506217.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 131.0.6778.139 (Linux) 之前的版本 Google Chrome 131.0.6778.139/.140 (Mac) 之前的版本 Google Chrome 131.0.6778.139/.140 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 131.0.6778.139 (Linux) 或之後的版本。 請更新至 131.0.6778.139/.140 (Mac) 或之後的版本。 請更新至 131.0.6778.139/.140 (Windows) 或之後的版本。 情資報告連結:https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop_10.html https://www.kjintelligent.com/en/hot_506086.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506086.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506086.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506086.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 蘋果產品存在多個漏洞 蘋果產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、資料篡改及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: iOS 18.2 and iPadOS 18.2 以前的版本 iPadOS 17.7.3 以前的版本 macOS Sequoia 15.2 以前的版本 macOS Sonoma 14.7.2 以前的版本 macOS Ventura 13.7.2 以前的版本 Safari 18.2 以前的版本 tvOS 18.2 以前的版本 visionOS 2.2 以前的版本 watchOS 11.2 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 iOS 18.2 and iPadOS 18.2。 請更新至 iPadOS 17.7.3。 請更新至 macOS Sequoia 15.2。 請更新至 macOS Sonoma 14.7.2。 請更新至 macOS Ventura 13.7.2。 請更新至 Safari 18.2。 請更新至 tvOS 18.2。 請更新至 visionOS 2.2。 請更新至 watchOS 11.2。 情資報告連結:https://support.apple.com/en-us/121837https://support.apple.com/en-us/121838https://support.apple.com/en-us/121839https://support.apple.com/en-us/121840https://support.apple.com/en-us/121842https://support.apple.com/en-us/121843https://support.apple.com/en-us/121844https://support.apple.com/en-us/121845https://support.apple.com/en-us/121846 https://www.kjintelligent.com/en/hot_506084.html [Cybersecurity Vulnerability Notice] Apple 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506084.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506084.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506084.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - GitLab 存在多個漏洞 GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、跨網站指令碼及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: GitLab Community Edition (CE) 17.6.2, 17.5.4 及 17.4.6 以前的版本 GitLab Enterprise Edition (EE) 17.6.2, 17.5.4 及 17.4.6 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://about.gitlab.com/releases/2024/12/11/patch-release-gitlab-17-6-2-released/ https://www.kjintelligent.com/en/hot_506083.html [Cybersecurity Vulnerability Notice] GitLab 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506083.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506083.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506083.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 131.0.2903.99 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 請更新至Microsoft Edge (Stable) 131.0.2903.99 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#december-12-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12381https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12382 https://www.kjintelligent.com/en/hot_506082.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506082.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506082.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506082.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ivanti 產品存在多個漏洞 Ivanti 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: Ivanti Connect Secure (ICS) 版本 22.7R2.3 及更早版本 Ivanti Policy Secure (IPS) 版本 22.7R1.1 及更早版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將 Ivanti Connect Secure (ICS) 版本 22.7R2.3 及更早版本更新至 22.7R2.4。 請將 Ivanti Policy Secure (IPS) 版本 22.7R1.1 及更早版本更新至 22.7R1.2。 情資報告連結:https://forums.ivanti.com/s/article/December-2024-Security-Advisory-Ivanti-Connect-Secure-ICS-and-Ivanti-Policy-Secure-IPS-Multiple-CVEs?language=en_US https://www.kjintelligent.com/en/hot_506072.html [Cybersecurity Vulnerability Notice] Ivanti 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506072.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_506072.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_506072.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 英特內的DreamMaker存在多個漏洞 盛達電業路由器存在多個漏洞,其將允許攻擊者利用該漏洞,並導致可直接操作特定功能取得部分設備資訊、修改WiFi SSID、重啟設備、讀取任意網頁資料、存取使用者設定頁面取得明文通行碼以及利用SSH的特定功能注入任意系統指令並執行,其影響系統或版本如下: 受影響之系統/漏洞描述: Arbitrary File Reading through Path Traversal CVE編號:CVE-2024-11979 漏洞描述:英特內的DreamMaker存在 Path Traversal漏洞且未限制上傳檔案類型,其將允許未經身分鑑別之遠端攻擊者利用此漏洞上傳任意檔案至任意路徑,甚至可上傳網頁後門程式以執行任意程式碼。 影響系統/版本:DreamMaker 2024/09/26(不含)以前版本。 Arbitrary File Reading through Path Traversal CVE編號:CVE-2024-11978 漏洞描述:英特內的DreamMaker存在 Path Traversal漏洞,其將允許未經身分鑑別之遠端攻擊者利用此漏洞讀取任意系統檔案。 影響系統/版本:DreamMaker 2024/09/26(不含)以前版本。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8271-29871-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8269-22a8f-1.html https://www.kjintelligent.com/en/hot_505336.html [Cybersecurity Vulnerability Notice] 英特內的DreamMaker 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505336.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505336.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505336.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 盛達電業路由器存在多個漏洞 盛達電業路由器存在多個漏洞,其將允許攻擊者利用該漏洞,並導致可直接操作特定功能取得部分設備資訊、修改WiFi SSID、重啟設備、讀取任意網頁資料、存取使用者設定頁面取得明文通行碼以及利用SSH的特定功能注入任意系統指令並執行,其影響系統或版本如下: 受影響之系統/漏洞描述: Missing Authentication CVE編號:CVE-2024-11980 漏洞描述:盛達電業部分路由器型號存在Missing Authentication漏洞,其允許未經身分鑑別之遠端攻擊者可直接操作特定功能取得部分設備資訊、修改WiFi SSID及重啟設備。 影響系統/版本:M100、M150、M120N及M500。 Authentication Bypass CVE編號:CVE-2024-11981 漏洞描述:盛達電業部分路由器型號存在Authentication Bypass漏洞,其將允許未經身分鑑別之遠端攻擊者可利用此漏洞讀取任意網頁資料。 影響系統/版本:M100、M150、M120N及M500。 Plaintext Storage of a Password CVE編號:CVE-2024-11982 漏洞描述:盛達電業部分路由器型號存在Plaintext Storage of a Password漏洞,其將允許已取得管理者權限的遠端攻擊者可存取使用者設定頁面取得明文通行碼。 影響系統/版本:M100、M150、M120N及M500。 OS Command Injection CVE編號:CVE-2024-11983 漏洞描述:盛達電業部分路由器型號存在OS Command Injection漏洞,其將允許已取得管理員權限之遠端攻擊者可利用SSH的特定功能注入任意系統指令並執行。 影響系統/版本:M100、M150、M120N及M500。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將韌體為1.04.1.592.x請更新至1.04.1.592.8(含)以後版本。 請將韌體為1.04.1.613.x請更新至1.04.1.613.13(含)以後版本。 請將其餘韌體為1.04.1.x請更新至1.04.1.675(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8273-95a07-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8275-50f42-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8277-88b20-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8279-bf67e-1.html https://www.kjintelligent.com/en/hot_505335.html [Cybersecurity Vulnerability Notice] 盛達電業路由器 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505335.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505335.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505335.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - SonicWall SMA100 SSL-VPN 存在多個漏洞 SonicWall SMA100 SSL-VPN 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、遠端執行任意程式碼、洩露敏感資料,其影響系統或版本如下: 受影響之系統/漏洞描述: Path traversal vulnerability – attributed to publicly known Apache HTTP Server vulnerability CVE編號:CVE-2024-38475 漏洞描述:在 Apache HTTP Server 2.4.59 及更早版本中,mod_rewrite 模組存在輸出轉義不當的問題,允許攻擊者將 URL 映射到伺服器允許提供的檔案系統位置。 影響系統/版本: SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。 SonicWALL SMA100 Heap-based buffer overflow vulnerability CVE編號:CVE-2024-40763 漏洞描述:SonicWall SMA100 SSLVPN 中因使用 strcpy 函式,故導致存在基於堆(Heap-based)的緩衝區溢出漏洞,其將允許遠端已驗證的攻擊者可以導致堆緩衝區溢出,並可能進一步導致執行任意程式碼的風險。 影響系統/版本: SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。 Stack-based buffer overflow vulnerability CVE編號:CVE-2024-45318 漏洞描述:SonicWall SMA100 SSLVPN web management interface存在漏洞,其將允許遠端攻擊者進行攻擊,並導致堆疊的緩衝區溢出以及任意執行代碼。 影響系統/版本: SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。 Certificate-based authentication bypass CVE編號:CVE-2024-45319 漏洞描述:SonicWall SMA100 SSLVPN存在漏洞,其將允許遠端已取得授權之攻擊者在驗證過程中繞過憑證要求。 影響系統/版本: SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。 Insecure randomness CVE編號:CVE-2024-53702 漏洞描述:SonicWall SMA100 SSLVPN 的備份代碼生成器中使用了加密強度不足的偽隨機數生成器(PRNG),其可能導致攻擊者可以預測其生成的結果,從而潛在地暴露生成的密碼或秘密資訊。 影響系統/版本: SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。 Stack-based buffer overflow vulnerability CVE編號:CVE-2024-5370 漏洞描述:SonicWall SMA100 SSLVPN採用的Apache模組mod_httprp存在漏洞,其將允許遠端攻擊者針對漏洞進行攻擊,並導致堆疊的緩衝區溢出以及任意執行代碼。 影響系統/版本: SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將 SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 更新至 10.2.1.14-75sv 或之後的版本。 情資報告連結:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018 https://www.kjintelligent.com/en/hot_505334.html [Cybersecurity Vulnerability Notice] SonicWall SMA100 SSL-VPN 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505334.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505334.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505334.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發彷冒及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 131.0.2903.86 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge (Stable) 131.0.2903.86 或之後的版本。 情資報告連結:https://access.redhat.com/errata/RHSA-2024:10771https://access.redhat.com/errata/RHSA-2024:10772https://access.redhat.com/errata/RHSA-2024:10773 https://www.kjintelligent.com/en/hot_505333.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505333.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505333.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505333.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - RedHat Linux 核心存在多個漏洞 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升,其影響系統或版本如下: 受影響之系統/漏洞描述: Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64 Red Hat Enterprise Linux Server - AUS 9.4 x86_64 Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64 Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64 Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64 Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64 Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64 Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64 Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64 Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64 Red Hat Enterprise Linux Server - AUS 9.2 x86_64 Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64 Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64 Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64 Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64 Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64 Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64 Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://access.redhat.com/errata/RHSA-2024:10771https://access.redhat.com/errata/RHSA-2024:10772https://access.redhat.com/errata/RHSA-2024:10773 https://www.kjintelligent.com/en/hot_505332.html [Cybersecurity Vulnerability Notice] RedHat Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505332.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505332.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505332.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - QNAP NAS 存在多個漏洞 QNAP NAS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料及資料篡改,其影響系統或版本如下: 受影響之系統/漏洞描述: QTS 5.1.x QuTS hero h5.1.x QTS 5.2.x QuTS hero h5.2.x 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將 QTS 5.1.x 更新至 QTS 5.1.9.2954 build 20241120 或之後的版本。 請將 QTS 5.2.x 更新至 QTS 5.2.2.2950 build 20241114 或之後的版本。 請將 QuTS hero h5.1.x 更新至 QuTS hero h5.1.9.2954 build 20241120 或之後的版本。 請將 QuTS hero h5.2.x 更新至 QuTS hero h5.2.2.2952 build 20241116 或之後的版本。 情資報告連結:https://www.qnap.com/en/security-advisory/qsa-24-49 https://www.kjintelligent.com/en/hot_505329.html [Cybersecurity Vulnerability Notice] QNAP NAS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505329.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505329.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505329.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - SUSE Linux 內核存在多個漏洞 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、敏感資料洩露、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: openSUSE Leap 15.3 openSUSE Leap 15.4 openSUSE Leap 15.5 SUSE Enterprise Storage 7.1 SUSE Linux Enterprise Desktop 15 SP4 LTSS SUSE Linux Enterprise High Availability Extension 15 SP3 SUSE Linux Enterprise High Availability Extension 15 SP4 SUSE Linux Enterprise High Performance Computing 15 SP3 SUSE Linux Enterprise High Performance Computing 15 SP4 SUSE Linux Enterprise High Performance Computing 15 SP5 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 SUSE Linux Enterprise Live Patching 15-SP3 SUSE Linux Enterprise Live Patching 15-SP4 SUSE Linux Enterprise Live Patching 15-SP5 SUSE Linux Enterprise Live Patching 15-SP6 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Micro 5.3 SUSE Linux Enterprise Micro 5.4 SUSE Linux Enterprise Micro 5.5 SUSE Linux Enterprise Micro for Rancher 5.2 SUSE Linux Enterprise Micro for Rancher 5.3 SUSE Linux Enterprise Micro for Rancher 5.4 SUSE Linux Enterprise Real Time 15 SP4 SUSE Linux Enterprise Real Time 15 SP5 SUSE Linux Enterprise Real Time 15 SP6 SUSE Linux Enterprise Server 15 SP3 SUSE Linux Enterprise Server 15 SP3 Business Critical Linux SUSE Linux Enterprise Server 15 SP3 LTSS SUSE Linux Enterprise Server 15 SP4 SUSE Linux Enterprise Server 15 SP4 LTSS SUSE Linux Enterprise Server 15 SP5 SUSE Linux Enterprise Server 15 SP6 SUSE Linux Enterprise Server for SAP Applications 15 SP3 SUSE Linux Enterprise Server for SAP Applications 15 SP4 SUSE Linux Enterprise Server for SAP Applications 15 SP5 SUSE Linux Enterprise Server for SAP Applications 15 SP6 SUSE Manager Proxy 4.2 SUSE Manager Proxy 4.3 SUSE Manager Retail Branch Server 4.2 SUSE Manager Retail Branch Server 4.3 SUSE Manager Server 4.2 SUSE Manager Server 4.3 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.suse.com/support/update/announcement/2024/suse-su-20244141-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244139-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244131-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244129-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244128-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244127-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244125-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244124-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244123-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244122-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244120-1/ https://www.kjintelligent.com/en/hot_505045.html [Cybersecurity Vulnerability Notice] SUSE Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505045.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505045.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505045.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Android 存在多個漏洞 Android 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升及遠端執行程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: 2024-12-01 前的 Android 保安更新級別 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://source.android.com/docs/security/bulletin/2024-12-01 https://www.kjintelligent.com/en/hot_505044.html [Cybersecurity Vulnerability Notice] Android 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505044.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505044.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505044.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 三星產品存在多個漏洞 三星產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行程式碼、繞過身份驗證、篡改及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Galaxy Watch running Android Watch 13, 14 Samsung mobile devices running Android 12, 13, 14 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://security.samsungmobile.com/securityUpdate.smsbhttps://semiconductor.samsung.com/support/quality-support/product-security-updates/ https://www.kjintelligent.com/en/hot_505043.html [Cybersecurity Vulnerability Notice] Samsung 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505043.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505043.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505043.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安威脅趨勢通知】伊朗駭客APT35利用假徵才網站對航太及半導體產業發動攻擊威脅情報業者ThreatBook的研究人員表示APT35最新一波攻擊,鎖定航太及半導體產業而來,其攻擊範圍橫跨美國、泰國、阿拉伯聯合大公國(UAE)、以色列,駭客利用假造的徵才網站及公司網站,並要求使用者必須透過VPN存取為由,誘騙他們下載惡意程式並執行,而在過程中攻擊者也濫用合法雲端服務,例如:OneDrive、Google Cloud、GitHub,從而隱匿行蹤。攻擊者為誘騙目標人士上當,不僅標記航太相關職缺的薪水高於其他工作,也製作授權存取應用程式的使用教學影片,藉以降低受害者戒心。若求職者依照指示下載駭客提供的檔案,其檔案將包含合法的OneDrive元件SignedConnection.exe,以及第一階段、第二階段的惡意程式secur32.dll、Qt5Core.dll。第一階段惡意工具是以C#打造而成,主要的功能包含提供SignedConnection.exe的圖形介面,並將黑白惡意軟體元件複製到電腦以及竄改登錄檔,讓這些惡意軟體隨著電腦開機載入。