返回我的博客 | 威胁情报播报


360 网络安全响应中心 [TOP 30] CVES TIME TITLE URL
4d42b2e96c478df11ac597898d1526f0 2024-04-17 11:18:19 2024-04 补丁日: Oracle多个产品漏洞安全风险通告 详情
448cfa0216a0757ec96f5862f86eafd4 2024-04-01 10:42:50 安全事件周报 2024-03-25 第13周 详情
1205680821e2717a58c599f99a9fb422 2024-03-26 07:23:13 安全事件周报 2024-03-18 第12周 详情
2e93df858fc2c5b287883dc9313a87fc 2024-03-18 07:07:47 安全事件周报 2024-03-11 第11周 详情
c1cad147c12a38c089cd941022bc395e 2024-03-13 04:34:11 2024-03 补丁日: 微软多个漏洞安全更新通告 详情
7119e349c423ea015d6f2a824c67ed63 2024-03-11 06:17:28 安全事件周报 2024-03-04 第10周 详情
b2c0e23dcf540c0b5d2bb144ceade98d CVE-2024-27198 2024-03-06 08:44:35 CVE-2024-27198:JetBrains TeamCity 身份验证绕过漏洞通告 详情
5e103cbd4bae3244e692ba33c1d7fcf8 2024-03-04 07:07:59 安全事件周报 2024-02-26 第9周 详情
cab02a763bf285b3dc009731f40f8c29 CVE-2024-25065 2024-03-01 09:06:25 CVE-2024-25065:Apache OFBiz目录遍历漏洞通告 详情
194761e30d263596338cc998ac88cbaa 2024-02-28 08:51:55 SupermanMiner挖矿木马新变种持续活跃 详情
213a4c5c76a220c24da1c38c605fcc10 CVE-2024-25600 2024-02-27 09:55:55 CVE-2024-25600:WordPress Bricks Builder远程命令执行漏洞通告 详情
bc2c3923f651854c68f2dd6f99d69f0a 2024-02-26 03:00:09 安全事件周报 2024-02-19 第8周 详情
55c72f6f2af616fbddbb643df06c3b3a CVE-2024-21413 2024-02-23 06:57:46 CVE-2024-21413:Microsoft Outlook 远程代码执行漏洞通告 详情
f000a20bfa53fd8b0f5231b52ff34577 2024-02-19 10:10:13 2024-02 补丁日: 微软多个漏洞安全更新通告 详情
48ff3925c0cc22862b0d6e1f52140bdc 2024-02-06 07:10:07 安全事件周报 2024-01-29 第5周 详情
d8c34853fbcc6b39ae0a3783c6fa6d44 CVE-2024-21626 2024-02-01 08:38:56 CVE-2024-21626:runc容器逃逸漏洞通告 详情
6ff357e8344fde5ea96c964cc0161137 2024-01-29 10:02:54 安全事件周报 2024-01-22 第4周 详情
8fc558ad63c1387fb3ed919bf754820e CVE-2024-0204 2024-01-25 08:26:39 CVE-2024-0204:GoAnywhere MFT 身份认证绕过漏洞通告 详情
f4359caac3c70e9141439aa773e1e8a5 2024-01-22 11:39:38 安全事件周报 2024-01-15 第3周 详情
4939f25b3f3d3242726cd400c645be04 CVE-2024-0519 2024-01-17 09:08:07 CVE-2024-0519:Google Chrome V8越界访问漏洞通告 详情
300687d61adecf75afb4de6d78398518 CVE-2024-0519 2024-01-17 08:09:14 CVE-2024-0519:Google Chrome V8类型混淆漏洞通告 详情
28f74976e64bebdcd2b71df42f44817e CVE-2023-22527 2024-01-16 09:50:35 CVE-2023-22527:Atlassian Confluence 远程代码执行漏洞通告 详情
ec39eae21390157f92422897b04aad66 2024-01-15 08:28:24 安全事件周报 2024-01-08 第2周 详情
de12aee5eaff6382190430b22e2c643f 2024-01-11 10:55:37 2024-01 补丁日: 微软多个漏洞安全更新通告 详情
c2b35c67c2732343be5c23579ebcdd04 2024-01-08 07:37:47 安全事件周报 2024-01-01 第1周 详情
666a3a36b86650d472f7203220b3a4f5 2024-01-02 09:34:01 安全事件周报 2023-12-25 第52周 详情
f91862c02f62f7f8e9d01e209e59487b CVE-2023-51467 2023-12-27 08:57:10 CVE-2023-51467:Apache OFBiz 未授权远程代码执行漏洞通告 详情
0c520d1f3614bc8cba4450fee6f03f5d 2023-12-25 08:21:40 安全事件周报 2023-12-18 第51周 详情
ffb5d5f9ba0fa1576f9bd8325a8d3e66 2023-12-18 08:50:39 安全事件周报 2023-12-11 第50周 详情
382c73d6388430b9cea6072c6c61858e 2023-12-13 08:50:10 2023-12 补丁日: 微软多个漏洞安全更新通告 详情

Tenable (Nessus) [TOP 30] CVES TIME TITLE URL
58774768a817adda029e5baf495a5376 CVE-2026-23013 2026-01-25 15:15:56 In the Linux kernel, the following vulnerability has been resolved: net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ rollback octep_vf_request_irqs() requests MSI-X queue IRQs with dev_id set to ioq_vector. If request_irq() fails part-way, the rollback loop calls free_irq() with dev_id set to 'oct', which does not match the original dev_id and may leave the irqaction registered. This can keep IRQ handlers alive while ioq_vector is later freed during unwind/teardown, leading to a use-after-free or crash when an interrupt fires. Fix the error path to free IRQs with the same ioq_vector dev_id used during request_irq(). 详情
0bdec7851384162f573dd53c6368966a CVE-2026-23012 2026-01-25 15:15:56 In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is executed against a DAMON context that is not running, the function returns error while keeping the damon_call_control object linked to the context's call_controls list. Let's suppose the object is deallocated after the damon_call(), and yet another damon_call() is executed against the same context. The function tries to add the new damon_call_control object to the call_controls list, which still has the pointer to the previous damon_call_control object, which is deallocated. As a result, use-after-free happens. This can actually be triggered using the DAMON sysfs interface. It is not easily exploitable since it requires the sysfs write permission and making a definitely weird file writes, though. Please refer to the report for more details about the issue reproduction steps. Fix the issue by making two changes. Firstly, move the final kdamond_call() for cancelling all existing damon_call() requests from terminating DAMON context to be done before the ctx->kdamond reset. This makes any code that sees NULL ctx->kdamond can safely assume the context may not access damon_call() requests anymore. Secondly, let damon_call() to cleanup the damon_call_control objects that were added to the already-terminated DAMON context, before returning the error. 详情
69417f4666591a7c2fb1558bdc27af5c CVE-2026-23011 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_gre: make ipgre_header() robust Analog to commit db5b4e39c4e6 ("ip6_gre: make ip6gre_header() robust") Over the years, syzbot found many ways to crash the kernel in ipgre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_headroom and/or dev->hard_header_len In this particular crash mld_newpack() allocated an skb with a too small reserve/headroom, and by the time mld_sendpack() was called, syzbot managed to attach an ipgre device. [1] skbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0 kernel BUG at net/core/skbuff.c:213 ! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: mld mld_ifc_work RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213 Call Trace: skb_under_panic net/core/skbuff.c:223 [inline] skb_push+0xc3/0xe0 net/core/skbuff.c:2641 ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897 dev_hard_header include/linux/netdevice.h:3436 [inline] neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618 NF_HOOK_COND include/linux/netfilter.h:307 [inline] ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247 NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318 mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855 mld_send_cr net/ipv6/mcast.c:2154 [inline] mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 详情
