選單換圖效果,請啟用Active Scripting功能
南臺首頁 English
:::
訪客 未來學生 本校學生 教職同仁 畢業校友
:::
  南臺頭條新聞
  南臺影音新聞
  所有訊息
  重要公告
  行政公告
  校園活動
  專案計劃
  研討會資訊
  校內徵才
  校園職場實習
  工作機會
  國際證照
  南臺新生
  招生資訊
  南臺RSS新聞
  本月公告一覽
  停刊公告活動欄
  [公告系統登入]


【行政公告】 ::: [ 上一頁 ]
 
公 告 單位
圖資處數位服務組
訊 息 類 別 行政公告 行政公告 公 告 對 象 全體
公 告 主 題
【資安漏洞預警】CISA新增3個已知遭駭客利用之漏洞至KEV目錄(2026/03/23-2026/03/29)
[Security Vulnerability Alert] CISA adds 3 known vulnerabilities exploited by hackers to the KEV directory (2026/03/23-2026/03/29)
公 告 內 容
轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202603-00000023

[內容說明]
【CVE-2026-33017】Langflow Code Injection Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 Langflow 存在程式碼注入漏洞,可能導致在無需驗證的情況下建立公開流程。

【CVE-2026-33634】Aquasecurity Trivy Embedded Malicious Code Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 Aquasecurity Trivy 存在嵌入式惡意程式碼漏洞,可能使攻擊者取得 CI/CD 環境中的所有存取權限,包括所有權杖、SSH 金鑰、雲端憑證、資料庫密碼,以及記憶體中的任何敏感設定。

【CVE-2025-53521】F5 BIG-IP Unspecified Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 F5 BIG-IP AMP 存在未具體說明的漏洞,可能使攻擊者得以執行遠端程式碼。

[影響平台]
【CVE-2026-33017】請參考官方所列的影響版本 https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx

【CVE-2026-33634】請參考官方所列的影響版本 https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

【CVE-2025-53521】請參考官方所列的影響版本 https://my.f5.com/manage/s/article/K000156741

[建議措施]
【CVE-2026-33017】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx

【CVE-2026-33634】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

【CVE-2025-53521】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://my.f5.com/manage/s/article/K000156741

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202603-00000023

[Content Description]
【CVE-2026-33017】Langflow Code Injection Vulnerability (CVSS v3.1: 9.8)
【Exploited by Ransomware: Unknown】 A code injection vulnerability exists in Langflow, potentially allowing the creation of public processes without authentication.

【CVE-2026-33634】Aquasecurity Trivy Embedded Malicious Code Vulnerability (CVSS v3.1: 8.8)
【Exploited by Ransomware: Unknown】 An embedded malicious code vulnerability exists in Aquasecurity Trivy, potentially allowing attackers to gain full access to the CI/CD environment, including ownership keys, SSH keys, cloud credentials, database passwords, and any sensitive settings in memory.

【CVE-2025-53521】F5 BIG-IP Unspecified Vulnerability (CVSS v3.1: 9.8)
【Exploitation by Ransomware: Unknown】 An unspecified vulnerability exists in F5 BIG-IP AMP that could allow an attacker to execute remote code.

[Affected Platforms]
【CVE-2026-33017】Please refer to the official list of affected versions: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx

【CVE-2026-33634】Please refer to the official list of affected versions: https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

【CVE-2025-53521】Please refer to the official list of affected versions: https://my.f5.com/manage/s/article/K000156741

[Recommended Actions]
【CVE-2026-33017】An official patch update has been released for this vulnerability. Please update to the relevant version. https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx

【CVE-2026-33634】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23

【CVE-2025-53521】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://my.f5.com/manage/s/article/K000156741
相 關 訊 息


公 告 時 間
 2026/3/30   至 2026/9/30   
點 閱 次 數
265

:::
 
地址:71005 台南市永康區南台街一號 (開車訪客請由中正南路→正南一街→進入南臺科技大學) HyperLink