另一個惡意程式Qt5Core.dll,則是由secur32.dll改名後,再透過FileCoAuth.exe載入,並透過GitHub、Google Drive取得C2伺服器位址和建立通訊。IoC: msdnhelp[.]com xboxapicenter[.]com visioffline[.]com c1f1ce81115bed45c594aeeb92adb687bb04478cb40bb9dab538277d0c8cc13e bf308e5c91bcd04473126de716e3e668cac6cb1ac9c301132d61845a6d4cb362 cfdc7747b716be5817ce1bc76decfb3e1b27113545a01558ed97ab5fd024c53e 918e70e3f5fdafad28effd512b2f2d21c86cb3d3f14ec14f7ff9e7f0760fd760 88097e4780bfdc184b16c5a8a90793983676ad43749ffca49c9d70780e32c33a e5fbaab1270deb86b419abb348f19c2b9afd6e5c2e151c4d0869f6c5d889e029 db034eb09fea48cc77d19804126f64c5336dd4e33b3884dc33d5336a434cb315 情資報告連結:https://threatbook.io/blog/id/1095 https://www.kjintelligent.com/en/hot_505226.html [Information security threats] APT35 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505226.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505226.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505226.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在遠端執行程式碼漏洞 Google Chrome 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 131.0.6778.108 (Linux) 之前的版本 Google Chrome 131.0.6778.108/.109 (Mac) 之前的版本 Google Chrome 131.0.6778.108/.109 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 請更新至 131.0.6778.108 (Linux) 或之後版本。 請更新至 131.0.6778.108/.109 (Mac) 或之後版本。 請更新至 131.0.6778.108/.109 (Windows) 或之後版本。 情資報告連結:https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop.html https://www.kjintelligent.com/en/hot_505042.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505042.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_505042.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_505042.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - GitLab 存在多個漏洞 GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、繞過身份驗證及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: GitLab Community Edition (CE) 17.6.1, 17.5.3 及 17.4.5 以前的版本 GitLab Enterprise Edition (EE) 17.6.1, 17.5.3 及 17.4.5 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://about.gitlab.com/releases/2024/11/26/patch-release-gitlab-17-6-1-released/ https://www.kjintelligent.com/en/hot_504781.html [Cybersecurity Vulnerability Notice] GitLab 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504781.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504781.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504781.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - F5 產品存在多個漏洞 F5 產品存在多個漏洞,允許攻擊者利用此漏洞,於目標系統觸發阻斷服務狀況及篡改,其影響系統或版本如下: 受影響之系統/漏洞描述: BIG-IP (all modules) 15.1.0 - 15.1.10 16.1.0 - 16.1.5 17.1.0 - 17.1.1 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 儘速導入雲智維服務,進行資安威脅情資偵測與聯防,降低企業資安風險。 避免對外開放相關管理服務或介面或僅允許信任來源存取存在漏洞之系統。 情資報告連結:https://my.f5.com/manage/s/article/K000148692https://my.f5.com/manage/s/article/K000148690 https://www.kjintelligent.com/en/hot_504780.html [Cybersecurity Vulnerability Notice] F5 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504780.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504780.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504780.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Jenkins 存在多個漏洞 Jenkins 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、跨網站指令碼及阻斷服務,其影響系統或版本如下: 受影響之系統/漏洞描述: Jenkins 2.486 及以前的版本 Jenkins LTS 2.479.1 及以前的版本 Filesystem List Parameter Plugin 0.0.14 及以前的版本 Simple Queue Plugin 1.4.4 及以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.jenkins.io/security/advisory/2024-11-27/ https://www.kjintelligent.com/en/hot_504779.html [Cybersecurity Vulnerability Notice] Jenkins 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504779.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504779.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504779.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Mozilla 產品存在多個漏洞 Mozilla 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、阻斷服務狀況、敏感資料洩露、遠端執行任意程式碼、繞過身份驗證、篡改及彷冒,其影響系統或版本如下: 受影響之系統/漏洞描述: Firefox 133 之前的版本 Firefox ESR 128.5 之前的版本 Firefox ESR 115.18 之前的版本 Firefox for iOS 133 之前的版本 Thunderbird 133 之前的版本 Thunderbird 128.5 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Firefox 133。 請更新至 Firefox ESR 128.5。 請更新至 Firefox ESR 115.18。 請更新至 Firefox for iOS 133。 請更新至 Thunderbird 133。 請更新至 Thunderbird 128.5。 情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2024-63/https://www.mozilla.org/en-US/security/advisories/mfsa2024-64/https://www.mozilla.org/en-US/security/advisories/mfsa2024-65/https://www.mozilla.org/en-US/security/advisories/mfsa2024-66/https://www.mozilla.org/en-US/security/advisories/mfsa2024-67/https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/ https://www.kjintelligent.com/en/hot_504778.html [Cybersecurity Vulnerability Notice] Mozilla 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504778.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504778.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504778.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - QNAP NAS 存在多個漏洞 QNAP NAS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料及資料篡改,其影響系統或版本如下: 受影響之系統/漏洞描述: QTS 5.1.x QuTS hero h5.1.x QTS 5.2.x QuTS hero h5.2.x 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將QTS 5.2.x更新至 QTS 5.2.1.2930 build 20241025 或之後的版本。 請將QuTS hero h5.2.x更新至 QuTS hero h5.2.1.2929 build 20241025 或之後的版本。 請將QTS 5.1.x更新至 QTS 5.1.8.2823 build 20240712 或之後的版本。 請將QuTS hero h5.1.x更新至 QuTS hero h5.1.8.2823 build 20240712 或之後的版本。 情資報告連結:https://www.qnap.com/en/security-advisory/qsa-24-43https://www.qnap.com/en/security-advisory/qsa-24-37 https://www.kjintelligent.com/en/hot_504775.html [Cybersecurity Vulnerability Notice] QNAP NAS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504775.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504775.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504775.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Debian Linux 內核存在多個漏洞 Debian Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及洩露敏感資料,其影響系統或版本如下: 受影響之系統/漏洞描述: Debian bookworm 6.1.119-1 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://lists.debian.org/debian-security-announce/2024/msg00233.html https://www.kjintelligent.com/en/hot_504774.html [Cybersecurity Vulnerability Notice] Debian Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504774.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504774.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504774.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及彷冒,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 131.0.2903.63 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge (Stable) 131.0.2903.63 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#november-21-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11395https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49054 https://www.kjintelligent.com/en/hot_504773.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504773.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504773.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504773.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Drupal 存在多個漏洞 Drupal Core 存仔多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、遠端執行程式碼、繞過身份驗證及資料篡改,其影響系統或版本如下: 受影響之系統/漏洞描述: Drupal 7.102 之前版本 Drupal 10.2.11 之前版本 Drupal 10.3.9 之前版本 Drupal 11.0.8 之前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將 Drupal 7 更新到 Drupal 7.102。 請將 Drupal 10.2 更新到 Drupal 10.2.11 請將 Drupal 10.3 更新到 Drupal 10.3.9 請將 Drupal 11.0 更新到 Drupal 11.0.8 情資報告連結:https://www.drupal.org/sa-core-2024-003https://www.drupal.org/sa-core-2024-004https://www.drupal.org/sa-core-2024-005https://www.drupal.org/sa-core-2024-006https://www.drupal.org/sa-core-2024-007https://www.drupal.org/sa-core-2024-008 https://www.kjintelligent.com/en/hot_504333.html [Cybersecurity Vulnerability Notice] Drupal 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504333.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504333.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504333.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - PHP 存在多個漏洞 PHP 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發資料篡改、敏感資料洩露及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: PHP 8.4.1 之前的版本 PHP 8.3.14 之前的版本 PHP 8.2.26 之前的版本 PHP 8.1.31 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 PHP 8.4.1 請更新至 PHP 8.3.14 請更新至 PHP 8.2.26 請更新至 PHP 8.1.31情資報告連結:https://www.php.net/ChangeLog-8.php https://www.kjintelligent.com/en/hot_504328.html [Cybersecurity Vulnerability Notice] PHP 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504328.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504328.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504328.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ruckus 產品存在遠端執行任意程式碼漏洞 Ruckus 產品存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼漏洞,其影響系統或版本如下: 受影響之系統/漏洞描述: RUCKUS H350 RUCKUS H550 RUCKUS R350 RUCKUS R350e RUCKUS R670 RUCKUS T350c RUCKUS T350d RUCKUS T350se RUCKUS T670 Ruckus Q410 Ruckus Q710 Ruckus Q910 Ruckus R550 Ruckus R560 Ruckus R650 Ruckus R750 Ruckus R760 Ruckus R770 Ruckus R850 Ruckus T750 Ruckus T750SE SmartZone 144 (SZ-144) SmartZone 144 (SZ-144) - Federal SmartZone 300 (SZ300) SmartZone 300 (SZ300) - Federal Unleashed and Multi-Site Manager 停止支援產品: RUCKUS T811-CM (Non-SFP) RUCKUS T811-CM Ruckus C110 Ruckus C500 Ruckus E510 Ruckus H320 Ruckus H500 Ruckus H510 Ruckus P300 Ruckus R300 Ruckus R310 Ruckus R320 Ruckus R500 Ruckus R510 Ruckus R600 Ruckus R610 Ruckus R700 Ruckus R710 Ruckus R720 Ruckus R730 Ruckus T300 Ruckus T301n Ruckus T301s Ruckus T310c Ruckus T310d Ruckus T310n Ruckus T310s Ruckus T504 Ruckus T610 Ruckus T710 Ruckus T710s SmartCell Gateway 200 (SCG200) SmartZone 100 (SZ-100) SmartZone 100-D (SZ100-D) ZoneDirector 1100 ZoneDirector 1200 ZoneDirector 3000 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 如版本尚在支援範圍,應盡快進行更新作業,連結:https://support.ruckuswireless.com/security_bulletins/326 如版本已不在支援範圍,應盡快汰換設備。 情資報告連結:https://support.ruckuswireless.com/security_bulletins/326 https://www.kjintelligent.com/en/hot_504022.html [Cybersecurity Vulnerability Notice] Ruckus 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504022.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504022.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504022.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Palo Alto PAN-OS 存在多個漏洞 Palo Alto PAN-OS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升及繞過身份驗證,CVE-2024-9474 允許擁有管理 web 介面存取權限的 PAN-OS 管理員,以root權限在防火牆上執行動作。CVE-2024-0012 可讓未認證的攻擊者透過網路存取管理 Web 介面,取得 PAN-OS 管理員權限,以執行管理動作、竄改組態或利用其他認證權限升級漏洞 (如 CVE-2024-9474),其影響系統或版本如下: 受影響之系統/漏洞描述: PAN-OS 10.1.14-h6 之前的 PAN-OS 10.1 版本 PAN-OS 10.2.12-h2 之前的 PAN-OS 10.2 版本 PAN-OS 11.0.6-h1 之前的 PAN-OS 11.0 版本 PAN-OS 11.1.5-h1 之前的 PAN-OS 11.1 版本 PAN-OS 11.2.4-h1 之前的 PAN-OS 11.2 版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: https://security.paloaltonetworks.com/CVE-2024-0012https://security.paloaltonetworks.com/CVE-2024-9474 情資報告連結:https://security.paloaltonetworks.com/CVE-2024-0012https://security.paloaltonetworks.com/CVE-2024-9474 https://www.kjintelligent.com/en/hot_504021.html [Cybersecurity Vulnerability Notice] Palo Alto PAN-OS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504021.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504021.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504021.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Apache Tomcat 存在多個漏洞 Apache Tomcat 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、跨網站指令碼及資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Apache Tomcat 11.0.0 版本 Apache Tomcat 11.0.0-M1 至 11.0.0-M26 版本 Apache Tomcat 10.1.31 版本 Apache Tomcat version 10.1.0-M1 至 10.1.30 版本 Apache Tomcat 9.0.96 版本 Apache Tomcat 9.0.0-M1 至 9.9.95 版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Apache Tomcat 11.0.1 或之後版本。 請更新至 Apache Tomcat 10.1.33 或之後版本。 請更新至 Apache Tomcat 9.0.97 或之後版本。 情資報告連結:https://tomcat.apache.org/security-11.htmlhttps://tomcat.apache.org/security-10.htmlhttps://tomcat.apache.org/security-9.html https://www.kjintelligent.com/en/hot_504020.html [Cybersecurity Vulnerability Notice] Apache Tomcat 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504020.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504020.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504020.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在阻斷服務漏洞 Google Chrome 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 131.0.6778.85 (Linux) 之前的版本 Google Chrome 131.0.6778.85/.86 (Mac) 之前的版本 Google Chrome 131.0.6778.85/.86 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 131.0.6778.85 (Linux) 或之後版本。 請更新至 131.0.6778.85/.86 (Mac) 或之後版本。 請更新至 131.0.6778.85/.86 (Windows) 或之後版本。 情資報告連結:https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop_19.html https://www.kjintelligent.com/en/hot_504019.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504019.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504019.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504019.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 蘋果產品存在多個漏洞 蘋果產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及跨網站指令碼,其影響系統或版本如下: 受影響之系統/漏洞描述: macOS Sequoia 15.1.1 以前的版本 iOS 17.7.2 及 iPadOS 17.7.2 以前的版本 iOS 18.1.1 及 iPadOS 18.1.1 以前的版本 visionOS 2.1.1 以前的版本 Safari 18.1.1 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 macOS Sequoia 15.1.1。 請更新至 iOS 17.7.2 and iPadOS 17.7.2。 請更新至 iOS 18.1.1 and iPadOS 18.1.1。 請更新至 visionOS 2.1.1。 請更新至 Safari 18.1.1。 情資報告連結:https://support.apple.com/en-us/121752https://support.apple.com/en-us/121753https://support.apple.com/en-us/121754https://support.apple.com/en-us/121755https://support.apple.com/en-us/121756 https://www.kjintelligent.com/en/hot_504018.html [Cybersecurity Vulnerability Notice] Apple Products 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504018.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_504018.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_504018.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Fortinet 產品存在多個漏洞 Fortinet 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、繞過身份驗證、篡改及權限提升,其影響系統或版本如下: 受影響之系統/漏洞描述: FortiAnalyzer FortiAnalyzer 6.2 所有版本 FortiAnalyzer 6.4 所有版本 FortiAnalyzer 7.0 所有版本 FortiAnalyzer 7.2 版本 7.2.0 至 7.2.5 FortiAnalyzer 7.4 版本 7.4.0 至 7.4.2 FortiAnalyzer-BigData FortiAnalyzer-BigData 6.2 所有版本 FortiAnalyzer-BigData 6.4 所有版本 FortiAnalyzer-BigData 7.0 所有版本 FortiAnalyzer-BigData 7.2 版本 7.2.0 至 7.2.7 FortiAnalyzer-BigData 7.4 版本 7.4.0 FortiManager FortiManager 6.2 所有版本 FortiManager 6.4 所有版本 FortiManager 7.0 所有版本 FortiManager 7.2 版本 7.2.0 至 7.2.5 FortiManager 7.4 版本 7.4.0 至 7.4.2 FortiOS FortiOS 6.0 所有版本 FortiOS 6.2 所有版本 FortiOS 6.4 所有版本 FortiOS 7.0 所有版本 FortiOS 7.2 版本 7.2.0 至 7.2.8 FortiOS 7.4 版本 7.4.0 至 7.4.3 FortiProxy FortiProxy 1.0 所有版本 FortiProxy 1.1 所有版本 FortiProxy 1.2 所有版本 FortiProxy 2.0 所有版本 FortiProxy 7.0 版本 7.0.0 至 7.0.16 FortiProxy 7.2 版本 7.2.0 至 7.2.9 FortiProxy 7.4 版本 7.4.0 至 7.4.3 FortiClientWindows FortiClientWindows 6.4 所有版本 FortiClientWindows 7.0 版本 7.0.0 至 7.0.12 FortiClientWindows 7.2 版本 7.2.0 至 7.2.4 FortiClientWindows 7.4 版本 7.4.0 FortiClientMac FortiClientMac 6.4 所有版本 FortiClientMac 7.0 版本 7.0.0 至 7.0.10 FortiClientMac 7.2 版本 7.2.0 至 7.2.4 FortiClientMac 7.4 版本 7.4.0 FortiWeb FortiWeb 6.3 所有版本 FortiWeb 7.0 所有版本 FortiWeb 7.2 所有版本 FortiWeb 7.4 版本 7.4.0 至 7.4.3 FortiWeb 7.6 版本 7.6.0 FortiSwitchManager FortiSwitchManager 7.0 版本 7.0.0 至 7.0.3 FortiSwitchManager 7.2 版本 7.2.0 至 7.2.3 FortiPAM FortiPAM 1.0 所有版本 FortiPAM 1.1 所有版本 FortiPAM 1.2 所有版本 FortiPortal FortiPortal 5.3 所有版本 FortiPortal 6.0 版本 6.0.0 至 6.0.14 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://fortiguard.fortinet.com/psirt/FG-IR-23-267https://fortiguard.fortinet.com/psirt/FG-IR-23-396https://fortiguard.fortinet.com/psirt/FG-IR-23-475https://fortiguard.fortinet.com/psirt/FG-IR-24-015https://fortiguard.fortinet.com/psirt/FG-IR-24-022https://fortiguard.fortinet.com/psirt/FG-IR-24-032https://fortiguard.fortinet.com/psirt/FG-IR-24-033https://fortiguard.fortinet.com/psirt/FG-IR-24-098https://fortiguard.fortinet.com/psirt/FG-IR-24-099https://fortiguard.fortinet.com/psirt/FG-IR-24-115https://fortiguard.fortinet.com/psirt/FG-IR-24-116https://fortiguard.fortinet.com/psirt/FG-IR-24-125https://fortiguard.fortinet.com/psirt/FG-IR-24-144https://fortiguard.fortinet.com/psirt/FG-IR-24-179https://fortiguard.fortinet.com/psirt/FG-IR-24-180https://fortiguard.fortinet.com/psirt/FG-IR-24-199https://fortiguard.fortinet.com/psirt/FG-IR-24-205 https://www.kjintelligent.com/en/hot_503607.html [Cybersecurity Vulnerability Notice] Fortinet 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503607.