bcf41a45c47995e81ddb134919a73cbc CVE-2026-23010 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix use-after-free in inet6_addr_del(). syzbot reported use-after-free of inet6_ifaddr in inet6_addr_del(). [0] The cited commit accidentally moved ipv6_del_addr() for mngtmpaddr before reading its ifp->flags for temporary addresses in inet6_addr_del(). Let's move ipv6_del_addr() down to fix the UAF. [0]: BUG: KASAN: slab-use-after-free in inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117 Read of size 4 at addr ffff88807b89c86c by task syz.3.1618/9593 CPU: 0 UID: 0 PID: 9593 Comm: syz.3.1618 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xcd/0x630 mm/kasan/report.c:482 kasan_report+0xe0/0x110 mm/kasan/report.c:595 inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117 addrconf_del_ifaddr+0x11e/0x190 net/ipv6/addrconf.c:3181 inet6_ioctl+0x1e5/0x2b0 net/ipv6/af_inet6.c:582 sock_do_ioctl+0x118/0x280 net/socket.c:1254 sock_ioctl+0x227/0x6b0 net/socket.c:1375 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f164cf8f749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f164de64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f164d1e5fa0 RCX: 00007f164cf8f749 RDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003 RBP: 00007f164d013f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f164d1e6038 R14: 00007f164d1e5fa0 R15: 00007ffde15c8288 Allocated by task 9593: kasan_save_stack+0x33/0x60 mm/kasan/common.c:56 kasan_save_track+0x14/0x30 mm/kasan/common.c:77 poison_kmalloc_redzone mm/kasan/common.c:397 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:414 kmalloc_noprof include/linux/slab.h:957 [inline] kzalloc_noprof include/linux/slab.h:1094 [inline] ipv6_add_addr+0x4e3/0x2010 net/ipv6/addrconf.c:1120 inet6_addr_add+0x256/0x9b0 net/ipv6/addrconf.c:3050 addrconf_add_ifaddr+0x1fc/0x450 net/ipv6/addrconf.c:3160 inet6_ioctl+0x103/0x2b0 net/ipv6/af_inet6.c:580 sock_do_ioctl+0x118/0x280 net/socket.c:1254 sock_ioctl+0x227/0x6b0 net/socket.c:1375 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Freed by task 6099: kasan_save_stack+0x33/0x60 mm/kasan/common.c:56 kasan_save_track+0x14/0x30 mm/kasan/common.c:77 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584 poison_slab_object mm/kasan/common.c:252 [inline] __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284 kasan_slab_free include/linux/kasan.h:234 [inline] slab_free_hook mm/slub.c:2540 [inline] slab_free_freelist_hook mm/slub.c:2569 [inline] slab_free_bulk mm/slub.c:6696 [inline] kmem_cache_free_bulk mm/slub.c:7383 [inline] kmem_cache_free_bulk+0x2bf/0x680 mm/slub.c:7362 kfree_bulk include/linux/slab.h:830 [inline] kvfree_rcu_bulk+0x1b7/0x1e0 mm/slab_common.c:1523 kvfree_rcu_drain_ready mm/slab_common.c:1728 [inline] kfree_rcu_monitor+0x1d0/0x2f0 mm/slab_common.c:1801 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257 process_scheduled_works kernel/workqu ---truncated--- 详情
51773a29f49ce9405628acc819568b96 CVE-2026-23009 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: xhci: sideband: don't dereference freed ring when removing sideband endpoint xhci_sideband_remove_endpoint() incorrecly assumes that the endpoint is running and has a valid transfer ring. Lianqin reported a crash during suspend/wake-up stress testing, and found the cause to be dereferencing a non-existing transfer ring 'ep->ring' during xhci_sideband_remove_endpoint(). The endpoint and its ring may be in unknown state if this function is called after xHCI was reinitialized in resume (lost power), or if device is being re-enumerated, disconnected or endpoint already dropped. Fix this by both removing unnecessary ring access, and by checking ep->ring exists before dereferencing it. Also make sure endpoint is running before attempting to stop it. Remove the xhci_initialize_ring_info() call during sideband endpoint removal as is it only initializes ring structure enqueue, dequeue and cycle state values to their starting values without changing actual hardware enqueue, dequeue and cycle state. Leaving them out of sync is worse than leaving it as it is. The endpoint will get freed in after this in most usecases. If the (audio) class driver want's to reuse the endpoint after offload then it is up to the class driver to ensure endpoint is properly set up. 详情
4b2bce1d920419b2b61cf29b0a292f1e CVE-2026-23008 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on HW version 10 HW version 10 does not have GB Surfaces so there is no backing buffer for surface backed FBs. This would result in a nullptr dereference and crash the driver causing a black screen. 详情
5690e9ed341f106cdf262d027992981d CVE-2026-23007 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of auto integrity buffer The auto-generated integrity buffer for writes needs to be fully initialized before being passed to the underlying block device, otherwise the uninitialized memory can be read back by userspace or anyone with physical access to the storage device. If protection information is generated, that portion of the integrity buffer is already initialized. The integrity data is also zeroed if PI generation is disabled via sysfs or the PI tuple size is 0. However, this misses the case where PI is generated and the PI tuple size is nonzero, but the metadata size is larger than the PI tuple. In this case, the remainder ("opaque") of the metadata is left uninitialized. Generalize the BLK_INTEGRITY_CSUM_NONE check to cover any case when the metadata is larger than just the PI tuple. 详情
70deae963a427fe19296909a21ce1725 CVE-2026-23006 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: ASoC: tlv320adcx140: fix null pointer The "snd_soc_component" in "adcx140_priv" was only used once but never set. It was only used for reaching "dev" which is already present in "adcx140_priv". 详情
