返回我的博客 | 威胁情报播报


360 网络安全响应中心 [TOP 30] CVES TIME TITLE URL
4d42b2e96c478df11ac597898d1526f0 2024-04-17 11:18:19 2024-04 补丁日: Oracle多个产品漏洞安全风险通告 详情
448cfa0216a0757ec96f5862f86eafd4 2024-04-01 10:42:50 安全事件周报 2024-03-25 第13周 详情
1205680821e2717a58c599f99a9fb422 2024-03-26 07:23:13 安全事件周报 2024-03-18 第12周 详情
2e93df858fc2c5b287883dc9313a87fc 2024-03-18 07:07:47 安全事件周报 2024-03-11 第11周 详情
c1cad147c12a38c089cd941022bc395e 2024-03-13 04:34:11 2024-03 补丁日: 微软多个漏洞安全更新通告 详情
7119e349c423ea015d6f2a824c67ed63 2024-03-11 06:17:28 安全事件周报 2024-03-04 第10周 详情
b2c0e23dcf540c0b5d2bb144ceade98d CVE-2024-27198 2024-03-06 08:44:35 CVE-2024-27198:JetBrains TeamCity 身份验证绕过漏洞通告 详情
5e103cbd4bae3244e692ba33c1d7fcf8 2024-03-04 07:07:59 安全事件周报 2024-02-26 第9周 详情
cab02a763bf285b3dc009731f40f8c29 CVE-2024-25065 2024-03-01 09:06:25 CVE-2024-25065:Apache OFBiz目录遍历漏洞通告 详情
194761e30d263596338cc998ac88cbaa 2024-02-28 08:51:55 SupermanMiner挖矿木马新变种持续活跃 详情
213a4c5c76a220c24da1c38c605fcc10 CVE-2024-25600 2024-02-27 09:55:55 CVE-2024-25600:WordPress Bricks Builder远程命令执行漏洞通告 详情
bc2c3923f651854c68f2dd6f99d69f0a 2024-02-26 03:00:09 安全事件周报 2024-02-19 第8周 详情
55c72f6f2af616fbddbb643df06c3b3a CVE-2024-21413 2024-02-23 06:57:46 CVE-2024-21413:Microsoft Outlook 远程代码执行漏洞通告 详情
f000a20bfa53fd8b0f5231b52ff34577 2024-02-19 10:10:13 2024-02 补丁日: 微软多个漏洞安全更新通告 详情
48ff3925c0cc22862b0d6e1f52140bdc 2024-02-06 07:10:07 安全事件周报 2024-01-29 第5周 详情
d8c34853fbcc6b39ae0a3783c6fa6d44 CVE-2024-21626 2024-02-01 08:38:56 CVE-2024-21626:runc容器逃逸漏洞通告 详情
6ff357e8344fde5ea96c964cc0161137 2024-01-29 10:02:54 安全事件周报 2024-01-22 第4周 详情
8fc558ad63c1387fb3ed919bf754820e CVE-2024-0204 2024-01-25 08:26:39 CVE-2024-0204:GoAnywhere MFT 身份认证绕过漏洞通告 详情
f4359caac3c70e9141439aa773e1e8a5 2024-01-22 11:39:38 安全事件周报 2024-01-15 第3周 详情
4939f25b3f3d3242726cd400c645be04 CVE-2024-0519 2024-01-17 09:08:07 CVE-2024-0519:Google Chrome V8越界访问漏洞通告 详情
300687d61adecf75afb4de6d78398518 CVE-2024-0519 2024-01-17 08:09:14 CVE-2024-0519:Google Chrome V8类型混淆漏洞通告 详情
28f74976e64bebdcd2b71df42f44817e CVE-2023-22527 2024-01-16 09:50:35 CVE-2023-22527:Atlassian Confluence 远程代码执行漏洞通告 详情
ec39eae21390157f92422897b04aad66 2024-01-15 08:28:24 安全事件周报 2024-01-08 第2周 详情
de12aee5eaff6382190430b22e2c643f 2024-01-11 10:55:37 2024-01 补丁日: 微软多个漏洞安全更新通告 详情
c2b35c67c2732343be5c23579ebcdd04 2024-01-08 07:37:47 安全事件周报 2024-01-01 第1周 详情
666a3a36b86650d472f7203220b3a4f5 2024-01-02 09:34:01 安全事件周报 2023-12-25 第52周 详情
f91862c02f62f7f8e9d01e209e59487b CVE-2023-51467 2023-12-27 08:57:10 CVE-2023-51467:Apache OFBiz 未授权远程代码执行漏洞通告 详情
0c520d1f3614bc8cba4450fee6f03f5d 2023-12-25 08:21:40 安全事件周报 2023-12-18 第51周 详情
ffb5d5f9ba0fa1576f9bd8325a8d3e66 2023-12-18 08:50:39 安全事件周报 2023-12-11 第50周 详情
382c73d6388430b9cea6072c6c61858e 2023-12-13 08:50:10 2023-12 补丁日: 微软多个漏洞安全更新通告 详情

Tenable (Nessus) [TOP 30] CVES TIME TITLE URL
396e6e46623238ce5e1cd53077b3b331 CVE-2025-67793 2025-12-17 21:16:16 An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges. 详情
1cb6c5cbe6de77f055dca988394c4de1 CVE-2025-67792 2025-12-17 21:16:16 An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. Local unprivileged users can manipulate a DriveLock process to execute arbitrary commands on Windows computers. 详情
2b2f23b2a72bf085805df947ed0214b5 CVE-2025-67790 2025-12-17 21:16:16 An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. An unprivileged user could cause occasionally a Blue Screen Of Death (BSOD) on Windows computers by using an IOCTL and an unterminated string. 详情
0416b0ad52456b4817cece2966aba899 CVE-2025-67789 2025-12-17 21:16:16 An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. Authenticated users can retrieve the computer count of other DriveLock tenants via the DriveLock API. 详情