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503607.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503607.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Palo Alto PAN-OS 存在多個漏洞 Palo Alto PAN-OS 存在多個漏洞, 允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、端執行任意程式碼、阻斷服務狀況、敏感資料洩露及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: PAN-OS 10.1.7 之前的 PAN-OS 10.1 版本 PAN-OS 10.1.10 之前的 PAN-OS 10.1 版本 PAN-OS 10.1.11 之前的 PAN-OS 10.1 版本 PAN-OS 10.1.14 之前的 PAN-OS 10.1 版本 PAN-OS 10.2.2 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.4-h5 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.4-h6 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.5 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.7-h16 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.8-h13 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.9-14 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.10-h7 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.11 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.11-h4 之前的 PAN-OS 10.2 版本 PAN-OS 10.2.12 之前的 PAN-OS 10.2 版本 PAN-OS 11.0.2 之前的 PAN-OS 11.0 版本 PAN-OS 11.0.3 之前的 PAN-OS 11.0 版本 PAN-OS 11.0.5 之前的 PAN-OS 11.0 版本 PAN-OS 11.0.6 之前的 PAN-OS 11.0 版本 PAN-OS 11.1.2-h14 之前的 PAN-OS 11.1 版本 PAN-OS 11.1.3-h10 之前的 PAN-OS 11.1 版本 PAN-OS 11.1.4 之前的 PAN-OS 11.1 版本 PAN-OS 11.1.5 之前的 PAN-OS 11.1 版本 PAN-OS 11.2.2-h3 之前的 PAN-OS 11.2 版本 PAN-OS 11.2.3 之前的 PAN-OS 11.2 版本 PAN-OS 11.2.4 之前的 PAN-OS 11.2 版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://securityadvisories.paloaltonetworks.com/CVE-2024-2550https://securityadvisories.paloaltonetworks.com/CVE-2024-2551https://securityadvisories.paloaltonetworks.com/CVE-2024-2552https://securityadvisories.paloaltonetworks.com/CVE-2024-5917https://securityadvisories.paloaltonetworks.com/CVE-2024-5918https://securityadvisories.paloaltonetworks.com/CVE-2024-5919https://securityadvisories.paloaltonetworks.com/CVE-2024-5920https://securityadvisories.paloaltonetworks.com/CVE-2024-9472 https://www.kjintelligent.com/en/hot_503606.html [Cybersecurity Vulnerability Notice] Palo Alto PAN-OS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503606.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503606.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503606.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發敏感資料洩露、繞過身份驗證、及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 131.0.2903.48 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge (Stable) 131.0.2903.48 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#november-14-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11110https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11111https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11112https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11113https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11114https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11115https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11116https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11117https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49025 https://www.kjintelligent.com/en/hot_503605.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503605.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503605.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503605.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Xen 存在多個漏洞 Xen 存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Xen 版本 4.6 至 4.19 Xen 版本 4.8 及更高版本 運行 HVM guests的 x86 系統 運行 PVH guests的 x86 系統 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://xenbits.xen.org/xsa/advisory-463.htmlhttps://xenbits.xen.org/xsa/advisory-464.html https://www.kjintelligent.com/en/hot_503604.html [Cybersecurity Vulnerability Notice] Xen 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503604.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503604.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503604.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ivanti 產品存在多個漏洞 Ivanti 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、權限提升、篡改及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Ivanti Avalanche 版本 6.4.5 及更早版本 Ivanti Connect Secure (ICS) 版本 22.7R2.2 及更早版本 Ivanti Policy Secure (IPS) 版本 22.7R1.1 及更早版本 Ivanti Secure Access Client (ISAC) 版本 22.7R3 及更早版本 Ivanti Endpoint Manager (EPM) 2022 SU6 9 月安全性更新及之前版本 Ivanti Endpoint Manager (EPM) 2024 年 9 月安全性更新及之前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將 Ivanti Avalanche 版本 6.4.5 及更早版本更新至6.4.6。 請將 Ivanti Connect Secure (ICS) 版本 22.7R2.2 及更早版本更新至22.7R2.3。 請將 Ivanti Policy Secure (IPS) 版本 22.7R1.1 及更早版本更新至22.7R1.2。 請將 Ivanti Secure Access Client (ISAC) 版本 22.7R3 及更早版本更新至22.7R4。 請將 Ivanti Endpoint Manager (EPM) 更新至2024 November Security Update, 2022 SU6 November Security Update。 情資報告連結:https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release?language=en_UShttps://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs?language=en_UShttps://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022?language=en_US https://www.kjintelligent.com/en/hot_503603.html [Cybersecurity Vulnerability Notice] Ivanti 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503603.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503603.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503603.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Mozilla Thunderbird 存在資料洩露漏洞 Mozilla Thunderbird 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Thunderbird 128.4.3以前版本 Thunderbird 132.0.1以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Thunderbird 128.4.3。 請更新至 Thunderbird 132.0.1。 情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2024-61/https://www.mozilla.org/en-US/security/advisories/mfsa2024-62/ https://www.kjintelligent.com/en/hot_503602.html [Cybersecurity Vulnerability Notice] Mozilla Thunderbird 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503602.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503602.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503602.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - GitLab 存在多個漏洞 GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、跨網站指令碼、遠端執行任意程式碼、繞過保安限制及敏感資料洩露。 存在風險 GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、跨網站指令碼、遠端執行任意程式碼、繞過保安限制及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: GitLab Community Edition (CE) 17.3.7, 17.4.4 及 17.5.2 以前的版本 GitLab Enterprise Edition (EE) 17.3.7, 17.4.4 及 17.5.2 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/ https://www.kjintelligent.com/en/hot_503598.html [Cybersecurity Vulnerability Notice] GitLab 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503598.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503598.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503598.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Citrix 產品存在多個漏洞 Citrix 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及遠端執行任意程式碼。CVE-2024-8068 和 CVE-2024-8069的概念驗證碼已被公開,攻擊者在利用漏洞之前需要經過身份驗證。 存在風險 Citrix 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及遠端執行任意程式碼。CVE-2024-8068 和 CVE-2024-8069的概念驗證碼已被公開,攻擊者在利用漏洞之前需要經過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: Citrix Virtual Apps and Desktops 2407 中 24.5.200.8 之前的版本 Citrix Virtual Apps and Desktops 1912 LTSR 中 CU9 hotfix 19.12.9100.6 之前的版本 Citrix Virtual Apps and Desktops 2203 LTSR 中 CU5 hotfix 22.03.5100.11 之前的版本 Citrix Virtual Apps and Desktops 2402 LTSR 中 CU1 hotfix 24.02.1200.16 之前的版本 NetScaler ADC 和 NetScaler Gateway 14.1 中 14.1-29.72 之前的版本 NetScaler ADC 和 NetScaler Gateway 13.1 中 13.1-55.34 之前的版本 NetScaler ADC 13.1-FIPS 中 13.1-37.207 之前的版本 NetScaler ADC 12.1-FIPS 中 12.1-55.321 之前的版本 NetScaler ADC 12.1-NDcPP 中 12.1-55.321 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新:https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_UShttps://support.citrix.com/s/article/CTX691608-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20248534-and-cve20248535?language=en_US情資報告連結:https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_UShttps://support.citrix.com/s/article/CTX691608-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20248534-and-cve20248535?language=en_UShttps://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/https://github.com/watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit https://www.kjintelligent.com/en/hot_503597.html [Cybersecurity Vulnerability Notice] Citrix 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503597.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503597.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503597.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 多個存在漏洞 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 131.0.6778.69 (Linux) 之前的版本 Google Chrome 131.0.6778.69/.70 (Mac) 之前的版本 Google Chrome 131.0.6778.69/.70 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 131.0.6778.69 (Linux) 或之後的版本。 請更新至 131.0.6778.69/.70 (Mac) 或之後的版本。 請更新至 131.0.6778.69/.70 (Windows) 或之後的版本。 情資報告連結:https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop_12.html https://www.kjintelligent.com/en/hot_503303.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503303.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503303.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503303.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Veeam 產品存在多個漏洞 Veeam 產品存在多個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發權限提升、遠端執行任意程式碼、篡改、繞過身份驗證及敏感資料洩露。CVE-2024-40711 正在被廣泛利用,該漏洞是由於反序列化不信任資料的弱點所導致,將允許未經身份驗證的攻擊者利用此漏洞觸發遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Veeam Backup & Replication 12.1.2.172 及所有早於版本 12 的版本 Veeam Agent for Linux 6.1.2.1781 及所有早於版本 6 的版本 Veeam ONE 12.1.0.3208 及所有早於版本 12 的版本 Veeam Service Provider Console 8.0.0.19552 及所有早於版本 8 和版本 7 的版本 Veeam Backup for Nutanix AHV Plug-In 12.5.1.8 及所有早於版本 12 的版本 Veeam Backup for Oracle Linux Virtualization Manager 和 Red Hat Virtualization Plug-In 12.4.1.45 及所有早於版本 12 的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將Veeam Backup & Replication 12.1.2.172 及所有早於版本 12 的版本更新至Veeam Backup & Replication 12.2 (build 12.2.0.334)。 請將Veeam Agent for Linux 6.1.2.1781 及所有早於版本 6 的版本至Veeam Agent for Linux 6.2 (build 6.2.0.101) 。 請將Veeam ONE 12.1.0.3208 及所有早於版本 12 的版本至Veeam ONE v12.2 (build 12.2.0.4093)。 請將Veeam Service Provider Console 8.0.0.19552 及所有早於版本 8 和版本 7 的版本至Veeam Service Provider Console v8.1 (build 8.1.0.21377)。 請將Veeam Backup for Nutanix AHV Plug-In 12.5.1.8 及所有早於版本 12 的版本至Veeam Backup for Nutanix AHV Plug-In v12.6.0.632。 請將Veeam Backup for Oracle Linux Virtualization Manager 和 Red Hat Virtualization Plug-In 12.4.1.45 及所有早於版本 12 的版本至Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization Plug-In v12.5.0.299 。 情資報告連結:https://www.veeam.com/kb4649 https://www.kjintelligent.com/en/hot_503301.html [Cybersecurity Vulnerability Notice] Veeam 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503301.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503301.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503301.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Synology 產品存在多個漏洞 Synology 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、仿冒、篡改及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Synology DSM 7.2.2 的 7.2.2-72806-1 之前的版本 Synology DSM 7.2.1 的版本 Synology DSM 7.1 的版本 Synology DSMUC 3.1 的版本 Synology BeeStation OS 1.1 的 1.1-65374 之前的版本 Synology BeeStation OS 1.0 的版本 Synology Replication Service for DSM 7.2 的 1.3.0-0423 之前的版本 Synology Replication Service for DSM 7.1 的 1.2.2-0353 之前的版本 Synology Drive Server for DSM 7.2.2 的 3.5.1-26102 之前的版本 Synology Drive Server for DSM 7.2.1 的版本 Synology Drive Server for DSM 7.1 的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將DSM 7.2.2更新至 7.2.2-72806-1 或之後的版本。 請將Synology Drive Server for DSM 7.2.2更新至 3.5.1-26102 或之後的版本。 請將Synology Drive Server for DSM 7.2.1更新至 3.5.0-26085 或之後的版本。 請將Synology Drive Server for DSM 7.1更新至 3.2.1-23280 或之後的版本。 請將Replication Service for DSM 7.2更新至 1.3.0-0423 或之後的版本。 請將Replication Service for DSM 7.1更新至 1.2.2-0353 或之後的版本。 請將BeeStation OS 1.1更新至 1.1-65374 或之後的版本。 請將BeeStation OS 1.0更新至 1.1-65374 或之後的版本。 情資報告連結:https://www.synology.com/en-us/security/advisory/Synology_SA_24_20https://www.synology.com/en-us/security/advisory/Synology_SA_24_21https://www.synology.com/en-us/security/advisory/Synology_SA_24_22https://www.synology.com/en-us/security/advisory/Synology_SA_24_23 https://www.kjintelligent.com/en/hot_503300.html [Cybersecurity Vulnerability Notice] Synology 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503300.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503300.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503300.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 130.0.2849.80 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge (Stable) 130.0.2849.80 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#november-7-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10826https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10827 https://www.kjintelligent.com/en/hot_503299.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503299.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503299.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503299.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Zoom 產品存在多個漏洞 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Zoom Meeting SDK for Android 6.2.0 之前的版本 Zoom Meeting SDK for Linux 6.2.0 之前的版本 Zoom Meeting SDK for Windows 6.2.0 之前的版本 Zoom Meeting SDK for iOS 6.2.0 之前的版本 Zoom Meeting SDK for macOS 6.1.5 之前的版本 Zoom Rooms App for macOS 6.1.5 之前的版本 Zoom Rooms Client for Windows 6.2.0 之前的版本 Zoom Rooms Client for iPad 6.2.0 之前的版本 Zoom Rooms Client for macOS 6.2.0 之前的版本 Zoom Rooms Controller for Android 6.2.0 之前的版本 Zoom Rooms Controller for Linux 6.2.0 之前的版本 Zoom Rooms Controller for Windows 6.2.0 之前的版本 Zoom Rooms Controller for macOS 6.2.0 之前的版本 Zoom Video SDK for Android 6.2.0 之前的版本 Zoom Video SDK for Linux 6.2.0 之前的版本 Zoom Video SDK for Windows 6.2.0 之前的版本 Zoom Video SDK for iOS 6.2.0 之前的版本 Zoom Video SDK for macOS 6.1.5 之前的版本 Zoom Workplace App for Android 6.2.0 之前的版本 Zoom Workplace App for Linux 6.2.0 之前的版本 Zoom Workplace App for Windows 6.2.0 之前的版本 Zoom Workplace App for iOS 6.2.0 之前的版本 Zoom Workplace App for macOS 6.1.5 之前的版本 Zoom Workplace VDI Client for Windows 6.1.12 之前的版本 (6.0.14 版本除外) 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.zoom.com/en/trust/security-bulletin/zsb-24039/https://www.zoom.com/en/trust/security-bulletin/zsb-24040/https://www.zoom.com/en/trust/security-bulletin/zsb-24041/https://www.zoom.com/en/trust/security-bulletin/zsb-24042/https://www.zoom.com/en/trust/security-bulletin/zsb-24043/https://www.zoom.com/en/trust/security-bulletin/zsb-24044/ https://www.kjintelligent.com/en/hot_503298.html [Cybersecurity Vulnerability Notice] Zoom 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503298.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503298.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503298.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Netgear 產品存在多個漏洞 Netgear 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、篡改、洩露敏感資料、遠端執行任意程式碼、權限提升、觸發阻斷服務狀況及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: NETGEAR WAX630E 10.8.8.7 之前的版本 NETGEAR XR1000 1.0.0.74 之前的版本 NETGEAR XR1000v2 1.1.1.22 之前的版本 NETGEAR Insight 7.4 之前的版本 NETGEAR RBK852 7.2.6.21 之前的版本 NETGEAR RBR850 7.2.6.21 之前的版本 NETGEAR RBS850 7.2.6.21 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://kb.netgear.com/000066407/Security-Advisory-for-Security-Misconfiguration-on-Some-Access-Points-PSV-2023-0141?article=000066407https://kb.netgear.com/000066408/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-PSV-2023-0117?article=000066408https://kb.netgear.com/000066409/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2023-0109?article=000066409https://kb.netgear.com/000066410/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2023-0047?article=000066410https://kb.netgear.com/000066412/Security-Advisory-for-Sensitive-Information-Disclosure-on-Insight-PSV-2024-0053?article=000066412https://kb.netgear.com/000066413/Security-Advisory-for-Reflected-Cross-Site-Scripting-on-Insight-PSV-2024-0035?article=000066413https://kb.netgear.com/000066414/Security-Advisory-for-Security-Misconfiguration-on-Some-WiFi-Systems-PSV-2021-0183?article=000066414 https://www.kjintelligent.com/en/hot_503297.html [Cybersecurity Vulnerability Notice] Netgear 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503297.