edb359074fa0dc0b62a8fdd4c0d27332 CVE-2026-23005 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1 When loading guest XSAVE state via KVM_SET_XSAVE, and when updating XFD in response to a guest WRMSR, clear XFD-disabled features in the saved (or to be restored) XSTATE_BV to ensure KVM doesn't attempt to load state for features that are disabled via the guest's XFD. Because the kernel executes XRSTOR with the guest's XFD, saving XSTATE_BV[i]=1 with XFD[i]=1 will cause XRSTOR to #NM and panic the kernel. E.g. if fpu_update_guest_xfd() sets XFD without clearing XSTATE_BV: ------------[ cut here ]------------ WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#29: amx_test/848 Modules linked in: kvm_intel kvm irqbypass CPU: 29 UID: 1000 PID: 848 Comm: amx_test Not tainted 6.19.0-rc2-ffa07f7fd437-x86_amx_nm_xfd_non_init-vm #171 NONE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:exc_device_not_available+0x101/0x110 Call Trace: asm_exc_device_not_available+0x1a/0x20 RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90 switch_fpu_return+0x4a/0xb0 kvm_arch_vcpu_ioctl_run+0x1245/0x1e40 [kvm] kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm] __x64_sys_ioctl+0x8f/0xd0 do_syscall_64+0x62/0x940 entry_SYSCALL_64_after_hwframe+0x4b/0x53 ---[ end trace 0000000000000000 ]--- This can happen if the guest executes WRMSR(MSR_IA32_XFD) to set XFD[18] = 1, and a host IRQ triggers kernel_fpu_begin() prior to the vmexit handler's call to fpu_update_guest_xfd(). and if userspace stuffs XSTATE_BV[i]=1 via KVM_SET_XSAVE: ------------[ cut here ]------------ WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#14: amx_test/867 Modules linked in: kvm_intel kvm irqbypass CPU: 14 UID: 1000 PID: 867 Comm: amx_test Not tainted 6.19.0-rc2-2dace9faccd6-x86_amx_nm_xfd_non_init-vm #168 NONE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 RIP: 0010:exc_device_not_available+0x101/0x110 Call Trace: asm_exc_device_not_available+0x1a/0x20 RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90 fpu_swap_kvm_fpstate+0x6b/0x120 kvm_load_guest_fpu+0x30/0x80 [kvm] kvm_arch_vcpu_ioctl_run+0x85/0x1e40 [kvm] kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm] __x64_sys_ioctl+0x8f/0xd0 do_syscall_64+0x62/0x940 entry_SYSCALL_64_after_hwframe+0x4b/0x53 ---[ end trace 0000000000000000 ]--- The new behavior is consistent with the AMX architecture. Per Intel's SDM, XSAVE saves XSTATE_BV as '0' for components that are disabled via XFD (and non-compacted XSAVE saves the initial configuration of the state component): If XSAVE, XSAVEC, XSAVEOPT, or XSAVES is saving the state component i, the instruction does not generate #NM when XCR0[i] = IA32_XFD[i] = 1; instead, it operates as if XINUSE[i] = 0 (and the state component was in its initial state): it saves bit i of XSTATE_BV field of the XSAVE header as 0; in addition, XSAVE saves the initial configuration of the state component (the other instructions do not save state component i). Alternatively, KVM could always do XRSTOR with XFD=0, e.g. by using a constant XFD based on the set of enabled features when XSAVEing for a struct fpu_guest. However, having XSTATE_BV[i]=1 for XFD-disabled features can only happen in the above interrupt case, or in similar scenarios involving preemption on preemptible kernels, because fpu_swap_kvm_fpstate()'s call to save_fpregs_to_fpstate() saves the outgoing FPU state with the current XFD; and that is (on all but the first WRMSR to XFD) the guest XFD. Therefore, XFD can only go out of sync with XSTATE_BV in the above interrupt case, or in similar scenarios involving preemption on preemptible kernels, and it we can consider it (de facto) part of KVM ABI that KVM_GET_XSAVE returns XSTATE_BV[i]=0 for XFD-disabled features. [Move clea ---truncated--- 详情
5d21ff1dbc6782d0f71bac04008a611d CVE-2026-23004 2026-01-25 15:15:55 In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() syzbot was able to crash the kernel in rt6_uncached_list_flush_dev() in an interesting way [1] Crash happens in list_del_init()/INIT_LIST_HEAD() while writing list->prev, while the prior write on list->next went well. static inline void INIT_LIST_HEAD(struct list_head *list) { WRITE_ONCE(list->next, list); // This went well WRITE_ONCE(list->prev, list); // Crash, @list has been freed. } Issue here is that rt6_uncached_list_del() did not attempt to lock ul->lock, as list_empty(&rt->dst.rt_uncached) returned true because the WRITE_ONCE(list->next, list) happened on the other CPU. We might use list_del_init_careful() and list_empty_careful(), or make sure rt6_uncached_list_del() always grabs the spinlock whenever rt->dst.rt_uncached_list has been set. A similar fix is neeed for IPv4. [1] BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline] BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline] BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline] BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020 Write of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450 CPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: netns cleanup_net Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x240 mm/kasan/report.c:482 kasan_report+0x118/0x150 mm/kasan/report.c:595 INIT_LIST_HEAD include/linux/list.h:46 [inline] list_del_init include/linux/list.h:296 [inline] rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline] rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020 addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853 addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1 notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85 call_netdevice_notifiers_extack net/core/dev.c:2268 [inline] call_netdevice_notifiers net/core/dev.c:2282 [inline] netif_close_many+0x29c/0x410 net/core/dev.c:1785 unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353 ops_exit_rtnl_list net/core/net_namespace.c:187 [inline] ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248 cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 Allocated by task 803: kasan_save_stack mm/kasan/common.c:57 [inline] kasan_save_track+0x3e/0x80 mm/kasan/common.c:78 unpoison_slab_object mm/kasan/common.c:340 [inline] __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366 kasan_slab_alloc include/linux/kasan.h:253 [inline] slab_post_alloc_hook mm/slub.c:4953 [inline] slab_alloc_node mm/slub.c:5263 [inline] kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270 dst_alloc+0x105/0x170 net/core/dst.c:89 ip6_dst_alloc net/ipv6/route.c:342 [inline] icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333 mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844 mld_send_cr net/ipv6/mcast.c:2154 [inline] mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr ---truncated--- 详情
d1c456cc606819dee87d1593a251b437 CVE-2026-0593 2026-01-24 17:15:58 The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings. 详情
af8ad12797b59fbd51bfddab75eb4426 CVE-2026-0862 2026-01-24 16:15:52 The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known. 详情