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_503297.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_503297.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Veeam Backup & Replication 存在繞過保安限制漏洞 Veeam Backup & Replication 存在一個漏洞,允許遠端攻擊者可利用這個漏洞,於目標系統觸發繞過保安限制,其影響系統或版本如下: 受影響之系統/漏洞描述: Veeam Backup & Replication 10, 11, 12, 12.1, 12.2版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 12.2.0.334。 情資報告連結:https://www.veeam.com/kb4682 https://www.kjintelligent.com/en/hot_502934.html [Cybersecurity Vulnerability Notice] Veeam Backup & Replication 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502934.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502934.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502934.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 130.0.6723.116 (Linux) 之前的版本 Google Chrome 130.0.6723.116/.117 (Mac) 之前的版本 Google Chrome 130.0.6723.116/.117 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 130.0.6723.116 (Linux) 或之後的版本。 請更新至 130.0.6723.116/.117 (Mac) 或之後的版本。 請更新至 130.0.6723.116/.117 (Windows) 或之後的版本。 情資報告連結:https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html https://www.kjintelligent.com/en/hot_502933.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502933.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502933.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502933.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - RedHat Linux 核心存在多個漏洞 RedHat Linux核心存在多個漏洞,允許遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升,其影響系統或版本如下: 受影響之系統/漏洞描述: Red Hat Enterprise Linux for Real Time 8 x86_64 Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 Red Hat Enterprise Linux for x86_64 8 x86_64 Red Hat Enterprise Linux for IBM z Systems 8 s390x Red Hat Enterprise Linux for Power, little endian 8 ppc64le Red Hat Enterprise Linux for ARM 64 8 aarch64 Red Hat CodeReady Linux Builder for x86_64 8 x86_64 Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le Red Hat CodeReady Linux Builder for ARM 64 8 aarch64 Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://access.redhat.com/errata/RHSA-2024:8830https://access.redhat.com/errata/RHSA-2024:8831https://access.redhat.com/errata/RHSA-2024:8856https://access.redhat.com/errata/RHSA-2024:8870 https://www.kjintelligent.com/en/hot_502932.html [Cybersecurity Vulnerability Notice] RedHat Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502932.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502932.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502932.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Android 存在多個漏洞 Android 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發敏感資料洩露、阻斷服務狀況、權限提升及遠端執行程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: 2024-11-05 前的 Android 保安更新級別 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://source.android.com/docs/security/bulletin/2024-11-01 https://www.kjintelligent.com/en/hot_502931.html [Cybersecurity Vulnerability Notice] Android 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502931.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502931.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502931.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 三星產品存在多個漏洞 三星產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: 2024-11-05 前的 Android 保安更新級別 Android 12, 13, 14 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://security.samsungmobile.com/securityUpdate.smsbhttps://semiconductor.samsung.com/support/quality-support/product-security-updates/ https://www.kjintelligent.com/en/hot_502930.html [Cybersecurity Vulnerability Notice] Samsung Products 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502930.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502930.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502930.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Aruba 產品存在多個漏洞 Aruba產品存在多個漏洞,允許遠端攻擊者可利用此漏洞,於目標系統觸發洩露敏感資料、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: AOS-10.4.x.x: 10.4.1.4 及之前版本 Instant AOS-8.12.x.x: 8.12.0.2 及之前版本 Instant AOS-8.10.x.x: 8.10.0.13 及之前版本 以下已停止維護 (EoM) 的軟件版本受這些漏洞影響,但供應商未有發布有關解決方案: AOS-10.6.x.x: 所有版本 AOS-10.5.x.x: 所有版本 AOS-10.3.x.x: 所有版本 Instant AOS-8.11.x.x: 所有版本 Instant AOS-8.9.x.x: 所有版本 Instant AOS-8.8.x.x: 所有版本 Instant AOS-8.7.x.x: 所有版本 Instant AOS-8.6.x.x: 所有版本 Instant AOS-8.5.x.x: 所有版本 Instant AOS-8.4.x.x: 所有版本 Instant AOS-6.5.x.x: 所有版本 Instant AOS-6.4.x.x: 所有版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 AOS-10.7.x.x: 10.7.0.0 或更高版本。 請更新至 AOS-10.4.x.x: 10.4.1.5 或更高版本。 請更新至 Instant AOS-8.12.x.x: 8.12.0.3 或更高版本。 請更新至 Instant AOS-8.10.x.x: 8.10.0.14 或更高版本。 情資報告連結:https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04722en_us&docLocale=en_US https://www.kjintelligent.com/en/hot_502735.html [Cybersecurity Vulnerability Notice] Aruba 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502735.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502735.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502735.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Splunk 產品存在多個漏洞 Splunk 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行程式碼、繞過身份驗證及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Splunk Enterprise 9.1.0 至 9.1.5 版本 Splunk Enterprise 9.2.0 至 9.2.2 版本 Splunk Enterprise 9.3.0 版本 Splunk Add-on for Cisco Meraki 2.2.0 以下版本 Splunk Add-on for Google Cloud Platform 4.7.0 以下版本 Splunk Add-on for Office 365 4.5.2 以下版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://advisory.splunk.com/advisories/SVD-2024-1012https://advisory.splunk.com/advisories/SVD-2024-1013https://advisory.splunk.com/advisories/SVD-2024-1014https://advisory.splunk.com/advisories/SVD-2024-1015 https://www.kjintelligent.com/en/hot_502688.html [Cybersecurity Vulnerability Notice] Splunk 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502688.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502688.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502688.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ubuntu Linux 核心存在多個漏洞 Ubuntu Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下: 受影響之系統/漏洞描述: Ubuntu 20.04 LTS Ubuntu 22.04 LTS Ubuntu 24.04 LTS 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7021-5https://ubuntu.com/security/notices/USN-7076-2https://ubuntu.com/security/notices/USN-7088-1https://ubuntu.com/security/notices/USN-7089-1https://ubuntu.com/security/notices/USN-7090-1 https://www.kjintelligent.com/en/hot_502687.html [Cybersecurity Vulnerability Notice] Ubuntu Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502687.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502687.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502687.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Synology 產品存在遠端執行程式碼漏洞 Synology 產品存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: BeePhotos for BeeStation OS 1.0 BeePhotos for BeeStation OS 1.1 Synology Photos 1.6 for DSM 7.2 Synology Photos 1.7 for DSM 7.2 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.synology.com/en-global/security/advisory/Synology_SA_24_18https://www.synology.com/en-global/security/advisory/Synology_SA_24_19 https://www.kjintelligent.com/en/hot_502685.html [Cybersecurity Vulnerability Notice] Synology 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502685.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502685.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502685.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發資料篡改、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 130.0.2849.68 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge (Stable) 130.0.2849.68 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-31-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10487https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10488 https://www.kjintelligent.com/en/hot_502684.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502684.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502684.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502684.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - SUSE Linux 內核存在多個漏洞 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、敏感資料洩露、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: openSUSE Leap 15.3 openSUSE Leap 15.4 openSUSE Leap 15.5 SUSE Linux Enterprise High Performance Computing 12 SP5 SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise High Performance Computing 15 SP3 SUSE Linux Enterprise High Performance Computing 15 SP4 SUSE Linux Enterprise High Performance Computing 15 SP5 SUSE Linux Enterprise Live Patching 12-SP5 SUSE Linux Enterprise Live Patching 15-SP2 SUSE Linux Enterprise Live Patching 15-SP3 SUSE Linux Enterprise Live Patching 15-SP4 SUSE Linux Enterprise Live Patching 15-SP5 SUSE Linux Enterprise Live Patching 15-SP6 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Micro 5.3 SUSE Linux Enterprise Micro 5.4 SUSE Linux Enterprise Micro 5.5 SUSE Linux Enterprise Real Time 15 SP4 SUSE Linux Enterprise Real Time 15 SP5 SUSE Linux Enterprise Real Time 15 SP6 SUSE Linux Enterprise Server 12 SP5 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server 15 SP3 SUSE Linux Enterprise Server 15 SP4 SUSE Linux Enterprise Server 15 SP5 SUSE Linux Enterprise Server 15 SP6 SUSE Linux Enterprise Server for SAP Applications 12 SP5 SUSE Linux Enterprise Server for SAP Applications 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 SUSE Linux Enterprise Server for SAP Applications 15 SP4 SUSE Linux Enterprise Server for SAP Applications 15 SP5 SUSE Linux Enterprise Server for SAP Applications 15 SP6 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.suse.com/support/update/announcement/2024/suse-su-20243780-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243782-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243783-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243793-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243794-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243796-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243797-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243798-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243799-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243800-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243803-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243804-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243805-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243806-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243814-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243815-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243816-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243820-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243821-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243822-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243824-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243829-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243830-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243831-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243833-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243834-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243835-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243836-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243837-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243881-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243840-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243842-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243848-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243849-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243850-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243851-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243852-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243854-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243855-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243856-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243857-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243859-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243860-1/ https://www.kjintelligent.com/en/hot_502452.html [Cybersecurity Vulnerability Notice] SUSE Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502452.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502452.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502452.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Squid 產品存在阻斷服務漏洞 Squid 產品存在一個漏洞,允許遠端使用者利用這漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下: 受影響之系統/漏洞描述: Squid 版本 3.x Squid 版本 4.x Squid 版本 5.x Squid 低於 6.10 的 6.x 版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Squid 6.10 版本。 情資報告連結:https://github.com/squid-cache/squid/security/advisories/GHSA-f975-v7qw-q7hj https://www.kjintelligent.com/en/hot_502451.html [Cybersecurity Vulnerability Notice] Squid 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502451.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502451.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502451.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Mozilla 產品存在多個漏洞 Mozilla 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、阻斷服務狀況、敏感資料洩露、遠端執行任意程式碼、繞過身份驗證及彷冒,其影響系統或版本如下: 受影響之系統/漏洞描述: Firefox 132 以前版本 Firefox ESR 128.4 以前版本 Firefox ESR 115.17 以前版本 Thunderbird 128.4 以前版本 Thunderbird 132 以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Firefox 132。 請更新至 Firefox ESR 128.4。 請更新至 Firefox ESR 115.17。 請更新至 Thunderbird 128.4。 請更新至 Thunderbird 132。 情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2024-55/https://www.mozilla.org/en-US/security/advisories/mfsa2024-56/https://www.mozilla.org/en-US/security/advisories/mfsa2024-57/https://www.mozilla.org/en-US/security/advisories/mfsa2024-58/https://www.mozilla.org/en-US/security/advisories/mfsa2024-59/ https://www.kjintelligent.com/en/hot_502450.html [Cybersecurity Vulnerability Notice] Mozilla 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502450.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502450.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502450.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 蘋果產品多存在個漏洞 蘋果產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、洩露敏感資料、資料篡改、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: iOS 18.1 及 iPadOS 18.1 以前的版本 iOS 17.7.1 及 iPadOS 17.7.1 以前的版本 macOS Sequoia 15.1 以前的版本 macOS Sequoia 14.7.1 以前的版本 macOS Ventura 13.7.1 以前的版本 watchOS 11.1 以前的版本 tvOS 18.1 以前的版本 visionOS 2.1 以前的版本 Safari 18.1 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 iOS 18.1 及 iPadOS 18.1。 請更新至iOS 17.7.1 及 iPadOS 17.7.1。 請更新至macOS Sequoia 15.1。 請更新至macOS Sequoia 14.7.1。 請更新至macOS Ventura 13.7.1。 請更新至watchOS 11.1。 請更新至tvOS 18.1 。 請更新至visionOS 2.1 。 請更新至Safari 18.1。 情資報告連結:https://support.apple.com/en-us/121563https://support.apple.com/en-us/121567https://support.apple.com/en-us/121564https://support.apple.com/en-us/121570https://support.apple.com/en-us/121568https://support.apple.com/en-us/121565https://support.apple.com/en-us/121569https://support.apple.com/en-us/121566https://support.apple.com/en-us/121571 https://www.kjintelligent.com/en/hot_502449.html [Cybersecurity Vulnerability Notice] Apple Products 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502449.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502449.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502449.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - QNAP NAS 存在遠端執行程式碼漏洞 QNAP NAS 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: SMB Service 4.15.002 之前版本 SMB Service h4.15.002 之前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 SMB Service 4.15.002 或之後的版本。 請更新至 SMB Service h4.15.002 或之後的版本。 情資報告連結:https://www.qnap.com/en/security-advisory/qsa-24-42 https://www.kjintelligent.com/en/hot_502447.html [Cybersecurity Vulnerability Notice] QNAP NAS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502447.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502447.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502447.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞 Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發繞過身份驗證、遠端執行任意程式碼及資料篡改,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 130.0.6723.91 (Linux) 之前的版本 Google Chrome 130.0.6723.91/.92 (Mac) 之前的版本 Google Chrome 130.0.6723.91/.92 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 130.0.6723.91 (Linux) 或之後的版本。 請更新至 130.0.6723.91/.92 (Mac) 或之後的版本。 請更新至 130.0.6723.91/.92 (Windows) 或之後的版本。 情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_29.html https://www.kjintelligent.com/en/hot_502431.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502431.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502431.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502431.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 旭聯科技 eHRD CTMS 存在多個漏洞 旭聯科技eHRD CTMS 存在Authentication Bypass、Insecure Direct Object ReferenceSQL Injection和漏洞, 允許未經身分鑑別之遠端攻擊者可透過滿足特定條件以繞過驗證存取特定功能、上傳檔案以及注入任意SQL指令以讀取、修改及刪除資料庫內容,其影響系統或版本如下: 受影響之系統/漏洞描述: Authentication Bypass Vulnerability CVE編號:CVE-2024-10438 漏洞描述:旭聯科技eHRD CTMS 存在Authentication Bypass 漏洞,允許未經身分鑑別之遠端攻擊者可透過滿足特定條件以繞過驗證存取特定功能。 影響系統/版本:eHRD CTMS 10.14(不含)以前版本。 Insecure Direct Object Reference Vulnerability CVE編號:CVE-2024-10439 漏洞描述:旭聯科技eHRD CTMS存在Insecure Direct Object Reference漏洞,允許未經身分鑑別之遠端攻擊者修改特定參數存取任意使用者上傳檔案。 影響系統/版本:eHRD CTMS 10.8(不含)之前版本。 SQL Injection Vulnerability CVE編號:CVE-2024-10440 漏洞描述:旭聯科技eHRD CTMS存在SQL Injection漏洞,允許未經身分鑑別之遠端攻擊者注入任意SQL指令以讀取、修改及刪除資料庫內容。 影響系統/版本:eHRD CTMS 10.0(不含)以前版本。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新或聯繫廠商進行修補。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8164-fe7c5-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8166-085c4-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8168-02720-1.html https://www.kjintelligent.com/en/hot_502430.html [Cybersecurity Vulnerability Notice] 旭聯科技 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502430.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502430.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502430.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 葳橋資訊之行政管理資訊系統存在多個漏洞 葳橋資訊行政管理資訊系統存在Path Traversal漏洞、未妥善驗證上傳檔案類型以及OS Command Injection漏洞,允許未經身分鑑別之遠端攻擊者利用此漏洞下載任意伺服器檔案或允許已取得一般權限之遠端攻擊者可上傳網頁後門程式並執行以及注入任意OS指令並執行,其影響系統或版本如下: 受影響之系統/漏洞描述: Arbitrary File Read through Path Traversal Vulnerability CVE編號:CVE-2024-10200 漏洞描述:葳橋資訊行政管理資訊系統存在Path Traversal漏洞,將允許未經身分鑑別之遠端攻擊者利用此漏洞下載任意伺服器檔案。 影響系統/版本:行政管理資訊系統。 Arbitrary File Upload Vulnerability CVE編號:CVE-2024-10201 漏洞描述:葳橋資訊行政管理資訊系統未妥善驗證上傳檔案類型,導致已取得一般權限之遠端攻擊者可上傳網頁後門程式並執行。 影響系統/版本:行政管理資訊系統。 OS Command Injection Vulnerability CVE編號:CVE-2024-10202 漏洞描述:葳橋資訊行政管理資訊系統存在OS Command Injection漏洞,將允許已取得一般權限之遠端攻擊者注入任意OS指令並執行。 影響系統/版本:行政管理資訊系統。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新或聯繫廠商進行修補。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8159-0f7a2-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8160-756b6-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8162-dc491-1.html https://www.kjintelligent.com/en/hot_502095.html [Cybersecurity Vulnerability Notice] 葳橋資訊 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502095.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502095.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502095.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge (Stable) 130.0.2849.56 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge (Stable) 130.0.2849.56 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-24-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10229https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10230https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10231 https://www.kjintelligent.com/en/hot_502094.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502094.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502094.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502094.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - GitLab 存在多個漏洞 GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及跨網站指令碼,其影響系統或版本如下: 受影響之系統/漏洞描述: GitLab Community Edition (CE) 17.3.6, 17.4.3 及 17.5.1 以前的版本 GitLab Enterprise Edition (EE) 17.3.6, 17.4.3 及 17.5.1 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://about.gitlab.com/releases/2024/10/23/patch-release-gitlab-17-5-1-released/ https://www.kjintelligent.com/en/hot_502092.html [Cybersecurity Vulnerability Notice] GitLab 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502092.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502092.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502092.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 中興保全科技之 WRTM326 存在 OS Command Injection 漏洞 中興保全科技之無線路由器 WRTM326 未妥善驗證特定參數,導致未經身分鑑別之遠端攻擊者,可藉由發送特製請求執行任意系統指令,其影響系統或版本如下: 受影響之系統/漏洞描述: WRTM326 2.3.20(不含)以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新或更換設備: 請更新 WRTM326 至 2.3.20(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8156-81c9d-1.html https://www.kjintelligent.com/en/hot_502091.html [Cybersecurity Vulnerability Notice] 中興保全科技 WRTM326 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502091.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502091.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502091.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 中興保全科技之 WRTR-304GN-304TW-UPSC 存在 OS Command Injection 漏洞 中興保全科技之 WRTR-304GN-304TW-UPSC 之特定功能未妥善過濾使用者輸入,導致未經身分鑑別之遠端攻擊者可利用此漏洞注入任意系統指令並於設備上執行,其影響系統或版本如下: 受影響之系統/漏洞描述: WRTR-304GN-304TW-UPSC V02 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新或更換設備: 該產品已不再維護,建議汰換設備。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8154-69fa5-1.html https://www.kjintelligent.com/en/hot_502083.html [Cybersecurity Vulnerability Notice] 中興保全科技 WRTR-304GN-304TW-UPSC 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502083.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502083.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502083.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 台灣數位學習科技之 ee-class 存在 SQL Injection 和 Local File Inclusion 漏洞 台灣數位科技之ee-class未妥善驗證特定頁面參數,允許已取得一般權限之遠端攻擊者注入任意 SQL 指令讀取、修改及刪除資料庫內容或可先上傳惡意php檔案,再利用此漏洞引用該檔案後於伺服器上執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: ee-class 20240326.13r14494(不含)以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 20240326.13r14494(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8142-cf0d3-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8144-2885b-1.html https://www.kjintelligent.com/en/hot_502067.html [Cybersecurity Vulnerability Notice] 台灣數位學習科技 ee-class 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502067.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502067.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502067.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 互動資通Team+企業私有雲溝通協作平台存在多個漏洞 互動資通Team+企業私有雲溝通協作平台未妥善驗證特定頁面參數,未經身分鑑別之遠端攻擊者可注入任意SQL指令讀取、修改及刪除資料庫內容或讀取任意系統檔案,其影響系統或版本如下: 受影響之系統/漏洞描述: SQL Injection Vulnerability CVE編號:CVE-2024-9921 漏洞描述:互動資通Team+企業私有雲溝通協作平台未妥善驗證特定頁面參數,導致未經身分鑑別之遠端攻擊者可注入任意SQL指令讀取、修改及刪除資料庫內容。 影響系統/版本:Team+ v13.5.x。 Arbitrary File Read through Path Traversal Vulnerability CVE編號:CVE-2024-9922 漏洞描述:互動資通Team+企業私有雲溝通協作平台未妥善驗證特定頁面參數,導致未經身分鑑別之遠端攻擊者可利用此漏洞讀取任意系統檔案。 影響系統/版本:Team+ v13.5.x。 Arbitrary File Move through Path Traversal Vulnerability CVE編號:CVE-2024-9923 漏洞描述:互動資通Team+企業私有雲溝通協作平台未妥善驗證特定頁面參數,導致已取得管理者權限之遠端攻擊者可將任意檔案移動至網站根目錄並進行存取。 影響系統/版本:Team+ v13.5.x。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 v14.0.0(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8124-d9b92-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8126-5d9d2-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8128-772aa-1.html https://www.kjintelligent.com/en/hot_502071.html [Cybersecurity Vulnerability Notice] 互動資通Team+ 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502071.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502071.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502071.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 立即科技企業之雲端資料庫存在多個漏洞 立即科技企業之雲端資料庫未妥善驗證特定頁面參數和特定功能之存取未進行身分驗證以及未妥善驗證上傳檔案類型,導致未經身分鑑別之遠端攻擊者可利用此漏洞讀取任意系統檔案、存取該功能取得任意使用者的 session cookie,或讓已取得一般權限的攻擊者可上傳網頁後門程式,並利用該後門程式於遠端伺服器執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Arbitrary File Read through Path Traversal Vulnerability CVE編號:CVE-2024-9983 漏洞描述:立即科技企業之雲端資料庫未妥善驗證特定頁面參數,導致未經身分鑑別之遠端攻擊者可利用此漏洞讀取任意系統檔案。 影響系統/版本:企業雲端資料庫 2024/08/08 09:45:25(不含)以前版本。 Missing Authentication Vulnerability CVE編號:CVE-2024-9984 漏洞描述:立即科技企業之雲端資料庫對特定功能之存取未進行身分驗證,導致未經身分鑑別之遠端攻擊者可存取該功能取得任意使用者的 session cookie。 影響系統/版本:企業雲端資料庫 2024/08/08 09:45:25(不含)以前版本。 Arbitrary File Upload Vulnerability CVE編號:CVE-2024-9985 漏洞描述:立即科技企業之雲端資料庫未妥善驗證上傳檔案類型,導致已取得一般權限的攻擊者可上傳網頁後門程式,並利用該後門程式於遠端伺服器執行任意程式碼。 影響系統/版本:企業雲端資料庫 2024/08/08 09:45:25(不含)以前版本。 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 2024/08/08 09:45:25(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8148-ed790-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8150-c955a-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8152-09e81-1.html https://www.kjintelligent.com/en/hot_502070.html [Cybersecurity Vulnerability Notice] 立即科技 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502070.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502070.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502070.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - ESi直通國際之 AIM LINE行銷平台存在 SQL Injection 漏洞 ESi直通國際 AIM LINE行銷平台,在LINE活動模組啟用的情況下未妥善驗證特定查詢參數,將允許未經身分鑑別之遠端攻擊者可注入任意 FetchXml 指令讀取、修改及刪除資料庫內容,其影響系統或版本如下: 受影響之系統/漏洞描述: AIM LINE行銷平台 3.3 至 5.8.4 版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請聯繫廠商安裝修補程式或升級至6.0(含)以上版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8146-497a2-1.html https://www.kjintelligent.com/en/hot_502069.html [Cybersecurity Vulnerability Notice] ESi直通國際 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502069.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502069.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502069.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 昌佳企業財產管理資訊系統存在 SQL Injection 漏洞 昌佳企業財產管理資訊系統存在SQL Injection漏洞,其將允許未經身分鑑別之遠端攻擊者注入任意SQL指令以讀取、修改及刪除資料庫內容,其影響系統或版本如下: 受影響之系統/漏洞描述: 財產管理資訊系統 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請聯繫廠商進行更新作業。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8140-ee91e-1.html https://www.kjintelligent.com/en/hot_502012.html [Cybersecurity Vulnerability Notice] 昌佳企業 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502012.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502012.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502012.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 新人類科技資訊之 FlowMaster BPM Plus 存在 Privilege Escalation 和 SQL Injection 漏洞 新人類科技資訊之 FlowMaster BPM Plus存在權限提升漏洞以及特定查詢功能未妥善限制使用者輸入,其將允許已取得一般權限的遠端攻擊者可透過竄改特定cookie將權限提升至管理者權限以及注入SQL指令讀取、修改、刪除資料庫內容,其影響系統或版本如下: 受影響之系統/漏洞描述: FlowMaster BPM Plus Service Pack v5.3.1(不含)以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新 Service Pack 至 v5.3.1(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8136-4d5b4-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8138-d2bb7-1.html https://www.kjintelligent.com/en/hot_502011.html [Cybersecurity Vulnerability Notice] 新人類科技資訊 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502011.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502011.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502011.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 桓基科技之 OAKlouds 存在 Arbitrary File Read And Delete 漏洞 桓基科技之 OAKlouds 特定套件因 CVE-2024-26261 弱點未完整修補故仍存在風險,未經身分鑑別之遠端攻擊者可下載任意系統檔案,且該檔案下載完後有機會被刪除,其影響系統或版本如下: 受影響之系統/漏洞描述: OAKlouds-webbase-2.0 1162(不含)以前版本 OAKlouds-webbase-3.0 1162(不含)以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 OAKlouds-webbase-2.0 至 1162(含)以後版本。 請更新至 OAKlouds-webbase-3.0 至 1162(含)以後版本。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8130-89bb1-1.html https://www.kjintelligent.com/en/hot_502010.html [Cybersecurity Vulnerability Notice] 桓基科技 OAKlouds 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502010.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502010.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502010.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 新人類科技資訊之 WebEIP v3.0 存在 SQL injection 和 Reflected XSS漏洞 新人類科技資訊之 WebEIP v3.0 未妥善驗證使用者輸入,允許已取得一般權限之遠端攻擊者注入SQL指令讀取、修改、刪除資料庫內容或於特定參數插入JavaScript語法進行Reflected Cross-site scripting攻擊,受影響產品已不再進行維護,建議更換至新版產品,其影響系統或版本如下: 受影響之系統/漏洞描述: WebEIP v3.0 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新或更換設備:廠商表示WebEIP v3.0自釋出已逾15年,目前已停止提供服務與維護,建議更換至WebEIP Pro新版產品。 情資報告連結:https://www.twcert.org.tw/tw/cp-132-8132-160bb-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8134-c476d-1.html https://www.kjintelligent.com/en/hot_502009.html [Cybersecurity Vulnerability Notice] NewType Infortech 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502009.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_502009.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_502009.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Fortinet FortiManager 存在遠端執行程式碼漏洞 Fortinet FortiManager存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。CVE-2024-47575 正被廣泛利用,其導致原因是FortiManager的fgfmd服務中缺少關鍵功能驗證的漏洞,將允許未經身份驗證的遠端攻擊者透過特製請求執行任意程式碼或命令,其影響系統或版本如下: 受影響之系統/漏洞描述: FortiManager 7.6 的 7.6.0 版本 FortiManager 7.4 的 7.4.0 至 7.4.4 版本 FortiManager 7.2 的 7.2.0 至 7.2.7 版本 FortiManager 7.0 的 7.0.0 至 7.0.12 版本 FortiManager 6.4 的 6.4.0 至 6.4.14 版本 FortiManager 6.2 的 6.2.0 至 6.2.12 版本 FortiManager Cloud 7.4 的 7.4.1 至 7.4.4 版本 FortiManager Cloud 7.2 的 7.2.1 至 7.2.7 版本 FortiManager Cloud 7.0 的 7.0.1 至 7.0.12 版本 FortiManager Cloud 6.4 的 所有版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將FortiManager 7.6 的 7.6.0 版本更新至 7.6.1 或之後的版本。 請將FortiManager 7.4 的 7.4.0 至 7.4.4 版本更新至 7.4.5 或之後的版本。 請將FortiManager 7.2 的 7.2.0 至 7.2.7 版本更新至 7.2.8 或之後的版本。 請將FortiManager 7.0 的 7.0.0 至 7.0.12 版本更新至 7.0.13 或之後的版本。 請將FortiManager 6.4 的 6.4.0 至 6.4.14 版本更新至 6.4.15 或之後的版本。 請將FortiManager 6.2 的 6.2.0 至 6.2.12 版本更新至 6.2.13 或之後的版本。 請將FortiManager Cloud 7.4 的 7.4.1 至 7.4.4 版本更新至 7.4.5 或之後的版本。 請將FortiManager Cloud 7.2 的 7.2.1 至 7.2.7 版本更新至 7.2.8 或之後的版本。 請將FortiManager Cloud 7.0 的 7.0.1 至 7.0.12 版本更新至 7.0.13 或之後的版本。 請將FortiManager Cloud 6.4 的所有版本更新。 情資報告連結:https://fortiguard.fortinet.com/psirt/FG-IR-24-423 https://www.kjintelligent.com/en/hot_501826.html [Cybersecurity Vulnerability Notice] Fortinet FortiManager 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501826.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501826.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501826.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 130.0.6723.69 (Linux) 之前的版本 Google Chrome 130.0.6723.69/.70 (Mac) 之前的版本 Google Chrome 130.0.6723.69/.70 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 130.0.6723.69 (Linux) 或之後的版本。 請更新至 130.0.6723.69/.70 (Mac) 或之後的版本。 請更新至 130.0.6723.69/.70 (Windows) 或之後的版本。 情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html https://www.kjintelligent.com/en/hot_501825.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501825.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501825.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501825.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Microsoft Edge Stable Channel 129.0.2792.89 之前的版本 Microsoft Edge Extended Stable Channel 128.0.2739.113 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 Microsoft Edge Stable Channel 129.0.2792.89 或之後版本。 請更新至 Microsoft Edge Extended Stable Channel 128.0.2739.113 或之後版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-10-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9602https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9603 https://www.kjintelligent.com/en/hot_501752.html [Cybersecurity Vulnerability Notice] Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501752.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501752.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501752.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - GitLab 存在多個漏洞 GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: GitLab Community Edition (CE) 17.4.2, 17.3.5 及 17.2.9 以前的版本 GitLab Enterprise Edition (EE) 17.4.2, 17.3.5 及 17.2.9 以前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://about.gitlab.com/releases/2024/10/09/patch-release-gitlab-17-4-2-released/ https://www.kjintelligent.com/en/hot_501744.html [Cybersecurity Vulnerability Notice] GitLab 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501744.