5f34d361461b5fd0e694e0765df33e6e CVE-2026-0911 2026-01-24 13:15:55 The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce. 详情
370da6211f54634a17539a6bf9f4270f CVE-2025-13920 2026-01-24 13:15:54 The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles. 详情
07d3609aa3621318a282efde2ddd208a CVE-2026-1302 2026-01-24 09:15:54 The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. 详情
ee5b964594a8034845de833617683a0f CVE-2026-1300 2026-01-24 09:15:54 The Responsive Header plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple plugin settings parameters in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. 详情
22365f924f0c56f51e9633aaaf159b5c CVE-2026-1266 2026-01-24 09:15:54 The Postalicious plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. 详情
6fd7579bba4b3a960f1b0ddc2d5b7439 CVE-2026-1208 2026-01-24 09:15:54 The Friendly Functions for Welcart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.5. This is due to missing or incorrect nonce validation on the settings page. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 详情
0491d159148f70c879e7ffd248701edc CVE-2026-1191 2026-01-24 09:15:53 The JavaScript Notifier plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 1.2.8. This is due to insufficient input sanitization and output escaping on user-supplied attributes in the `wp_footer` action. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情
b90d0c3c67cba73e10012d4057711e4d CVE-2026-1189 2026-01-24 09:15:53 The LeadBI Plugin for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'form_id' parameter of the 'leadbi_form' shortcode in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情
3fbea3934ab95506ed75ae0873c39433 CVE-2026-21867 2026-01-23 19:15:54 Rejected reason: Reason: This candidate was issued in error. 详情
3194282ddb6c499079ebf17f024ea376 CVE-2025-70986 2026-01-23 19:15:54 Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data. 详情
dd1d528ef75a1a2c6fb15825036cb9e8 CVE-2025-70985 2026-01-23 19:15:53 Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope. 详情
cc9e0fb3477391be16feaa584e15ac08 CVE-2025-70983 2026-01-23 19:15:53 Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges. 详情
77b1e75854d732d303a95e545fc1ae65 CVE-2025-14947 2026-01-23 18:16:02 The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `ajax_callback_create_bunny_stream_video`, `ajax_callback_get_bunny_stream_video`, and `ajax_callback_delete_bunny_stream_video` functions in all versions up to, and including, 4.6.4. This makes it possible for unauthenticated attackers to create and delete videos on the Bunny Stream CDN associated with the victim's account, provided they can obtain a valid nonce which is exposed in public player templates. 详情
16100490042231f605d9f135e7762539 CVE-2026-24423 2026-01-23 17:16:13 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application. 详情
df9de696fc1054282824ba7622665a4a CVE-2026-1299 2026-01-23 17:16:12 The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator". 详情
eb1a84b17df90c5a5dd51e4d69a795cf CVE-2025-71177 2026-01-23 17:16:08 LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rendered without proper output encoding in package search results. When other users view search results that include the malicious package, the injected script executes in their browsers, potentially enabling session hijacking, credential theft, and unauthorized actions in the context of the victim. 详情
0301432b0d593ae34efa66b3d6e0be8a CVE-2025-67231 2026-01-23 17:16:08 A reflected cross-site scripting (XSS) vulnerability in ToDesktop Builder v0.33.1 allows attackers to execute arbitrary code in the context of a user's browser via a crafted payload. 详情
ebed86934627593548791621a187e9a6 CVE-2025-67230 2026-01-23 17:16:07 Improper permissions in the handler for the Custom URL Scheme in ToDesktop Builder v0.33.0 allows attackers with renderer-context access to invoke external protocol handlers without sufficient validation. 详情

国家信息安全漏洞共享平台(CNVD) [TOP 30] CVES TIME TITLE URL
8686fda9b2b49e4e1666b54e2248f935 CNVD-2021-74882 2021-11-14 16:43:52 四创科技有限公司建站系统存在SQL注入漏洞 详情
8f6972d84ad188b05ff9cc14d4334949 CNVD-2021-87021 (CVE-2020-4690) 2021-11-12 12:43:14 IBM Security Guardium硬编码凭证漏洞 详情
3bfe7b053a0c59d8a3d38c18f86aa143 CNVD-2021-87022 (CVE-2021-38870) 2021-11-12 12:43:12 IBM Aspera跨站脚本漏洞 详情
a4649bb17f4db4d1c7f879ebceb46ed0 CNVD-2021-87011 (CVE-2021-29753) 2021-11-12 12:43:11 IBM Business Automation Workflow存在未明漏洞 详情
094c613f9ed4b8b9d887dc912789043c CNVD-2021-87025 (CVE-2021-20563) 2021-11-12 12:43:10 IBM Sterling File Gateway信息泄露漏洞 详情
41c47f01a4c65dcb6efc9ebf483fe762 CNVD-2021-87010 (CVE-2021-38887) 2021-11-12 12:43:08 IBM InfoSphere Information Server信息泄露漏洞 详情
f51d33e7a09fd61ca90ede453515a830 CNVD-2021-87016 (CVE-2021-29764) 2021-11-12 12:43:07 IBM Sterling B2B Integrator跨站脚本漏洞 详情
33615a5f78df822e82e6d3436045c48c CNVD-2021-87026 (CVE-2021-38877) 2021-11-12 12:43:06 IBM Jazz for Service Management跨站脚本漏洞 详情
8e729177bcb4105dd831fb1e123ed1bb CNVD-2021-87014 (CVE-2021-29679) 2021-11-12 12:43:04 IBM Cognos Analytics远程代码执行漏洞 详情
1a3b856f78e9fbdca12aeddc7d665aca CNVD-2021-87029 (CVE-2021-29752) 2021-11-12 12:43:03 IBM Db2信息泄露漏洞 详情
6f1aa3a0cb819d97519baa47fd0232d5 CNVD-2021-87015 (CVE-2021-29745) 2021-11-12 12:43:02 IBM Cognos Analytics权限提升漏洞 详情
cbcb12f5f51d6e7d6d8a9fa581aa863a CNVD-2021-73908 2021-11-11 16:42:44 泛微e-cology存在SQL注入漏洞 详情
ae6fd467da55de31aa7219187cf5c2d4 CNVD-2021-86904 (CVE-2021-20351) 2021-11-11 08:31:46 IBM Engineering跨站脚本漏洞 详情
412a15b40959ed9cf9330ee79f99e079 CNVD-2021-86903 (CVE-2021-31173) 2021-11-11 08:31:44 Microsoft SharePoint Server信息泄露漏洞 详情
1cbc5d5faac431d3e82c9e5ea9588b5f CNVD-2021-86902 (CVE-2021-31172) 2021-11-11 08:31:43 Microsoft SharePoint欺骗漏洞 详情
686c7cfb20933b41c3d679cbba79a2ad CNVD-2021-86901 (CVE-2021-31181) 2021-11-11 08:31:42 Microsoft SharePoint远程代码执行漏洞 详情
72fdfb2d44c0d41d638e4632bdfc10b8 CNVD-2021-86900 (CVE-2021-3561) 2021-11-11 08:31:41 fig2dev缓冲区溢出漏洞 详情
3ba6f0e9394f9414e2cadb9495e2d5f5 CNVD-2021-85884 (CVE-2021-41210) 2021-11-10 07:24:57 Google TensorFlow堆分配数组越界读取漏洞 详情
4d8c4744ea972fb2fcb9673fea1fc7b7 CNVD-2021-85883 (CVE-2021-41226) 2021-11-10 07:24:56 Google TensorFlow堆越界访问漏洞 详情
8778f9cd924cae585ca5e2e0b8be3b3f CNVD-2021-85882 (CVE-2021-41224) 2021-11-10 07:24:54 Google TensorFlow堆越界访问漏洞 详情