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501744.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501744.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Juniper Junos OS 存在多個漏洞 Juniper Junos OS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料、遠端執行程式碼、權限提升及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: Junos OS Junos OS Evolved 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending&f:ctype=[Security%20Advisories] https://www.kjintelligent.com/en/hot_501743.html [Cybersecurity Vulnerability Notice] Juniper Junos OS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501743.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501743.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501743.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Mozilla Firefox 存在阻斷服務漏洞 Mozilla Firefox 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下: 受影響之系統/漏洞描述: Firefox 131.0.3以前版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 請更新至 Firefox 131.0.3。 情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2024-53/ https://www.kjintelligent.com/en/hot_501726.html [Cybersecurity Vulnerability Notice] Mozilla Firefox 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501726.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501726.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501726.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - ChromeOS 存在多個漏洞 ChromeOS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: 16002.58.0 之前的ChromeOS Stable版本(129.0.6668.110 之前的瀏覽器版本) 126.0.6478.255 之前的ChromeOS LTS版本 (15886.80.0之前的平臺版本 ) 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-chromeos_15.htmlhttps://chromereleases.googleblog.com/2024/10/long-term-support-channel-update-for.html https://www.kjintelligent.com/en/hot_501725.html [Cybersecurity Vulnerability Notice] ChromeOS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501725.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501725.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501725.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下: 受影響之系統/漏洞描述: Google Chrome 130.0.6723.58 (Linux) 之前的版本 Google Chrome 130.0.6723.58/.59(Mac) 之前的版本 Google Chrome 130.0.6723.58/.59 (Windows) 之前的版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新 130.0.6723.58 (Linux) 或之後的版本。 請更新 130.0.6723.58/.59 (Mac) 或之後的版本。 請更新 130.0.6723.58/.59 (Windows) 或之後的版本。 情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html https://www.kjintelligent.com/en/hot_501722.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501722.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501722.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501722.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Splunk 產品存在多個漏洞 Splunk 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、阻斷服務狀況、權限提升、遠端執行程式碼、繞過身份驗證及敏感資料洩露,其影響系統或版本如下: 受影響之系統/漏洞描述: Splunk Enterprise 9.3.0 版本 Splunk Enterprise 9.2.0 至 9.2.3 版本 Splunk Enterprise 9.1.0 至 9.1.5 版本 Splunk Enterprise 9.0.0 至 9.0.9 版本 Splunk Cloud Platform 9.2.2403.102 至 9.2.2403.102版本 Splunk Cloud Platform 9.1.2312.100 至 9.1.2312.109版本 Splunk Cloud Platform 9.1.2308.207 以下版本 Splunk Secure Gateway 3.6.0 至 3.6.16版本 Splunk Secure Gateway 3.4.259 以下版本 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://advisory.splunk.com/advisories/SVD-2024-1001https://advisory.splunk.com/advisories/SVD-2024-1002https://advisory.splunk.com/advisories/SVD-2024-1003https://advisory.splunk.com/advisories/SVD-2024-1004https://advisory.splunk.com/advisories/SVD-2024-1005https://advisory.splunk.com/advisories/SVD-2024-1006https://advisory.splunk.com/advisories/SVD-2024-1007https://advisory.splunk.com/advisories/SVD-2024-1008https://advisory.splunk.com/advisories/SVD-2024-1009https://advisory.splunk.com/advisories/SVD-2024-1010https://advisory.splunk.com/advisories/SVD-2024-1011 https://www.kjintelligent.com/en/hot_501721.html [Cybersecurity Vulnerability Notice] Splunk 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501721.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501721.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501721.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - IBM WebSphere 產品存在多個漏洞 IBM WebSphere 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下: 受影響之系統/漏洞描述: IBM WebSphere Application Server 版本 8.5 IBM WebSphere Application Server Liberty 20.0.0.12 - 24.0.0.10 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.ibm.com/support/pages/node/7173097https://www.ibm.com/support/pages/node/7173128 https://www.kjintelligent.com/en/hot_501719.html [Cybersecurity Vulnerability Notice] IBM WebSphere 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501719.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501719.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501719.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 甲骨文產品存在多個漏洞 於甲骨文產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露、篡改及繞過身份驗證,其影響系統或版本如下: 受影響之系統/漏洞描述: Oracle MySQL Java SE Oracle Database Server WebLogic Server VirtualBox 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.oracle.com/security-alerts/cpuoct2024verbose.html https://www.kjintelligent.com/en/hot_501716.html [Cybersecurity Vulnerability Notice] Oracle 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501716.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501716.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501716.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - F5 產品存在多個漏洞 F5 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及跨網站指令碼,其影響系統或版本如下: 受影響之系統/漏洞描述: 。BIG-IP (all modules): 15.1.0 - 15.1.10 16.1.0 - 16.1.5 17.1.0 - 17.1.1 。BIG-IQ Centralized Management: 8.2.0 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://my.f5.com/manage/s/article/K000140061https://my.f5.com/manage/s/article/K000141080 https://www.kjintelligent.com/en/hot_501715.html [Cybersecurity Vulnerability Notice] F5 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501715.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501715.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501715.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Kubernetes映像檔製作工具存在曝露root權限漏洞 Kubernetes維護團隊指出,映像檔建置工具(Image Builder)當中,存在漏洞CVE-2024-9486、CVE-2024-9594,能讓攻擊者能夠藉由預設帳密資料存取虛擬機器(VM),並得到root權限。 CVE-2024-9486:以Proxmox提供者(provider)建置而成的虛擬機器映像,無法停用當中的預設帳號,若用這些映像檔建置節點,可透過預設帳密進行存取,藉此取得root權限,CVSS風險評分達到9.8。 CVE-2024-9594:Nutanix、OVA、QEMU在映像建置過程也會啟用預設的帳密組態,而此預設帳密同樣可用於取得root權限,但在映像檔建置完成後,這些帳密就會被停用。只有當攻擊者能夠存取映像建置所在的虛擬機器並在建置期間,利用該漏洞修改映像時才會受到影響,CVSS評為6.3。 影響系統或版本如下: Kubernetes Image Builder versions <= v0.1.37 建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新至0.1.38版。 情資報告連結:https://github.com/kubernetes/kubernetes/issues/128006https://github.com/kubernetes/kubernetes/issues/128007 https://www.kjintelligent.com/en/hot_501586.html [Cybersecurity Vulnerability Notice] Kubernetes 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501586.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501586.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501586.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - Moxa路由器存在未經授權存取和操作系統命令注入漏洞Moxa 旗下部分行動通訊路由器、安全路由器、網路設備存在高風險漏洞CVE-2024-9137、CVE-2024-9139,並指出這些漏洞有可能導致未經授權存取或是系統損壞的情況。 CVE-2024-9137影響之產品下: EDR-8010 Series Firmware version 3.12.1 and earlier versions EDR-G9004 Seires Firmware version 3.12.1 and earlier versions EDR-G9010 Series Firmware version 3.12.1 and earlier versions EDR-G1002-BP Series Firmware version 3.12.1 and earlier versions NAT-102 Series Firmware version 1.0.5 and earlier versions OnCell G4302-LTE4 Series Firmware version 3.9 and earlier versions TN-4900 Series Firmware version 3.6 and earlier versions CVE-2024-9139:影響之產品如下: EDR-8010 Series Firmware version 3.12.1 and earlier versions EDR-G9004 Seires Firmware version 3.12.1 and earlier versions EDR-G9010 Series Firmware version 3.12.1 and earlier versions EDF-G1002-BP Series Firmware version 3.12.1 and earlier versions NAT-102 Series Firmware version 1.0.5 and earlier versions OnCell G4302-LTE4 Series Firmware version 3.9 and earlier versions TN-4900 Series Firmware version 3.6 and earlier versions 建議改善措施: 1. 企業及使用者如有上述漏洞版本應儘速更新至以下版本: EDR-8010 Series Upgrade to the firmware version 3.13 EDR-G9004 Series Upgrade to the firmware version 3.13 EDR-G9010 Series Upgrade to the firmware version 3.13 EDF-G1002-BP Series Upgrade to the firmware version 3.13 NAT-102 Series Please contact Moxa Technical Support for the security patch OnCell G4302-LTE4 Series Upgrade to the firmware version 3.13 TN-4900 Series Upgrade to the firmware version 3.13 2. 對於無法即時套用新版韌體的企業組織,緩解措施建議減少裝置曝露於網際網路、透過防火牆限制存取(白名單),以及採用入侵偵測系統(IDS)、入侵防禦系統(IPS)來偵測及防範漏洞利用的情況。 情資報告連結:https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241154-missing-authentication-and-os-command-injection-vulnerabilities-in-routers-and-network-security-appliances https://www.kjintelligent.com/en/hot_501354.html [Cybersecurity Vulnerability Notice] Moxa 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501354.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501354.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501354.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - SonicWall SSL-VPN SMA1000 和 Connect Tunnel Windows Client 存在多種漏洞SonicWall產品存在多種漏洞,其將允許攻擊者利用該漏洞,並導致阻斷服務和提升權限。 受影響之系統/漏洞描述: SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Denial-of-Service Vulnerability CVE編號:CVE-2024-45315 漏洞描述:SonicWall Connect Tunnel存在Link Fllowing漏洞,其將允許取得權限的攻擊者創建任意檔案夾和檔案,進而導致阻斷服務。 影響系統/版本: SonicWall Connect Tunnel (version 12.4.271 and earlier of Windows client) SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Local Privilege Escalation Vulnerability CVE編號:CVE-2024-45316 漏洞描述:SonicWall Connect Tunnel存在Link Fllowing漏洞,其將允許取得權限的攻擊者創建任意檔案夾和檔案,進而導致提升權限。 影響系統/版本:SonicWall Connect Tunnel (version 12.4.271 and earlier of Windows client) Unauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) Vulnerability CVE編號:CVE-2024-45317 漏洞描述:SMA1000 12.4.x存在Server-Side Request Forgery (SSRF)漏洞,其將允許未經授權之遠端攻擊者利用伺服器端應用程序發起請求,訪問不應訪問的IP。影響系統/版本:SMA1000 12.4.x 建議改善措施:    企業及使用者如有上述漏洞版本應儘速更新: 請將SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.271(含)以前版本更新至12.4.3.281或更高版本。 請將SMA1000 Appliance firmware 12.4.3-02676(含)以前版本更新至12.4.3-02758。 情資報告連結:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0017 https://www.kjintelligent.com/en/hot_501480.html [Cybersecurity Vulnerability Notice] SonicWall 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501480.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501480.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501480.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Palo Alto 產品存在多個漏洞Palo Alto 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及權限提升。受影響之系統/漏洞描述:PAN-OS 10.1 到 10.1.11 之前的版本PAN-OS 10.2 到 10.2.11 之前的版本PAN-OS 11.0 到 11.0.6 之前的版本PAN-OS 11.1 到 11.1.3 之前的版本GlobalProtect App 5.1GlobalProtect App 6.0GlobalProtect App 6.1GlobalProtect App 6.2 到 6.2.5 之前的版本GlobalProtect App 6.3 建議改善措施:企業及使用者如有上述漏洞版本應儘速更新: 安裝供應商提供的修補程式:https://security.paloaltonetworks.com/ 情資報告連結:https://security.paloaltonetworks.com/ https://www.kjintelligent.com/en/hot_501074.html [Cybersecurity Vulnerability Notice] Palo Alto 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501074.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501074.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501074.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安威脅趨勢通知】資安業者趨勢科技針對伊朗駭客OilRig近期的攻擊行動提出警告,指出駭客過程中會運用今年6月修補的Windows核心漏洞CVE-2024-30088,而能在受害主機提升權限至SYSTEM。駭客攻擊分析: 初始感染路徑:攻擊從上傳到具有Web Shell的Web 伺服器開始,Web Shell允許執行PowerShell命令和上傳、下載文件。攻擊者利用這一途徑下載ngrok遠端管理工具進行橫向移動,並進入網域控制器。 特權提升:攻擊者利用CVE-2024-30088進行特權提升,該漏洞允許執行SYSTEM級別的任意代碼。攻擊者使用RunPE-In-Memory技術將後門載入記憶體中,藉此達到隱蔽的效果。 持續性:攻擊者通過註冊密碼篩選DLL來攔截用戶的明文密碼,並將其外洩至由攻擊者控制的郵件地址。 資料竊取:資料外洩主要透過Exchange Server進行,攻擊者利用合法的帳號和密碼將被竊取的憑證和敏感資料作為附件發送到特定的郵箱。 https://www.kjintelligent.com/en/hot_501353.html [Cybersecurity Notice] OilRig 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501353.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501353.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501353.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ivanti 產品存在遠端執行程式碼漏洞Ivanti 產品存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行程式碼。受影響之系統/漏洞描述:Ivanti Connect Secure 9.1R18.9 以前版本Ivanti Connect Secure 22.7R2.1 以前版本Ivanti Policy Secure 22.7R1.1 以前版本 https://www.kjintelligent.com/en/hot_501073.html [Cybersecurity Vulnerability Notice] Ivanti 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501073.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501073.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501073.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Mozilla Firefox存在遠端執行程式碼漏洞Mozilla Firefox 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。受影響之系統/漏洞描述:Firefox 131.0.2以前版本Firefox ESR 115.16.1以前版本Firefox ESR 128.3.1以前版本 https://www.kjintelligent.com/en/hot_501072.html [Cybersecurity Vulnerability Notice] Mozilla Firefox 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501072.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501072.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501072.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 三星產品存在多個漏洞三星產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼及繞過身份驗證。受影響之系統/漏洞描述:2024-10-05 前的 Android 保安更新級別Android 12, 13, 14在部分Android 12,13 中的SMR Oct-2024 Release 1和在部分Android 14 中的SMR Sep-2024 Release 1Exynos 9820, 9825, 980, 990, 850, W920 https://www.kjintelligent.com/en/hot_501071.html [Cybersecurity Vulnerability Notice] Samsung 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501071.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501071.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501071.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Android 存在多個漏洞Android 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及遠端執行程式碼。受影響之系統/漏洞描述:2024-10-05 前的 Android 保安更新級別 https://www.kjintelligent.com/en/hot_501070.html [Cybersecurity Vulnerability Notice] Android 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501070.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501070.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501070.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Jenkins 存在多個漏洞Jenkins 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證及洩露敏感資料受影響之系統/漏洞描述:Jenkins 2.478 及以前的版本Jenkins LTS 2.462.2 及以前的版本 https://www.kjintelligent.com/en/hot_501069.html [Cybersecurity Vulnerability Notice] Jenkins 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501069.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501069.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501069.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼。受影響之系統/漏洞描述:Google Chrome 129.0.6668.100 (Linux) 之前的版本Google Chrome 129.0.6668.100/.101 (Mac) 之前的版本Google Chrome 129.0.6668.100/.101 (Windows) 之前的版本 https://www.kjintelligent.com/en/hot_501068.html [Cybersecurity Vulnerability Notice] Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501068.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_501068.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_501068.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - SUSE Linux 內核存在多個漏洞SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料、資料篡改及繞過身份驗證。受影響之系統/漏洞描述:SUSE Linux Enterprise High Availability Extension 15 SP2SUSE Linux Enterprise High Performance Computing 15 SP2SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2SUSE Linux Enterprise Live Patching 15-SP2SUSE Linux Enterprise Server 15 SP2SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2SUSE Linux Enterprise Server for SAP Applications 15 SP2SUSE Manager Proxy 4.1SUSE Manager Retail Branch Server 4.1SUSE Manager Server 4.1 https://www.kjintelligent.com/en/hot_500346.html [Cybersecurity Vulnerability Notice] SUSE Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500346.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500346.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500346.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Juniper 產品存在多個漏洞Juniper 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發篡改及繞過身份驗證。 受影響之系統/漏洞描述: Juniper Networks Junos OS: 21.4R3-S9 之前的所有版本、 22.2 至22.2R3-S5之間的版本、 22.4 至22.4R3-S5 之間的版本、 23.2 至23.2R2-S3之間的版本、 23.4 至23.4R2-S3 之間的版本、 24.2 至24.2R2 之間的版本; Juniper Networks Junos OS Evolved: 21.4R3-S9-EVO之前的所有版本、 22.2 至22.2R3-S5-EVO之間的版本、 22.3 至22.3R3-S4-EVO之間的版本、 22.4 至22.4R3-S5-EVO之間的版本、 23.2 至23.2R2-S3-EVO之間的版本、 23.4 至23.4R2-S3-EVO之間的版本、 24.2 至24.2R2-EVO之間的版本; Juniper Networks Junos OS on cRPD: 23.4 版本、 23.4R3-S5 之前的所有版本、 24.2 至24.2R2之間的版本; https://www.kjintelligent.com/en/hot_500345.html [Cybersecurity Vulnerability Notice] Juniper 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500345.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500345.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500345.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 思科產品存在多個漏洞於思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、資料篡改、跨網站指令碼及繞過身份驗證。 受影響之系統/漏洞描述: 1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco IOS XE Software 1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software 4000 Series ISRs running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software Catalyst 8000v Edge Software running a vulnerable release of Cisco IOS XE Software Catalyst 8000V Edge Software running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software Catalyst 8500L Edge Platforms running a vulnerable release of Cisco IOS XE Software Catalyst 8500L Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software Catalyst 9300X Series Switches running a vulnerable release of Cisco IOS XE Software Catalyst 9400X Supervisor Engines running a vulnerable release of Cisco IOS XE Software Catalyst 9500X Series Switches running a vulnerable release of Cisco IOS XE Software Catalyst 9600 Series Switches running a vulnerable release of Cisco IOS XE Software Catalyst 9800 Embedded Wireless Controllers for Catalyst 9300, 9400, and 9500 Series Switches running a vulnerable release of Cisco IOS XE Software Catalyst 9800 Series Wireless Controllers running a vulnerable release of Cisco IOS XE Software Catalyst 9800-CL Wireless Controllers for Cloud running a vulnerable release of Cisco IOS XE Software Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco IOS XE Software Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software Cisco ASR 1000 Series Aggregation Services Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a. Cisco Catalyst Center Cisco Catalyst SD-WAN Manager Cisco cBR-8 Converged Broadband Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a. Cisco IOS and IOS XE Software Crosswork NSO Embedded Wireless Controllers on Catalyst Access Points running a vulnerable release of Cisco IOS XE Software Industrial Ethernet 4000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later Industrial Ethernet 4010 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later Industrial Ethernet 5000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later Optical Site Manager RV340 Dual WAN Gigabit VPN Routers SD-WAN vEdge Cloud Routers SD-WAN vEdge Routers https://www.kjintelligent.com/en/hot_500344.html [Cybersecurity Vulnerability Notice] Cisco 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500344.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500344.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500344.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - F5 產品存在多個漏洞F5 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、繞過身份驗證及敏感資料洩露。受影響之系統/漏洞描述:Traffix SDC:5.1.0 漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼及洩露敏感資料。受影響之系統/漏洞描述:Google Chrome 129.0.6668.89 (Linux) 之前的版本Google Chrome 129.0.6668.89/.90 (Mac) 之前的版本Google Chrome 129.0.6668.89/.90 (Windows) 之前的版本 https://www.kjintelligent.com/en/hot_500343.html [Cybersecurity Vulnerability Notice] F5 & Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500343.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500343.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500343.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Mozilla 產品存在多個漏洞Mozilla 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料、資料篡改、跨網站指令碼及繞過身份驗證。受影響之系統/漏洞描述:Firefox 131以前版本Firefox ESR 128.3以前版本Firefox ESR 115.16以前版本Thunderbird 128.3以前版本Thunderbird 131以前版本 漏洞分享 - ChromeOS 存在多個漏洞ChromeOS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼及跨網站指令碼。受影響之系統/漏洞描述:129.0.6668.80 之前的瀏覽器版本 (作業系統版本: 16002.44.0) https://www.kjintelligent.com/en/hot_500342.html [Cybersecurity Vulnerability Notice] Mozilla、ChromeOS 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500342.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500342.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500342.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - RedHat Linux 核心存在多個漏洞RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、資料篡改及繞過身份驗證。受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64Red Hat Enterprise Linux for ARM 64 8 aarch64Red Hat Enterprise Linux for ARM 64 9 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390xRed Hat Enterprise Linux for IBM z Systems 8 s390xRed Hat Enterprise Linux for IBM z Systems 9 s390xRed Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for Power, little endian 8 ppc64leRed Hat Enterprise Linux for Power, little endian 9 ppc64leRed Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux for x86_64 8 x86_64Red Hat Enterprise Linux for x86_64 9 x86_64Red Hat Enterprise Linux Server - AUS 8.6 x86_64Red Hat Enterprise Linux Server - AUS 9.2 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server - TUS 8.6 x86_64Red Hat Enterprise Linux Server - TUS 8.8 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le https://www.kjintelligent.com/en/hot_500341.html [Cybersecurity Vulnerability Notice] RedHat Linux 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500341.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500341.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500341.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼及洩露敏感資料。受影響之系統/漏洞描述:Microsoft Edge Stable Channel 129.0.2792.79 之前的版本Microsoft Edge Extended Stable Channel 128.0.2739.107 之前的版本 漏洞分享 - 思科產品存在多個漏洞思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務。受影響之系統/漏洞描述:Cisco Meraki MX firmware及已啟用 Cisco AnyConnect VPN:MX64MX64WMX65MX65WMX67MX67CMX67WMX68MX68CWMX68WMX75MX84MX85MX95MX100MX105MX250MX400MX450MX600vMXZ3Z3CZ4Z4C https://www.kjintelligent.com/en/hot_500340.html [Cybersecurity Vulnerability Notice] Microsoft Edge、Cisco 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500340.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500340.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500340.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Debian Linux 內核存在多個漏洞Debian Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及洩露敏感資料。受影響之系統/漏洞描述:Debian bookworm 6.1.112-1 以前的版本 漏洞分享 - DrayTek 路由器存在在多個漏洞DrayTek 路由器存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式、碼跨網站指令碼、資料洩露及阻斷服務狀況。受影響之系統/漏洞描述:Vigor1000BVigor2962Vigor3910Vigor3912Vigor165Vigor166 Vigor2135Vigor2763Vigor2765Vigor2766Vigor2865Vigor2866Vigor2915Vigor2620VigorLTE200Vigor2133Vigor2762Vigor2832Vigor2860Vigor2925Vigor2862Vigor2926Vigor2952Vigor3220 https://www.kjintelligent.com/en/hot_500339.html [Cybersecurity Vulnerability Notice] Debian Linux、DrayTek 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500339.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_500339.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_500339.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 基點資訊 Secure Email Gateway 存在 Buffer Overflow 漏洞基點資訊 Secure Email Gateway 的身分認證程序存在 Buffer Overflow 漏洞,其將未經身分鑑別之遠端攻擊者可發送特製封包使該驗證程序崩潰,進而繞過驗證取得系統管理員身分。受影響之系統/漏洞描述:Secure Email Gateway 4.2.1 至 4.5.0 漏洞分享 - D-Link 無線路由器存在多種漏洞D-Link無線路由器部分型號存在漏洞,其將允許未經授權之遠端攻擊者,於易受影響之系統進行攻擊,並注入任意OS指令、執行任意程式碼。受影響之系統/漏洞描述:Stack-based Buffer Overflow漏洞CVE編號:CVE-2024-45694、CVE-2024-45695漏洞描述:D-Link無線路由器部分型號之網頁服務存在Stack-based Buffer Overflow漏洞,其將允許未經身分鑑別之遠端攻擊者利用此漏洞於設備上執行任意程式碼。影響系統/版本:DIR-X5460 A1 韌體 1.01, 1.02, 1.04, 1.10 版本。DIR-X4860 A1 韌體 1.00, 1.04 版本。Hidden Functionality漏洞CVE編號:CVE-2024-8778、CVE-2024-45697漏洞描述:D-Link無線路由器部分型號存在隱藏功能,其將允許攻擊者發送特定封包至網頁服務後可強制啟用telnet服務,並用hard-coded帳號通行碼進行登入與操作。透過此方式開啟的telnet服務必須與設備在同一區域網才能存取。D-Link無線路由器部分型號存在隱藏功能,於WAN port插線的情況下telnet服務會被強制啟用,未經身分鑑別之遠端攻擊者可利用hard-coded帳號通行碼進行登入並執行OS指令。影響系統/版本:DIR-X4860 A1 韌體 1.00, 1.04 版本。COVR-X1870 韌體 1.02(含)以下版本。OS Command Injection漏洞CVE編號:CVE-2024-45698漏洞描述:D-Link無線路由器部分型號之telnet服務未妥善驗證使用者輸入,允許未經身分鑑別之遠端攻擊者利用Hard-Coded帳號通行碼登入telnet後,可注入任意OS指令並於設備上執行。影響系統/版本:DIR-X4860 A1 韌體 1.00, 1.04 版本。 https://www.kjintelligent.com/en/hot_499809.html [Cybersecurity Vulnerability Notice] 基點資訊、D-Link 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499809.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499809.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499809.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 碩網資訊之智能客服 SmartRobot存在Cross-site Scripting漏洞碩網資訊智能客服SmartRobot未妥善驗證特定頁面參數,其將允許未經身分鑑別之遠端攻擊者利用該參數插入JavaScript語法進行Reflected Cross-site scripting攻擊受影響之系統/漏洞描述:智能客服 SmartRobot v7.1.0(不含)以前版號 漏洞分享 - 凌羣電腦之OMFLOW存在多種漏洞凌羣電腦之OMFLOW存在多種漏洞,其將允許攻擊者於易受影響系統上讀取敏感設定、任意檔案、新增管理權帳號。受影響之系統/漏洞描述:Information Leakage漏洞CVE編號:CVE-2024-8777漏洞描述:凌羣電腦之OMFLOW存在information leakage漏洞,其將允許未經身分鑑別之遠端攻擊者讀取機敏系統設定,若產品有啟用LDAP驗證,則可取得明文帳號通行碼。影響系統/版本:OMFLOW 1.1.6.0 至 1.2.1.2。Arbitrary File Read漏洞CVE編號:CVE-2024-8778漏洞描述:凌羣電腦之OMFLOW檔案下載功能未妥善驗證使用者輸入,其將允許已取得一般權限之遠端攻擊者讀取任意系統檔案。影響系統/版本:OMFLOW 1.1.6.0 至 1.2.1.2。Broken Access Control漏洞CVE編號:CVE-2024-8779漏洞描述:凌羣電腦之OMFLOW未妥善限制修改系統設定功能之存取,其將允許已取得一般權限之遠端攻擊者更新系統設定或新增管理權限帳號以取得伺服器的控制權。影響系統/版本:OMFLOW 1.1.6.0 至 1.2.1.2。Improper Authorization for Data Query Function漏洞CVE編號:CVE-2024-8780漏洞描述:凌羣電腦之OMFLOW的資料查詢功能未妥善限制查詢範圍,其將允許已取得一般權限之遠端攻擊者取得其他使用者帳號與通行碼雜湊值。影響系統/版本:OMFLOW 1.1.6.0 至 1.2.1.2。Exposure of Sensitive Data漏洞CVE編號:CVE-2024-8969漏洞描述:凌群電腦之OMFLOW 存在敏感資料外洩漏洞,其將使得遠端攻擊者可在登入後任意取得系統內所有使用者與管理員的密碼雜湊值。影響系統/版本:OMFLOW 1.2.0(含)以前版本。 https://www.kjintelligent.com/en/hot_499808.html [Cybersecurity Vulnerability Notice] 碩網資訊、凌羣電腦 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499808.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499808.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499808.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - PHP 存在多個漏洞PHP 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發資料篡改及繞過身份驗證。受影響之系統/漏洞描述:PHP 8.3.12 之前的版本PHP 8.2.24 之前的版本PHP 8.1.30 之前的版本 漏洞分享 - Aruba 產品存在多個漏洞Aruba產品存在多個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。受影響之系統/漏洞描述:HPE Aruba NetworkingAffected Software Version(s):AOS-10.6.x.x: 10.6.0.2 及之前版本AOS-10.4.x.x: 10.4.1.3 及之前版本Instant AOS-8.12.x.x: 8.12.0.1 及之前版本Instant AOS-8.10.x.x: 8.10.0.13 及之前版本 漏洞分享 - Microsoft Edge 存在多個漏洞Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼及繞過身份驗證。受影響之系統/漏洞描述:Microsoft Edge (Stable) 129.0.2792.65 之前的版本 https://www.kjintelligent.com/en/hot_499803.html [Cybersecurity Vulnerability Notice] PHP、Aruba、Microsoft Edge 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499803.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499803.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499803.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Ubuntu Linux 內核存在多個漏洞Ubuntu Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼。受影響之系統/漏洞描述:Ubuntu 16.04 ESMUbuntu 18.04 ESM Ubuntu 20.04 LTSUbuntu 22.04 LTSUbuntu 24.04 LTS 漏洞分享 - Citrix 產品存在阻斷服務漏洞Citrix 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況。受影響之系統/漏洞描述:XenServer 8Citrix Hypervisor 8.2 CU1 LTSR 漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼及繞過身份驗證。受影響之系統/漏洞描述:Google Chrome 129.0.6668.70 (Linux) 之前的版本Google Chrome 129.0.6668.70/.71 (Mac) 之前的版本Google Chrome 129.0.6668.70/.71 (Windows) 之前的版本 https://www.kjintelligent.com/en/hot_499802.html [Cybersecurity Vulnerability Notice] Ubuntu Linux、Citrix、Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499802.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499802.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499802.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - VMWare 產品存在多個漏洞VMware 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升及遠端執行任意程式碼。受影響之系統/漏洞描述:VMware vCenter Server 7.0VMware vCenter Server 8.0VMware Cloud Foundation 4.xVMware Cloud Foundation 5.x 漏洞分享 - 蘋果產品存在多個漏洞蘋果產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、洩露敏感資料、資料篡改、跨網站指令碼及繞過身份驗證。受影響之系統/漏洞描述:iOS 18 及 iPadOS 18 以前的版本macOS Sequoia 15 以前的版本tvOS 18 以前的版本watchOS 11 以前的版本visionOS 2 以前的版本Safari 18 以前的版本Xcode 16 以前的版本iOS 17.7 及 iPadOS 17.7 以前的版本macOS Sonoma 14.7 以前的版本macOS Ventura 13.7 以前的版本 https://www.kjintelligent.com/en/hot_499453.html [Cybersecurity Vulnerability Notice] VMWare、Apple 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499453.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499453.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499453.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Microsoft Edge 存在多個漏洞Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼及跨網站指令碼。受影響之系統/漏洞描述:Microsoft Edge (Stable) 129.0.2792.52 之前的版本Microsoft Edge (Extended Stable) 128.0.2739.90 之前的版本 漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼及跨網站指令碼。受影響之系統/漏洞描述:Google Chrome 129.0.6668.58 (Linux) 之前的版本Google Chrome 129.0.6668.58/.59 (Mac) 之前的版本Google Chrome 129.0.6668.58/.59 (Windows) 之前的版本 漏洞分享 - GitLab 存在繞過保安限制漏洞GitLab 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發繞過身份驗證。受影響之系統/漏洞描述:GitLab Community Edition (CE) 17.3.3, 17.2.7, 17.1.8, 17.0.8 及 16.11.10 以前的版本GitLab Enterprise Edition (EE) 17.3.3, 17.2.7, 17.1.8, 17.0.8 及 16.11.10 以前的版本 https://www.kjintelligent.com/en/hot_499452.html [Cybersecurity Vulnerability Notice] Microsoft Edge、Google Chrome、GitLab 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499452.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499452.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499452.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Zoom 產品存在資料洩露漏洞Zoom 產品存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發洩露敏感資料。受影響之系統/漏洞描述:Zoom Workplace Desktop App for Windows 6.1.0之前的版本Zoom Workplace Desktop App for macOS 6.1.0之前的版本Zoom Workplace Desktop App for Linux 6.1.0之前的版本Zoom Workplace VDI Client for Windows 6.1.0之前的版本 (版本 5.17.15 和 6.0.12 除外)Zoom Workplace App for iOS 6.1.0之前的版本Zoom Workplace App for Android 6.1.0之前的版本Zoom Meeting SDK for Windows 6.1.0之前的版本Zoom Meeting SDK for iOS 6.1.0之前的版本Zoom Meeting SDK for Android 6.1.0之前的版本Zoom Meeting SDK for macOS 6.1.0之前的版本Zoom Meeting SDK for Linux 6.1.0之前的版本Zoom Rooms App for Windows 6.1.0之前的版本Zoom Rooms App for macOS 6.1.0之前的版本Zoom Rooms App for iPad 6.1.0之前的版本Zoom Rooms Controller for Windows 6.1.0之前的版本Zoom Rooms Controller for macOS 6.1.0之前的版本Zoom Rooms Controller for Linux 6.1.0之前的版本Zoom Rooms Controller for Android 6.1.0之前的版本 漏洞分享 - ChromeOS 存在多個漏洞ChromeOS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證受影響之系統/漏洞描述:128.0.6613.133 (平台版本: 15964.48.0) 之前的版本 漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼。受影響之系統/漏洞描述:Google Chrome 128.0.6613.137 (Linux) 之前的版本Google Chrome 128.0.6613.137/.138 (Mac) 之前的版本Google Chrome 128.0.6613.137/.138 (Windows) 之前的版本 https://www.kjintelligent.com/en/hot_499379.html [Cybersecurity Vulnerability Notice] Zoom、ChromeOS、Google Chrome 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499379.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499379.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499379.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - GitLab 存在多個漏洞GitLab 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證。受影響之系統/漏洞描述:GitLab Community Edition (CE) 17.3.2, 17.2.5 及 17.1.7 以前的版本GitLab Enterprise Edition (EE) 17.3.2, 17.2.5 及 17.1.7 以前的版本 漏洞分享 - Microsoft Edge 存在多個漏洞Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼及洩露敏感資料。受影響之系統/漏洞描述:Microsoft Edge (Stable) 128.0.2739.79 之前的版本 漏洞分享 - NetApp 產品存在多個漏洞NetApp 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料及資料篡改。受影響之系統/漏洞描述:Active IQ Unified Manager for VMware vSphereNetApp HCI Baseboard Management Controller (BMC) - H610CNetApp HCI Baseboard Management Controller (BMC) - H610SNetApp HCI Baseboard Management Controller (BMC) - H615CONTAP tools for VMware vSphere 9 https://www.kjintelligent.com/en/hot_499377.html [Cybersecurity Vulnerability Notice] GitLab、Microsoft Edge、NetApp 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499377.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499377.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499377.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - Fortinet 產品存在多個漏洞Fortinet 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發敏感資料洩露、遠端執行任意程式碼及資料篡改。