e1b2722e6d5c509c680b584416d9cb20 CNVD-2021-85881 (CVE-2021-42770) 2021-11-10 07:24:53 OPNsense跨站脚本漏洞 详情
ed09c9fa5586e2d4d9b4e95fe3b447a0 CNVD-2021-85880 (CVE-2021-28024) 2021-11-10 07:24:52 ServiceTonic访问控制不当漏洞 详情
8a642f0922f7f915e81b2b947276a96c CNVD-2021-85879 (CVE-2021-28023) 2021-11-10 07:24:50 ServiceTonic任意文件上传漏洞 详情
c00b061c2cfdee4016a869a188135db5 CNVD-2021-85878 (CVE-2021-28022) 2021-11-10 07:24:49 ServiceTonic SQL注入漏洞 详情
9c4b20a28ad2bd4ab916448f0e1272bd CNVD-2021-85877 (CVE-2021-32483) 2021-11-10 07:24:48 Cloudera Manager不正确访问控制漏洞 详情
4d4423857b7b1f38e49738f00e8949ba CNVD-2021-85876 (CVE-2021-32481) 2021-11-10 07:24:46 Cloudera Hue跨站脚本漏洞 详情
6b12b7fc216d603e8e07351603851c86 CNVD-2021-85875 (CVE-2021-29994) 2021-11-10 07:24:45 Cloudera Hue跨站脚本漏洞 详情
72894fb3a3538de240d2f6810aae63c9 CNVD-2021-85892 (CVE-2021-42701) 2021-11-10 02:38:27 DAQFactory中间人攻击漏洞 详情
94a1f99a64ba24540cc1594d0a0b3152 CNVD-2021-85893 (CVE-2021-42699) 2021-11-10 02:38:26 DAQFactory明文传输漏洞 详情
5d9bac33be8f2f88391f6de02fb89c73 CNVD-2021-85894 (CVE-2021-42698) 2021-11-10 02:38:24 DAQFactory反序列化漏洞 详情

国家信息安全漏洞库(CNNVD) [TOP 30] CVES TIME TITLE URL
b5815af17792cf5abac5732bae3094e9 CNNVD-202308-131 (CVE-2023-20215) 2023-08-03 12:41:47 Cisco Secure Web Appliance 安全漏洞 详情
8d98bb094a70919c9e881cc7da5898d4 CNNVD-202308-132 (CVE-2023-20204) 2023-08-03 12:40:44 Cisco BroadWorks CommPilot 安全漏洞 详情
c65e18d821cb73d6036dc2df6a726951 CNNVD-202308-123 (CVE-2023-29409) 2023-08-02 12:45:03 Google Golang 资源管理错误漏洞 详情
452c53b54ef3a658eaf6bd8e7d93fe05 CNNVD-202308-124 (CVE-2023-4070) 2023-08-02 12:44:01 Google Chrome 安全漏洞 详情
ac7b17414d163c2f26008516638e3a99 CNNVD-202308-125 (CVE-2023-39113) 2023-08-02 12:42:59 ngiflib 安全漏洞 详情
224fd467b813dbee234efe1e61e2ec66 CNNVD-202308-126 (CVE-2023-39114) 2023-08-02 12:42:57 ngiflib 安全漏洞 详情
72d862f454eb3d0e4dd221413d85f6b2 CNNVD-202308-127 (CVE-2023-1437) 2023-08-02 12:42:55 Advantech WebAccess/SCADA 安全漏洞 详情
a3b636c53a2116b7ab85ea0c29470e76 CNNVD-202308-128 (CVE-2023-3329) 2023-08-02 12:42:53 SpiderControl SCADA Webserver 路径遍历漏洞 详情
0e8e3c3600e145e70920c2026bde8feb CNNVD-202308-129 (CVE-2023-4069) 2023-08-02 12:42:51 Google Chrome 安全漏洞 详情
619ce483843859fb783525b2b8d00f59 CNNVD-202308-130 (CVE-2023-4068) 2023-08-02 12:41:48 Google Chrome 安全漏洞 详情
6a73381eaa628503bd8c242cd313f005 CNNVD-202308-057 (CVE-2023-36121) 2023-08-01 12:48:12 e107 跨站脚本漏洞 详情
086c171bc44677f87e0ad45c8ab5dab6 CNNVD-202308-058 (CVE-2023-2164) 2023-08-01 12:47:10 GitLab 跨站脚本漏洞 详情
bc6915cfb72ce7e27f2aa64ff3a35ee2 CNNVD-202308-059 (CVE-2023-31432) 2023-08-01 12:47:08 Brocade Fabric OS 安全漏洞 详情
915090fa2939ee9d9978125be4eeff27 CNNVD-202308-060 (CVE-2023-3739) 2023-08-01 12:46:07 Google Chrome 安全漏洞 详情
b790441bc923d37c914ea50edcdfaa16 CNNVD-202308-061 (CVE-2023-3385) 2023-08-01 12:46:05 GitLab 路径遍历漏洞 详情
a6be4479387eddda68e1c7808965c1bc CNNVD-202308-062 (CVE-2022-40609) 2023-08-01 12:46:03 IBM SDK, Java Technology Edition 安全漏洞 详情
55409ee74ffe87168f7d61814b568334 CNNVD-202308-063 (CVE-2023-31431) 2023-08-01 12:46:02 Brocade Fabric OS 安全漏洞 详情
a4340da9d26800c671fa800a080c3d01 CNNVD-202308-064 (CVE-2023-36210) 2023-08-01 12:45:00 MotoCMS 安全漏洞 详情
d70ae2187ae1aa50a2af6befce15bfbd CNNVD-202308-065 (CVE-2023-31428) 2023-08-01 12:43:58 Brocade Fabric OS 代码问题漏洞 详情
8b0e98f117732e813318bdec77d0fb4b CNNVD-202308-066 (CVE-2023-31928) 2023-08-01 12:42:57 Brocade Fabric OS 跨站脚本漏洞 详情
73ffd9540daad0a04d3d54041ba9df14 CNNVD-202307-2321 (CVE-2023-37772) 2023-07-31 12:44:10 Online Shopping Portal 安全漏洞 详情
10f462bbd81ee431ab32c6a160fc068d CNNVD-202307-2322 (CVE-2023-3983) 2023-07-31 12:44:08 Advantech iView 安全漏洞 详情
91dcd4420b85064dbae045bceabb71b9 CNNVD-202307-2323 (CVE-2023-37496) 2023-07-31 12:44:07 HCL Technologies HCL Verse 安全漏洞 详情
c81e50233ec479272b638b8dbddedeea CNNVD-202307-2324 (CVE-2023-38989) 2023-07-31 12:44:05 jeesite 安全漏洞 详情
775849c6f8c5fe41588806137e12cfa8 CNNVD-202307-2326 (CVE-2023-3462) 2023-07-31 12:44:03 HashiCorp Vault 安全漏洞 详情
f995ebc4f6961ed50c6d18ec0f7efcf4 CNNVD-202307-2327 (CVE-2022-42183) 2023-07-31 12:44:01 Precisely Spectrum Spatial Analyst 安全漏洞 详情
67539644d8b06577c03aeab1ac018450 CNNVD-202307-2328 (CVE-2022-42182) 2023-07-31 12:43:59 Precisely Spectrum Spatial Analyst 安全漏洞 详情
b61f0e730dfb90bb1c6f8f6e83508ae7 CNNVD-202307-2329 (CVE-2023-39122) 2023-07-31 12:43:56 BMC Control-M 安全漏洞 详情
a09d1da1d10d2b5f823d7b8b41490660 CNNVD-202307-2330 (CVE-2023-3825) 2023-07-31 12:42:54 PTC Kepware KEPServerEX 资源管理错误漏洞 详情
05caf2e95b7a0f72e0c071c443e1d82b CNNVD-202307-2331 (CVE-2023-4033) 2023-07-31 12:42:52 Mlflow 操作系统命令注入漏洞 详情

奇安信 [TOP 30] CVES TIME TITLE URL
45ab4afdafe578698bcfccccd65d833e yt QiAnXinTI-SV-2020-0009 Microsoft Windows Type 1字体处理远程代码执行漏洞(ADV200006)通告 详情
74691465618764c64d52a2ff58013ac4 yt QiAnXinTI-SV-2019-0013 Firefox远程代码执行漏洞(CVE-2019-11707)预警通告 详情
6bd01daffa85191c80698354fc8e252f wt QianxinTI-SV-2019-0015 Microsoft Windows RDP远程桌面服务多个远程代码执行漏洞通告 详情
59085bf4ae9a7a3802468d9764c94968 wt QiAnXinTI-SV-2019-0022 微软IE浏览器JScript脚本引擎远程代码执行漏洞通告 详情
7010355bb6ffff38cb1a885acf784ca7 ft QiAnXinTI-SV-2020-0008 Microsoft Windows SMBv3.0服务远程代码执行漏洞(CVE-2020-0796)通告 详情
5edb21a58a7e21692bd0ddd622d39279 St QiAnXinTI-SV-2020-0013 Microsoft DNS Server远程代码执行漏洞(CVE-2020-1350)通告 详情
3e8973410ef7c04408d63fa10c230487 St QiAnXinTI-SV-2020-0002 Microsoft IE jscript远程命令执行0day漏洞(CVE-2020-0674)通告 详情
e8bc02a0c3bfbafd4c84d9ec26e9bede St QianxinTI-SV-2020-0001 微软核心加密库漏洞(CVE-2020-0601)通告 详情
f749eac58b87d0954f0e4a84b5d67057 CVE-2020-1350 2020-07-15 15:57:00 QiAnXinTI-SV-2020-0013 Microsoft DNS Server远程代码执行漏洞(CVE-2020-1350)通告 详情
90b93cb7073fe73b17746ac166a09637 CVE-2020-6819, CVE-2020-6820 2020-04-08 10:34:35 QianxinTI-SV-2020-0012 Firefox在野远程代码执行漏洞(CVE-2020-6819、CVE-2020-6820)通告 详情
e318a5efa4803b50cdef480b90b1784d 2020-03-25 13:58:51 QiAnXinTI-SV-2020-0009 Microsoft Windows Type 1字体处理远程代码执行漏洞(ADV200006)通告 详情
cffc3035f7899495cfeae521451f91b2 CVE-2020-0796 2020-03-12 10:32:09 QiAnXinTI-SV-2020-0008 Microsoft Windows SMBv3.0服务远程代码执行漏洞(CVE-2020-0796)通告 详情
3e6175d47d17c6f94bd9ba10d81c3717 CVE-2020-0674 2020-03-02 14:52:46 QiAnXinTI-SV-2020-0002 Microsoft IE jscript远程命令执行0day漏洞(CVE-2020-0674)通告 详情
d99d073afb7d248a8a62fb068921997f CVE-2020-0601 2020-01-15 14:11:41 QianxinTI-SV-2020-0001 微软核心加密库漏洞(CVE-2020-0601)通告 详情
b7b45b14a3af1225ef6eec72d74964df CVE-2019-1367 2019-09-25 17:23:00 QiAnXinTI-SV-2019-0022 微软IE浏览器JScript脚本引擎远程代码执行漏洞通告 详情
504fc79f0123db109a11b149c334b75c CVE-2019-0708 2019-09-09 10:20:47 QiAnXinTI-SV-2019-0006 微软远程桌面服务远程代码执行漏洞(CVE-2019-0708)预警通告 详情
5b727692d583d4a6e7cdb0f670eac12a CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, CVE-2019-1226 2019-08-14 11:09:05 QianxinTI-SV-2019-0015 Microsoft Windows RDP远程桌面服务多个远程代码执行漏洞通告 详情
54b48d765fccbc8dcfa3de0920459f8d CVE-2019-11707 2019-06-19 16:53:47 QiAnXinTI-SV-2019-0013 Firefox远程代码执行漏洞(CVE-2019-11707)预警通告 详情
5b4d5fea09fbc2dca45be53f162d39de CVE-2019-0708 2019-05-31 17:03:19 QiAnXinTI-SV-2019-0006 微软远程桌面服务远程代码执行漏洞(CVE-2019-0708)预警通告 详情

安全客 [TOP 30] CVES TIME TITLE URL
03afa8b4eaf4a0160784152fca5465b2 CVE-2021-27308 2021-07-11 14:22:05 4images 跨站脚本漏洞 详情
8b0ace4c54a7fc20a99d21e294152a99 CVE-2020-15261 2021-07-11 14:22:05 Veyon Service 安全漏洞 详情
d4f12de949590ab346b61986a29d8b4d CVE-2021-35039 2021-07-09 17:30:13 Linux kernel 安全漏洞 详情
f790e7ef3b5de3774d42ee32b9b10c01 CVE-2021-34626 2021-07-09 17:30:13 WordPress 访问控制错误漏洞 详情
71bf261eb2113d5ff870ab9bafd29f55 CVE-2021-25952 2021-07-09 17:30:13 just-safe-set 安全漏洞 详情
152793cbc104933584f5f227606f433d CVE-2021-0597 2021-07-09 17:30:13 Google Android 信息泄露漏洞 详情
75f153c327984fdfdd2d9c463a91371d CVE-2021-34430 2021-07-09 17:30:13 Eclipse TinyDTLS 安全特征问题漏洞 详情
9610336f1a41241cc8edea22a2780ec5 CVE-2021-3638 2021-07-09 17:30:13 QEMU 安全漏洞 详情
92fe450ae5c5dfa48072aca79d64ba63 CVE-2021-34614 2021-07-09 14:24:32 Aruba ClearPass Policy Manager 安全漏洞 详情
680a4218fc32922746717210664a3d62 CVE-2021-22144 2021-07-09 13:28:16 Elasticsearch 安全漏洞 详情
373930f669f2c1f7b61101a925304779 CVE-2021-24022 2021-07-09 13:28:16 Fortinet FortiManager 安全漏洞 详情
8556f9cd0699f88c1f6cca9a43463bdd CVE-2021-33012 2021-07-09 13:28:16 Allen Bradley Micrologix 1100输入验证错误漏洞 详情
480ae713cc88cc0985e1ebc079974d83 CVE-2021-0592 2021-07-09 13:28:16 Google Android 安全漏洞 详情
8ef4dbefa6604ea2312621401c3ec0b9 CVE-2021-1598 2021-07-09 13:28:16 Cisco Video Surveillance 7000 Series IP Cameras 安全漏洞 详情
d6e8714c32df7a0dcc2f3910ec68b42d CVE-2021-20782 2021-07-09 13:28:16 Software License Manager 跨站请求伪造漏洞 详情
4e60b22611b8bb0fd7e532896498af29 CVE-2021-20781 2021-07-09 13:28:16 WordPress 跨站请求伪造漏洞 详情
5ca48ad58fb499c069ae0800c3b39875 CVE-2021-32961 2021-07-09 13:28:16 MDT AutoSave代码问题漏洞 详情
2ed854890b43f08e52340a1e8fe6d39f CVE-2021-0577 2021-07-09 13:28:16 Google Android 安全漏洞 详情
8d63110e1475bbd245715b2ee1824d13 CVE-2021-31816 2021-07-09 13:28:16 Octopus Server 安全漏洞 详情
72bef2ae2f5db7dd066e1cdefa618dc5 CVE-2021-31817 2021-07-09 13:28:16 Octopus Server 安全漏洞 详情
1f7369b2609dbd2cd40d091f7de540cd CVE-2020-20217 2021-07-09 13:28:16 Mikrotik RouterOs 安全漏洞 详情
1793176eecc5813c3348f026dc9909c9 CVE-2020-28598 2021-07-09 13:28:16 PrusaSlicer 安全漏洞 详情
7f4cf34ceb545548dcfcc3c0e7120268 CVE-2021-32945 2021-07-09 13:28:16 MDT AutoSave加密问题漏洞 详情
58553eb00d6e3e83b633f09464c4e98a CVE-2021-29712 2021-07-09 13:28:16 IBM InfoSphere Information Server 跨站脚本漏洞 详情
d8e27ec42fb0b89998fcc006f49b249b CVE-2021-25432 2021-07-09 13:28:16 Samsung Members 信息泄露漏洞 详情
8f2adc6c247725bf2eb7f53256c93ea7 CVE-2021-25433 2021-07-09 13:28:16 Samsung Tizen安全漏洞 详情
8f949676124339eb6f64f9c607af5470 CVE-2021-25431 2021-07-09 13:28:16 Samsung Mobile Device Cameralyzer 访问控制错误漏洞 详情
069818a8958f9c158fcb0956ee32fc03 CVE-2021-25434 2021-07-09 13:28:16 Samsung Tizen 代码注入漏洞 详情
55b9126220b9722ff5d730d3996877e9 CVE-2021-32949 2021-07-09 13:28:16 MDT AutoSave 路径遍历漏洞 详情
ebab009fffdee3d360dcdff74b0ed061 CVE-2021-25435 2021-07-09 13:28:16 Samsung Tizen代码注入漏洞 详情

斗象 [TOP 30] CVES TIME TITLE URL
096b6298d82574500dc1a14c9dba4065 CVE-2022-22038, CVE-2022-22047, CVE-2022-30216, CVE-2022-22029 2022-07-15 00:38:28 微软2022年7月补丁日漏洞通告 详情
6018f718b2d751478bf1ce069ac65f0d CVE-2022-2185 2022-07-01 09:02:05 GitLab 远程代码执行漏洞(CVE-2022-2185) 详情
844719cf0bb4843aff73d2f33cc6dd0b CVE-2022-30190, CVE-2022-30136 2022-06-15 05:48:12 微软2022年6月补丁日漏洞通告 详情
8b47000e1abfbacdadb7df6f09152d89 CVE-2022-26134 2022-06-03 05:48:38 Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134) 详情
eebe93468b36d2ca24cf4b82136a5635 CVE-2022-30190 2022-05-31 13:57:17 Microsoft Windows MSDT 远程代码执行漏洞(CVE-2022-30190) 详情
95525e3f5907a776dc7cd4f87f2e2154 2022-05-23 07:11:04 Fastjson 反序列化漏洞 详情
945fd6e612634d9721f861833f1ecb75 CVE-2022-26925, CVE-2022-26937, CVE-2022-22017, CVE-2022-26923 2022-05-11 03:45:48 微软2022年5月补丁日漏洞通告 详情
e2938ff82d0cc152508e0240697def4c CVE-2022-1388 2022-05-06 05:53:04 F5 BIG-IP iControl REST 身份验证绕过漏洞(CVE-2022-1388) 详情
bcf7253d2ee580c618737de137d370c4 CVE-2022-29464 2022-04-22 02:21:17 WSO2 Carbon Server 远程代码执行漏洞(CVE-2022-29464) 详情
07c09799b08afb04c63a9de750b70aca CVE-2022-26809, CVE-2022-24491, CVE-2022-24497, CVE-2022-26815, CVE-2022-26904 2022-04-13 07:51:00 微软2022年4月补丁日漏洞通告 详情
f5b543501ed5679d423411edac502e24 CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 2022-04-08 03:49:31 VMware 产品多个高危漏洞通告 详情
f421bcdb306e2bc1ffbf58fcb024a0dd 2022-03-29 17:11:30 Spring 框架远程代码执行漏洞 详情
0473358d95e58c7c3f2e7db0109f56f4 2022-03-29 17:11:30 Spring Framework 远程代码执行漏洞(CVE-2022-22965) 详情
a888c948ca1172f8a06a3879479f1de4 CVE-2022-22965 2022-03-29 17:11:30 Spring Framework 远程代码执行漏洞(CVE-2022-22965) 详情
71ed541bb737196268b75c7ba435e1a9 2022-03-28 04:57:30 Spring Cloud Function SpEL表达式注入漏洞 详情
f7a5dcd376be777c6593a29b8ebd411a CVE-2022-0778 2022-03-18 07:09:22 OpenSSL拒绝服务漏洞(CVE-2022-0778) 详情
6c4124fed44906a79843cd2dd383c695 CVE-2022-0847 2022-03-15 03:32:03 Linux Kernel本地提权漏洞(CVE-2022-0847) 详情
a2795e4829bff16f108cf191eba663c3 CVE-2022-21990, CVE-2022-24508, CVE-2022-23277 2022-03-11 02:14:56 微软2022年3月补丁日漏洞通告 详情
d09f0641bf65c64a16d802cd78e14097 CVE-2022-0847 2022-03-08 08:23:08 Linux 内核本地提权漏洞(CVE-2022-0847) 详情
69052e2a8c09416f5df674f92cba25a6 CVE-2022-22947 2022-03-02 11:42:55 Spring Cloud Gateway 远程代码执行漏洞(CVE-2022-22947) 详情
5f42b6f584a9ace426787dc8dfd6e6e5 2022-02-16 10:44:18 向日葵远程命令执行漏洞(CNVD-2022-10270) 详情
79556071f6236ab4674f75b3beee4d79 CVE-2022-24112 2022-02-11 06:13:35 Apache APISIX 远程代码执行漏洞 (CVE-2022-24112) 详情
485f2c57713f4a39830e8c2d01e43cfe CVE-2021-4034 2022-01-26 06:19:16 Linux Polkit 权限提升漏洞(CVE-2021-4034) 详情
0aa6eab412c0318b74c6a470ee774df1 CVE-2022-21907, CVE-2022-21969, CVE-2022-21846, CVE-2022-21855, CVE-2022-21874, CVE-2022-21893, CVE-2022-21850, CVE-2022-21851, CVE-2022-21836, CVE-2022-21919 2022-01-12 03:44:50 微软2022年1月补丁日漏洞通告 详情
88a8c676b52a739c0335d7c21ca810a9 2022-01-06 08:19:17 MeterSphere 远程代码执行漏洞 详情