受影響之系統/漏洞描述: Unencrypted keychain permanent password CVE編號:CVE-2024-35282漏洞描述:FortiClient VPN iOS的記憶體中存在敏感資訊除文字儲存漏洞,其將允許未經授權攻擊者在意受影響系統上進行越獄並透過keychain dump獲取純文字密碼。影響系統/版本: FortiClientiOS 7.2 所有版本FortiClientiOS 7.0 所有版本FortiClientiOS 6.4 所有版本FortiClientiOS 6.2 所有版本FortiClientiOS 6.0 所有版本 Improper Neutralization of Special Elements used in a Command in DAS component CVE編號:CVE-2024-33508漏洞描述:FortiClientEMS未適當過濾特酥字元,故可導致未經授權之攻擊者透過精心製作的請求,執行有限的操作。影響系統/版本:FortiClientEMS Cloud 7.2.0 ~ 7.2.4FortiClientEMS Cloud 7.0.0 ~ 7.0.12 FortiClientEMS 7.2.0 ~ 7.2.4FortiClientEMS 7.0.0 ~ 7.0.12 Multiple path traversal in administrative interface CVE編號:CVE-2024-21753漏洞描述:FortiClientEMS管理介面存在路徑遍歷漏洞,其將允許攻擊者透過精心製作的web請求,取得或刪除任意檔案。影響系統/版本:FortiClientEMS 7.2.0 ~ 7.2.4FortiClientEMS 7.0 所有版本FortiClientEMS 6.4 所有版本FortiClientEMS 6.2 所有版本FortiClientEMS 6.0 所有版本FortiClientEMS 1.2.2 ~ 1.2.5 FortiClient(All) - Lack of client-side certificate validation using SAML SSO CVE編號:CVE-2022-45856漏洞描述:FortiClientWindows, FortiClientMac, FortiClientLinux, FortiClientAndroid and FortiClientiOS的SAML SSO功能存在未適當確認憑證漏洞,其將允許未經授權之攻擊者金行中間人攻擊(main-in-the-middle)。影響系統/版本:FortiClientAndroid 7.2.0FortiClientAndroid 7.0 所有版本FortiClientAndroid 6.4 所有版本FortiClientAndroid 5.6 所有版本FortiClientAndroid 5.4 所有版本FortiClientAndroid 5.2 所有版本FortiClientAndroid 5.0 所有版本FortiClientLinux 7.2.0 ~ 7.2.4FortiClientLinux 7.0 所有版本FortiClientLinux 6.4 所有版本FortiClientMac 7.2.0 ~ 7.2.4FortiClientMac 7.0 所有版本FortiClientMac 6.4 所有版本FortiClientWindows 7.0.0 ~ 7.0.7FortiClientWindows 6.4 所有版本FortiClientiOS 7.0.3 ~ 7.0.6FortiClientiOS 7.0.0 ~ 7.0.1 FortiClientiOS 6.0.0 ~ 6.0.1FortiClientiOS 5.6 所有版本FortiClientiOS 5.4 所有版本FortiClientiOS 5.2 所有版本FortiClientiOS 5.0 所有版本FortiClientiOS 4.0 所有版本FortiClientiOS 2.0 所有版本 FortiClient - Lack of client-side certificate validation in ZTNA service CVE編號:CVE-2024-31489漏洞描述:FortiClientWindows, FortiClientLinux and FortiClientMac存在未適當確認憑證漏洞,其將允許攻擊者ZTNA 隧道進行中間人攻擊(main-in-the-middle)。影響系統/版本:FortiClientLinux 7.2.0FortiClientLinux 7.0.0 ~ 7.0.11FortiClientMac 7.2.0 ~ 7.2.4FortiClientMac 7.0.0 ~ 7.0.11FortiClientWindows 7.2.0 ~ 7.2.2FortiClientWindows 7.0.0 ~ 7.0.11 https://www.kjintelligent.com/en/hot_499218.html [Cybersecurity Vulnerability Notice] Fortinet 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499218.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499218.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499218.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - 驊鉅數位科技 Easy test 線上學習測驗平台存在SQL Injection和Reflected XSS漏洞驊鉅數位科技 Easy test 線上學習測驗平台未妥善驗證特定頁面參數,其將允許已取得一般權限之遠端攻擊者注入任意SQL指令讀取、修改及刪除資料庫內容以及參數注入JavaScript語法進行Reflected Cross-site scripting攻擊。受影響之系統/漏洞描述:Easy test 線上學習測驗平台 24A01(不含)之前版本 漏洞分享 - 一宇數位科技 Orca HCM存在Improper Access Control和Arbitrary File Download漏洞一宇數位科技 Orca HCM 未妥善限制特定功能之存取以及未妥善限制檔案下載功能之特定參數,其將允許遠端攻擊者可利用該功能新增管理權限帳號,並用該帳號進行登入,以及下載任意系統檔案。受影響之系統/漏洞描述:Orca HCM 11.0(不含)以前版本 漏洞分享 - 凱發科技 WebITR存在Open Redirect漏洞凱發科技WebITR存在Open Redirect漏洞,未經身分鑑別之遠端攻擊者可利用此漏洞偽造URL,使用者在信任Domain的情況下存取該URL後會跳轉至其他頁面,可能因此遭受釣魚攻擊。受影響之系統/漏洞描述:WebITR 2_1_0_27(含)以前版本 https://www.kjintelligent.com/en/hot_499216.html [Cybersecurity Vulnerability Notice] 驊鉅數位Easy test、一宇數位科技 Orca HCM、凱發科技 WebITR 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499216.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499216.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499216.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - 集志科技 6SHR系統存在SQL Injection和Unrestricted File Upload漏洞集志科技6SHR系統未妥善驗證特定頁面之參數和未妥善驗證上傳檔案類型,其將允許已獲得一般權限之遠端攻擊者注入SQL指令讀取、修改、刪除資料庫內容、上傳網頁後門程式,並利用該程式於伺服器端執行任意系統指令。受影響之系統/漏洞描述:6SHR系統所有版本 https://www.kjintelligent.com/en/hot_499087.html [Cybersecurity Vulnerability Notice] 集志科技 6SHR 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499087.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499087.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499087.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安威脅趨勢通知】遠距辦公已是近幾年的新常態,許多公司和組織的員工會透過SSL VPN服務存取內部環境系統,因此攻擊者企圖提供這類系統的應用程式,並散布惡意程式,從而入侵企業。資安業者趨勢科技揭露偽裝成Palo Alto Networks旗下SSL VPN服務GlobalProtect的惡意程式,其鎖定中東組織而來,並意圖竊取內部資料,以及遠端執行PowerShell命令,進而滲透受害組織的網路環境。攻擊者先透過釣魚郵件引誘使用者點擊,並安裝名為setup.exe的惡意程式,一旦開始執行就會安裝假的Palo Alto GlobalProtect,其主要元素除包含惡意程式外,也包含 RTime.conf 和 ApProcessId.conf,其檔案將會放置在C:\\Users\(UserName)\AppData\Local\Programs\PaloAlto\.並於安裝完畢後主動連線惡意網域step[1-6]-[dsktoProcessId].tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast[.]fun。IoC:79B38C4BE5AC888E38EC5F21AC3710F3D0936A7272CDD3856A3FFD530DB50E0F48E71F089858E44Fhxxp://94.131[.]108.78:7118/B/hi/ hxxp://94.131[.]108.78:7118/B/desktop/94.131.108.78portal[.]sharjahconnect.onlinetdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.fun step1-{dsktoProcessId}.tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.funstep2-{dsktoProcessId}.tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.funstep3-{dsktoProcessId}.tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.funstep4-{dsktoProcessId}.tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.funstep5-{dsktoProcessId}.tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.funstep6-{dsktoProcessId}.tdyfbwxngpmixjiqtjjote3k9qwc31dsx.oast.fun https://www.kjintelligent.com/en/hot_499086.html [Cybersecurity Notice] SSL VPN 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499086.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499086.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499086.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - Veeam產品存在多個漏洞Veeam產品存在多個漏洞,將允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、遠端執行程式碼及權限提升。受影響之系統/漏洞描述:Veeam Backup & ReplicationCVE編號:CVE-2024-40711、CVE-2024-40713、CVE-2024-40710、CVE-2024-39718、CVE-2024-40714、CVE-2024-40712漏洞描述:Veeam Backup & Replication存在多種漏洞,將允許攻擊者在易受影響之系統進行攻擊,並導致遠端執行代碼、繞過多因子驗證、存取敏感資訊(憑證、密碼)。影響系統/版本: Veeam Backup & Replication 12.1.2.172 and all earlier version 12 builds。Veeam Agent for LinuxCVE編號:CVE-2024-40709漏洞描述:Veeam Agent for Linux存在漏洞,將允許取得低權限的攻擊者在易受影響系統上進行提權。影響系統/版本:Veeam Agent for Linux 6.1.2.1781 and all earlier version 6 builds。Veeam ONECVE編號:CVE-2024-42024、CVE-2024-42019、CVE-2024-42023、CVE-2024-42021、CVE-2024-42022、CVE-2024-42020漏洞描述:Veeam ONE存在多種漏洞,將允許攻擊者於易受影響之系統利用該漏洞,並導致遠端執行程式碼、存取NTLM hash、存取機敏資料、更改檔案配置、執行HTML Injection。影響系統/版本:Veeam ONE 12.1.0.3208 and all earlier version 12 builds。Veeam Service Provider ConsoleCVE編號:CVE-2024-38650、CVE-2024-39714、CVE-2024-39715、CVE-2024-38651漏洞描述:Veeam Service Provider Console存在多種漏洞,將允許攻擊者於易受影響之系統利用該漏洞,並導致遠端執行程式碼、任意上傳檔案。影響系統/版本:Veeam Service Provider Console 8.0.0.19552 and all earlier version 8 builds。Veeam Backup for Nutanix AHV、Veeam Backup for Oracle Linux Virtualization Manager and Red Hat VirtualizationCVE編號:CVE-2024-40718漏洞描述:Veeam Backup for Nutanix AHV & Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization存在漏洞,將允許取的低權限的攻擊者,透過利用SSRF漏洞,進而提升權限。影響系統/版本:Veeam Backup for Nutanix AHV Plug-In 12.5.1.8 and all earlier verion 12 builds。Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization Plug-In 12.4.1.45 and all earlier version 12 builds。 https://www.kjintelligent.com/en/hot_499035.html [Cybersecurity Vulnerability Notice] Veeam 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499035.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499035.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499035.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - - NetApp 產品存在多個漏洞 NetApp 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料及資料篡改。受影響之系統/漏洞描述:E-Series SANtricity OS Controller Software 11.x 漏洞分享 - F5 產品存在多個漏洞 F5 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證及遠端執行任意程式碼。受影響之系統/漏洞描述:BIG-IP Next SPK:1.7.0 - 1.9.2BIG-IP Next CNF:1.1.0 - 1.3.1 漏洞分享 - IBM MQ 存在多個漏洞 IBM MQ 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、阻斷服務狀況及繞過身份驗證。受影響之系統/漏洞描述:IBM MQ Appliance 9.3 CDIBM MQ Appliance 9.3 LTSIBM MQ Appliance 9.4 LTSIBM MQ for HPE NonStop 8.1.0 to 8.1.0.21IBM MQ 9.0 LTSIBM MQ 9.1 LTSIBM MQ 9.2 LTSIBM MQ 9.3 CDIBM MQ 9.3 LTSIBM MQ 9.4 CDIBM MQ 9.4 LTS https://www.kjintelligent.com/en/hot_499032.html [Cybersecurity Vulnerability Notice] NetApp、F5、IBM MQ 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499032.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_499032.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_499032.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】近日駭客組織NoName057和RipperSec宣稱使用名為「DDoSia」的工具,透過HTTPs Flood及TCP SYN Flood等方式,對政府機關、財稅單位、金融機關及部分企業進行攻擊行為(!)建議應變措施:針對此類DDoS攻擊,企業可以採取以下幾種防護措施來降低攻擊對服務的影響:1. 防火牆 (Firewall)針對IP、異常流量進行阻擋2. 應用程式防火牆(WAF):通過設置特定的閾值來監測每個來源的請求頻率。當來自單一IP或多個IP的請求在短時間內異常增加並超出正常範圍時,可識別為HTTPs Flood攻擊,並採取相應措施3.入侵防禦系統 (IPS):透過比對特徵碼,IPS能阻擋異常流量,針對SYN Flood及應用層DDoS攻擊進行特定防護。4.交換器 (Switch):具備速率限制與存取控制(Access Control List, ACL)功能,並能透過Traffic Shaping機制防禦低速緩慢攻擊及SYN Flood等DDoS攻擊。5.路由器 (Router):利用速率限制及存取控制等功能,啟用入口過濾(Ingress Filtering)機制,檢測並過濾偽造IP位址的攻擊流量,如SYN Flood攻擊。6.網路流量清洗 (Flow Cleaning):由服務提供商建立的流量清洗機制,能針對常見的DDoS攻擊類型,如SYN Flood、應用層DDoS攻擊及低速攻擊,提供乾淨的網路環境,保障服務不中斷。 https://www.kjintelligent.com/en/hot_498816.html [Cybersecurity Notice] DDoSia 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498816.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498816.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_498816.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - 思科產品存在多個漏洞思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務、繞過身份驗證、遠端執行程式碼及權限提升,其影響系統或版本如下: Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability CVE編號:CVE-2024-20446漏洞描述:Cisco NX-OS的DHCPv6 relay agent存在漏洞,其將允許未經授權之攻擊者透過傳送精心製作的DHCPv6封包到易受影響系統上,並導致阻斷服務。影響系統/版本:有啟用DHCP功能的系統皆會自動啟用DHCPv6,故可能會受到影響。檢查方式:show run all | include "^ipv6 dhcp relay"、show ipv6 interface brief Cisco NX-OS Software Python Sandbox Escape Vulnerabilities CVE編號:CVE-2024-20284、CVE-2024-20285、CVE-2024-20286漏洞描述:Cisco NX-OS的Python interpreter存在漏洞,將允許已取得最低權限的攻擊者跳脫python沙箱並進行未經授權之存取行為。影響系統/版本:MDS 9000 Series Multilayer Switches Nexus 3000 Series Switches Nexus 5500 Platform Switches Nexus 5600 Platform SwitchesNexus 6000 Series SwitchesNexus 7000 Series SwitchesNexus 9000 Series Switches in standalone NX-OS mode Cisco NX-OS Software Command Injection Vulnerability CVE編號:CVE-2024-20289漏洞描述:Cisco NX-OS的CLI存在漏洞,其可能允許已取得最低權限的攻擊者,在易受影響系統上任意執行命令。影響系統/版本:Nexus 3000 Series SwitchesNexus 9000 Series Fabric Switches in ACI modeNexus 9000 Series Switches in standalone NX-OS modeUCS 6400 Series Fabric InterconnectsUCS 6500 Series Fabric Interconnects Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities CVE編號:CVE-2024-20411、CVE-2024-20413漏洞描述:Cisco NX-OS2存在多個漏洞,其將允許已取得權限的攻擊者存取Bash Shell並且任意執行代碼,以及進行提權。影響系統/版本:Nexus 3000 Series SwitchesNexus 9000 Series Switches in standalone NX-OS mode檢查方式:show feature | include bash(確定bash是否有啟用)show running-config | include shelltype(確定使用者是否配置為在登入時使用 Bash shell) https://www.kjintelligent.com/en/hot_498725.html [Cybersecurity Vulnerability Notice] Cisco 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498725.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498725.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_498725.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Android 存在多個漏洞Android 存在多個漏洞,允許遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及洩露敏感資料。受影響之系統/漏洞描述:2024-09-05 前的 Android 保安更新級別 漏洞分享 - Zimbra 存在多個漏洞Zimbra 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及跨網站指令碼。受影響之系統/漏洞描述:Zimbra Collaboration Joule 8.8.15 Patch 46 GA 之前的版本Zimbra Collaboration Kepler 9.0.0 Patch 41 GA 之前的版本Zimbra Collaboration Daffodil 10.0.9 之前的版本Zimbra Collaboration Daffodil v10.1.1 之前的版本 漏洞分享 - Mozilla 產品存在多個漏洞Mozilla 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、彷冒、遠端執行任意程式碼及繞過身份驗證。受影響之系統/漏洞描述:Firefox 130以前版本Firefox ESR 128.2以前版本Firefox ESR 115.15以前版本Focus for iOS 130以前版本 漏洞分享 - OpenSSL 中存在一個漏洞OpenSSL 中存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發阻斷服務狀況。受影響之系統/漏洞描述:OpenSSL 3.3, 3.2, 3.1 及 3.0 版本 https://www.kjintelligent.com/en/hot_498347.html [Cybersecurity Vulnerability Notice] Android、Zimbra、Mozilla、OpenSSL 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498347.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498347.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_498347.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - Google Chrome 存在多個漏洞 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、篡改及遠端執行任意程式碼。受影響之系統/漏洞描述:Google Chrome 128.0.6613.119 (Linux) 之前的版本Google Chrome 128.0.6613.119/.120 (Mac) 之前的版本Google Chrome 128.0.6613.119/.120 (Windows) 之前的版本 漏洞分享 - 三星產品存在多個漏洞 三星產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。受影響之系統/漏洞描述:Exynos 980, Exynos 850, Exynos 1080, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 1480, Exynos W920, Exynos W930 漏洞分享 - Ubuntu Linux 內核存在多個漏洞 Ubuntu Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況。受影響之系統/漏洞描述:Ubuntu 18.04 ESM 漏洞分享 - RedHat Linux核心存在多個漏洞 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料、繞過身份驗證及仿冒。受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390xRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64Red Hat Enterprise Linux Server - AUS 8.4 x86_64Red Hat Enterprise Linux Server - AUS 9.2 x86_64Red Hat Enterprise Linux Server - TUS 8.4 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le 漏洞分享 - SUSE Linux 內核存在多個漏洞 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證。受影響之系統/漏洞描述:Basesystem Module 15-SP5openSUSE Leap 15.5openSUSE Leap Micro 5.5SUSE Linux Enterprise Desktop 15 SP5SUSE Linux Enterprise High Performance Computing 15 SP5SUSE Linux Enterprise Micro 5.5SUSE Linux Enterprise Real Time 15 SP5SUSE Linux Enterprise Server 15 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP5 漏洞分享 - 兆勤揭露無線基地台和資安路由器設備存在命令注入漏洞 於9月3日兆勤科技(Zyxel Networks)發布資安公告,其說明旗下部分部分Wi-Fi路由器設備存在重大層級漏洞(CVE-2024-7261),導致原因是在於路由器CGI程式,host參數的特殊元素出現處理不當(improper neutralization),故讓攻擊者有機會藉由發送特定cookie並在未經授權下執行作業系統命令。 https://www.kjintelligent.com/en/hot_498345.html [Cybersecurity Vulnerability Notice] Google Chrome、Samsung、Ubuntu Linux、RedHat Linux、SUSE Linux、兆勤 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498345.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_498345.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_498345.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】 漏洞分享 - F5 產品存在繞過身份驗證和資料洩露及阻斷服務漏洞F5 產品存在漏洞,允許遠端使用者利用此漏洞,於目標系統觸發繞過身份驗證、資料洩露和阻斷服務狀況。 漏洞分享 - SonicWall 產品存在繞過身份驗證及阻斷服務漏洞SonicWall SonicOS的管理訪問(management access)存在不當存取控制漏洞,其可能導致未經授權情況下存取資源,以及在特殊情況下造成阻斷服務。 漏洞分享 - Microsoft Edge 存在多個漏洞Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、繞過身份驗證及敏感資料洩露。 漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、繞過身份驗證及敏感資料洩露。其中,CVE-2024-7971 正被廣泛利用, 該漏洞是由 Chrome V8 JavaScript 引擎中的漏洞引起,可以導致在目標裝置上遠端執行程式碼。 https://www.kjintelligent.com/en/hot_497907.html [Cybersecurity Vulnerability Notice] Google Chrome、Microsoft Edge、SonicWall、F5 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_497907.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_497907.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_497907.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
KJ Intelligent and Cloud Intelligent Operation jointly launch cybersecurity integration solution Defend against cyberattacks and help businesses effectively enhance their cybersecurity capabilities during the digital transformation process. https://www.kjintelligent.com/en/hot_496856.html KJ Intelligent and Cloud Intelligent Operation jointly launch cybersecurity integration solution 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_496856.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_496856.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_496856.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】有使用Fortinet、F5和NetApp的用戶請注意!!漏洞分享 - Fortinet 產品存在多個漏洞Fortinet 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、繞過身份驗證、敏感資料洩露、遠端執行任意程式碼及資料篡改。漏洞分享 - F5 產品存在多個漏洞F5 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。漏洞分享 - NetApp 產品存在阻斷服務狀況漏洞NetApp 產品存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發阻斷服務狀。 https://www.kjintelligent.com/en/hot_497551.html [Cybersecurity Vulnerability Notice] Fortinet、F5 & NetApp 2024-12-20 2025-12-20
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_497551.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_497551.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2024-12-20 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_497551.html