76cad61d2d5a8750a6a714ab2c6dbc97 CVE-2021-45232 2021-12-28 10:31:16 Apache APISIX Dashboard 接口未授权访问漏洞(CVE-2021-45232) 详情
af4f5f63390eb00de8705b5029d8c376 CVE-2021-44228, CVE-2021-45046 2021-12-14 01:56:52 Apache Log4j 远程代码执行漏洞 详情
43456ae172e45c12087c40c03d925e0e CVE-2021-44228 2021-12-11 03:21:34 Apache Log4j 远程代码执行漏洞 详情
392b133d98d6f61aee36ce6c8784f4df 2021-12-09 15:20:54 Apache Log4j 远程代码执行漏洞 详情
1e193280a8f45427c06cb4945be4f126 2021-12-07 06:48:55 Grafana 任意文件读取漏洞 详情

红后 [TOP 30] CVES TIME TITLE URL
6fa0a347889bf0da0cae47ef068a6a99 CVE-2023-32836 2023-11-16 21:05:37 GOOGLE ANDROID Vulnerability 详情
49751f9f84ed69956c96cc87959ec666 CVE-2021-22499 2023-11-16 21:05:34 Micro Focus Application Performance Management 跨站脚本漏洞 详情
eaa040f80d817832a627456843d3e24c CVE-2021-23883 2023-11-16 21:05:33 迈克菲 McAfee Endpoint Security 代码问题漏洞 详情
d52ddce51389f668d6fad6e7044bd974 CVE-2021-23878 2023-11-16 21:05:33 迈克菲 McAfee Endpoint Security 加密问题漏洞 详情
b62432054e9970a34c4d9e4d9efd1075 CVE-2023-32838 2023-11-16 21:05:33 GOOGLE ANDROID Vulnerability 详情
162855c32b8e1a1dafd6ef3e7a3b3da8 CVE-2022-43554 2023-11-16 21:05:33 IVANTI AVALANCHE Vulnerability 详情
dff8e982c8571446fc1d46fdb5263781 CVE-2021-21019 2023-11-16 21:05:33 Adobe Magento 注入漏洞 详情
5c28bf13629d4240819bb4f492d588a9 CVE-2022-34396 2023-11-15 21:56:12 DELL OPENMANAGE_SERVER_ADMINISTRATOR Vulnerability 详情
8876fd1be50182e42f17aaf033bfaf25 CVE-2022-45098 2023-11-15 21:56:10 DELL EMC_POWERSCALE_ONEFS Vulnerability 详情
d8a4cb7ca4e0f29533302f9f97f22a55 CVE-2022-45102 2023-11-15 21:55:56 DELL Multiple product Vulnerability 详情
72e081fb5149198ecc92f3f06383f0d5 CVE-2023-0512 2023-11-15 21:55:53 VIM VIM Vulnerability 详情
741e4f08caf4baef7072136884f07ae6 CVE-2023-24829 2023-11-15 21:55:48 APACHE IOTDB Vulnerability 详情
06eca26d44409544e5ec96702bf85ce0 CVE-2023-23628 2023-11-15 21:54:44 METABASE METABASE Vulnerability 详情
830da4b9e4f027d37c9e39125a30cc18 CVE-2022-3488 2023-11-15 21:54:27 ISC BIND Vulnerability 详情
93ceb6d645101eee2b05535717260299 CVE-2022-45808 2023-11-15 21:54:21 THIMPRESS LEARNPRESS Vulnerability 详情
d79756a4e0c6522a5ba958c82d0b4c88 CVE-2023-22482 2023-11-15 21:54:17 LINUXFOUNDATION ARGO-CD Vulnerability 详情
1c317622086c85695ff9266e3c5cf66f CVE-2022-4323 2023-11-15 21:54:16 SUMO GOOGLE_ANALYTICATOR Vulnerability 详情
6e8e12e7cd90fd6550e5cef8c12a4a50 CVE-2023-24069 2023-11-15 21:54:13 SIGNAL SIGNAL-DESKTOP Vulnerability 详情
de78bbaf8c5f6d744b657b8b7733d20e CVE-2023-24044 2023-11-15 21:54:12 PLESK OBSIDIAN Vulnerability 详情
44e1e95916d186bbbc5cabca01532712 CVE-2022-41733 2023-11-15 21:54:05 IBM INFOSPHERE_INFORMATION_SERVER Vulnerability 详情
136d79ca309f157fcf93764b6993609c CVE-2022-20752 2023-11-15 20:59:35 Cisco Unified Communications Manager 和 Cisco Unity Connection安全漏洞 详情
cfa598cc25996bf7c25d8622f86868f3 CVE-2022-32208 2023-11-15 20:59:35 curl 缓冲区错误漏洞 详情
5dc2248c28a031fb6cb3e94f714da748 CVE-2021-31677 2023-11-15 20:59:35 PESCMS 跨站请求伪造漏洞 详情
2df25199d06527c66c1929ede927aa18 CVE-2022-20800 2023-11-15 20:59:35 Cisco Unified Communications Manager 跨站脚本漏洞 详情
537152d5106a70b12b4e0204db3ba5b3 CVE-2022-2304 2023-11-15 20:59:34 Vim 安全漏洞 详情
dee30b1a759cdba8cda08222c3b6cf63 CVE-2022-2309 2023-11-15 20:59:34 lxml 和 libxml2 代码问题漏洞 详情
edc189cc3f6caea2e67f158e0f93dd19 CVE-2022-31116 2023-11-15 20:59:34 UltraJSON 其他漏洞 详情
3e53baf169ff30745b9dfa6f9505233b CVE-2022-20791 2023-11-15 20:59:26 Cisco Unified Communications Manager 路径遍历漏洞 详情
6ae237378a32e08e6f0495fa3dbce32b CVE-2022-20812 2023-11-15 20:59:26 Cisco Expressway Series 和 Cisco TelePresence Video Communication Server 路径遍历漏洞 详情
a2523ef82d3016d54faf64dd9af12f3f CVE-2022-31129 2023-11-15 20:59:26 Moment.js 资源管理错误漏洞 详情

绿盟 [TOP 30] CVES TIME TITLE URL
07ff13766e6eda544e413ceb300607e9 CVE-2024-12312 2025-02-28 13:27:57 WordPress Print Science Designer plugin不受信任数据反序列化漏洞 详情
96e0b0c91b06d953b4a5ecfec71bc612 CVE-2024-12329 2025-02-28 13:27:57 WordPress Essential Real Estate plugin敏感信息泄露漏洞 详情
205143180fd646aa434da08572dc37a5 CVE-2024-12564 2025-02-28 13:27:57 Open Design Alliance CDE inWEB SDK敏感信息泄露漏洞 详情
78c4aba7419004dcc8345585d527ae37 CVE-2024-12333 2025-02-28 13:27:57 WordPress Woodmart theme代码注入漏洞 详情
2d3fe5437226d262f5c3df68dba66d7c CVE-2024-11760 2025-02-28 13:27:57 WordPress Currency Converter Widget PRO plugin跨站脚本漏洞 详情
319c981098d0f2d7bc91e06390e4800c CVE-2024-12160 2025-02-28 13:27:57 WordPress Seraphinite Bulk Discounts for WooCommerce跨站脚本漏洞 详情
9c491939e6e0bd7c2901366e18b6d07c CVE-2024-10043 2025-02-28 13:27:57 GitLab EE授权错误漏洞 详情
b01d6119078e51c36fd74abe01052e61 CVE-2024-12201 2025-02-28 13:27:57 WordPress Hash Form plugin授权缺失漏洞 详情
1589394801933a9f20626d1ddb8fceee CVE-2024-12397 2025-02-28 13:27:57 Quarkus HTTP请求夹带漏洞 详情
d03ae50732ec3864b9ee63b6ca0d6819 CVE-2024-11727 2025-02-28 13:27:57 WordPress NotificationX plugin跨站脚本漏洞 详情
2a7dc7fdb9b96a3347032f71650e65e0 CVE-2024-12401 2025-02-28 13:27:57 cert-manager输入验证错误漏洞 详情
96ac6565cb6d60af90a82f5ca6441700 CVE-2024-11724 2025-02-28 13:27:57 WordPress Cookie Consent for WP plugin授权缺失漏洞 详情
ef7b44b2166f0d595eba2dc2089677ea CVE-2024-21574 2025-02-28 13:27:57 ComfyUI-Manager代码注入漏洞 详情
a3bd04b9029a521aaf5f3ffe4484cd2d CVE-2024-11181 2025-02-28 13:27:57 WordPress Greenshift plugin信息泄露漏洞 详情
09791539b80d43a3e70c0c615a371846 CVE-2024-12265 2025-02-28 13:27:57 WordPress Web3 Crypto Payments by DePay for WooCommerce授权缺失漏洞 详情
f1ebe5e8c4d2b27532decaae22b958c3 CVE-2024-46622 2025-02-26 09:29:43 SecureAge Security Suite权限提升漏洞 详情
11c80e9d55ccd43a588f386f66557910 CVE-2025-22395 2025-02-26 09:29:43 Dell Update Package Framework权限提升漏洞 详情
978a3b64cac54d324490e1d9ccb9d973 CVE-2024-48455 2025-02-26 09:29:43 Netis Systems多款产品信息泄露漏洞 详情
937d32d09ab3d79285bd35cefe2e4fc8 CVE-2024-54880 2025-02-26 09:29:43 SeaCMS访问控制错误漏洞 详情
b142cb6a61cb3f3bca079b01c03d1daa CVE-2024-56828 2025-02-26 09:29:43 ChestnutCMS文件上传漏洞 详情
565566dae4c14015c56f1686d51158d9 CVE-2024-48457 2025-02-26 09:29:43 Netis Systems多款产品越界读取漏洞 详情
88439523bbc7fbb5316a3d53d7ef8045 CVE-2024-48456 2025-02-26 09:29:43 Netis Systems多款产品越界读取漏洞 详情
48d06e40461ebe2a07d633bbaac7f98b CVE-2024-12402 2025-02-26 09:29:43 WordPress Themes Coder Plugin权限提升漏洞 详情
091cbc8c2acc33047566c6ba72c0a5f2 CVE-2024-11777 2025-02-26 09:29:43 WordPress Sell Media Plugin跨站脚本漏洞 详情
992986b17991ac85700a5c82085792fe CVE-2024-55074 2025-02-26 09:29:43 Grocy跨站脚本漏洞 详情
6dde449c96bd83c445bd0f39adf55b81 CVE-2024-11290 2025-02-26 09:29:43 WordPress Member Access Plugin信息泄露漏洞 详情
b44a11235219206cb5e4232040129753 CVE-2024-12098 2025-02-26 09:29:43 WordPress ARS Affiliate Page Plugin跨站脚本漏洞 详情
6c2b3d895b8b3067dd3c52f6ee79ce05 CVE-2024-11337 2025-02-26 09:29:43 WordPress Horoscope And Tarot Plugin跨站脚本漏洞 详情
3f7a46526136bcfc4aa36cc908a1439c CVE-2024-12541 2025-02-26 09:29:43 WordPress Chative Live chat and Chatbot Plugin跨站请求伪造漏洞 详情
7ba57109b7dd16786a8483309a85c322 CVE-2024-11899 2025-02-26 09:29:43 WordPress Slider Pro Lite Plugin跨站脚本漏洞 详情

美国国家漏洞数据库(NVD) [TOP 30] CVES TIME TITLE URL
c6b3897e8411249dddc03a2582c3afdc CVE-2023-45955 2023-10-31 18:15:08 An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands. 详情
752c86d745d9d6748f49970fc6c72bf7 CVE-2022-48189 2023-10-30 15:15:39 An SMM driver input validation vulnerability in the BIOS of some ThinkPad models could allow an attacker with local access and elevated privileges to execute arbitrary code. 详情
8e0bb5e55759a9b19da4ce8a5bf48799 CVE-2022-4573 2023-10-30 15:15:39 An SMI handler input validation vulnerability in the ThinkPad X1 Fold Gen 1 could allow an attacker with local access and elevated privileges to execute arbitrary code. 详情
790b026d2f9b8a38a121baf7cc9fbbe2 CVE-2023-45797 2023-10-30 07:15:12 A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. 详情
9fee627171b8e0c7c2f065dae65c293c CVE-2023-46468 2023-10-28 01:15:51 An issue in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted file to the custom plugin function. 详情
1f2c404d06acfac83f7761c8ab878dee CVE-2023-43322 2023-10-28 01:15:51 ZPE Systems, Inc Nodegrid OS v5.0.0 to v5.0.17, v5.2.0 to v5.2.19, v5.4.0 to v5.4.16, v5.6.0 to v5.6.13, v5.8.0 to v5.8.10, and v5.10.0 to v5.10.3 was discovered to contain a command injection vulnerability via the endpoint /v1/system/toolkit/files/. 详情
eea9f6fc871d45cb3672714124c1d416 CVE-2023-46211 2023-10-27 21:15:09 Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder plugin <= 3.19.14 versions. 详情
8496e7ff58df6fda25c681900fb6dfb8 CVE-2023-46209 2023-10-27 21:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in G5Theme Grid Plus – Unlimited grid plugin <= 1.3.2 versions. 详情
751468e26927001b02f1b97a3d980488 CVE-2023-46208 2023-10-27 21:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in StylemixThemes Motors – Car Dealer, Classifieds & Listing plugin <= 1.4.6 versions. 详情
26e1875553f4c463d954949d41128765 CVE-2023-46200 2023-10-27 21:15:09 Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephen Darlington, Wandle Software Limited Smart App Banner plugin <= 1.1.3 versions. 详情
a86c2cbf359259b1e38cd6e0c560a363 CVE-2023-46509 2023-10-27 21:15:09 An issue in Contec SolarView Compact v.6.0 and before allows an attacker to execute arbitrary code via the texteditor.php component. 详情
c608240b549dc25f03e04b5397e48e1b CVE-2023-46199 2023-10-27 08:15:31 Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Triberr plugin <= 4.1.1 versions. 详情
c4bd3098463c3624a284c838fd6ecb48 CVE-2023-46194 2023-10-27 08:15:31 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.5 versions. 详情
e79edbb292a519fa08055a884d86921e CVE-2023-46192 2023-10-27 08:15:31 Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Internet Marketing Ninjas Internal Link Building plugin <= 1.2.3 versions. 详情
528422b82114eedfc8a332c895b5d475 CVE-2023-46504 2023-10-27 04:15:10 Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component. 详情
4b4a8cd15c35de7b7cb3e0f5110f178b CVE-2023-46503 2023-10-27 04:15:10 Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules. 详情
9637804577e375e89e0c34d1e9dc7daa CVE-2023-46505 2023-10-27 01:15:32 Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file. 详情
ccc0d1dc9e1e6371fc7ed4a7e6bc67c9 CVE-2023-46491 2023-10-27 00:15:09 ZenTao Biz version 4.1.3 and before has a Cross Site Scripting (XSS) vulnerability in the Version Library. 详情
925767e89590e6107a882a20468a3153 CVE-2023-42188 2023-10-27 00:15:09 IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF). 详情
8affd999965e83dbd42583837011424c CVE-2023-42406 2023-10-26 22:15:08 SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component. 详情
7d0ccfb0da7a7225f1fd25c20c95a57e CVE-2023-46435 2023-10-26 18:15:08 Sourcecodester Packers and Movers Management System v1.0 is vulnerable to SQL Injection via mpms/?p=services/view_service&id. 详情
0ab665a469513a0f70af2e1f17519e41 CVE-2023-5792 2023-10-26 17:15:10 A vulnerability has been found in SourceCodester Sticky Notes App 1.0 and classified as critical. This vulnerability affects unknown code of the file endpoint/delete-note.php. The manipulation of the argument note leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243598 is the identifier assigned to this vulnerability. 详情
692b9ba4d9cf7c90b6a3e5b8396a5302 CVE-2023-5791 2023-10-26 17:15:10 A vulnerability, which was classified as problematic, was found in SourceCodester Sticky Notes App 1.0. This affects an unknown part of the file endpoint/add-note.php. The manipulation of the argument noteTitle/noteContent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243597 was assigned to this vulnerability. 详情
7e262fff58c0ebc8ddc6cdfb7535d7e2 CVE-2023-5790 2023-10-26 17:15:10 A vulnerability classified as critical was found in SourceCodester File Manager App 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-file.php. The manipulation of the argument uploadedFileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243595. 详情
c643f1003e7a0ee28d9e54cda26d6b85 CVE-2023-43208 2023-10-26 17:15:09 NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679. 详情
3d3bc04cd7ec7fdf5aaaa0aa0a140b90 CVE-2023-46450 2023-10-26 15:15:09 Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function. 详情
844b1b549a5543c879cdc68d7237f444 CVE-2023-46449 2023-10-26 15:15:09 Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function. 详情
f494a8af43bc7ce0e5b6f1d2f18f3740 CVE-2023-46081 2023-10-26 13:15:09 Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Lavacode Lava Directory Manager plugin <= 1.1.34 versions. 详情
3a451401fdd162ad57ab72c2f5d7b984 CVE-2023-46077 2023-10-26 13:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed – Custom Feed plugin <= 2.2.5 versions. 详情
428d0a0df20b616e36d68a5b76023a38 CVE-2023-46076 2023-10-26 13:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao WooCommerce PDF Invoice Builder, Create invoices, packing slips and more plugin <= 1.2.102 versions. 详情