4c1b035005d5b0aa088275a172e60a21 CVE-2025-67493 2025-12-17 21:16:15 Homarr is an open-source dashboard. Prior to version 1.45.3, it was possible to craft an input which allowed privilege escalation and getting access to groups of other users due to missing sanitization of inputs in ldap search query. The vulnerability could impact all instances using ldap authentication where a malicious actor had access to a user account. Version 1.45.3 has a patch for the issue. 详情
1f486e06d96659dace6f28d60259dbfe CVE-2025-66647 2025-12-17 21:16:15 RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. A vulnerability was discovered in the IPv6 fragmentation reassembly implementation of RIOT OS v2025.07. When copying the contents of the first fragment (offset=0) into the reassembly buffer, no size check is performed. It is possible to force the creation of a small reassembly buffer by first sending a shorter fragment (also with offset=0). Overflowing the reassembly buffer corrupts the state of other packet buffers which an attacker might be able to used to achieve further memory corruption (potentially resulting in remote code execution). To trigger the vulnerability, the `gnrc_ipv6_ext_frag` module must be included and the attacker must be able to send arbitrary IPv6 packets to the victim. Version 2025.10 fixes the issue. 详情
97e4904e53a92f1dcd865a67471919e3 CVE-2025-59849 2025-12-17 21:16:14 Improper management of Content Security Policy in HCL BigFix Remote Control Lite Web Portal (versions 10.1.0.0326 and lower) may allow the execution of malicious code in web pages. 详情
f91f8fe0a5dc648d0accc62aecfaa4cb CVE-2025-55254 2025-12-17 21:16:14 Improper management of Path-relative stylesheet import in HCL BigFix Remote Control Lite Web Portal (versions 10.1.0.0326 and lower) may allow to execute malicious code in certain web pages. 详情
57a4300e3ea5c915a40e6b77827d25da CVE-2025-53000 2025-12-17 21:16:14 The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Windows platform from this directory, the `inkscape.bat` file is run unexpectedly. As of time of publication, no known patches exist. 详情
f1cd5eb213966bd23b74eeccf1f6796e CVE-2025-46292 2025-12-17 21:16:14 This issue was addressed with additional entitlement checks. This issue is fixed in iOS 26.2 and iPadOS 26.2, iOS 18.7.3 and iPadOS 18.7.3. An app may be able to access user-sensitive data. 详情
2b03a0f21f803236f4470230e86f8c35 CVE-2025-8872 2025-12-16 20:15:49 On affected platforms running Arista EOS with OSPFv3 configured, a specially crafted packet can cause the OSFPv3 process to have high CPU utilization which may result in the OSFPv3 process being restarted. This may cause disruption in the OSFPv3 routes on the switch. This issue was discovered internally by Arista and is not aware of any malicious uses of this issue in customer networks. 详情
499f1ae2c892955315462a270ac0cf9e CVE-2025-65834 2025-12-16 20:15:48 Meltytech Shotcut 25.10.31 is vulnerable to Buffer Overflow. A memory access violation occurs when processing MLT project files with manipulated width and height parameters. By setting these values to extremely large numbers, the application attempts to allocate excessive memory during image processing, triggering a buffer overflow in the mlt_image_fill_white function. 详情
4e9e4e6c02971d41183390b8f980a736 CVE-2025-13532 2025-12-16 20:15:47 Insecure defaults in the Server Agent component of Fortra's Core Privileged Access Manager (BoKS) can result in the selection of weak password hash algorithms. This issue affects BoKS Server Agent 9.0 instances that support yescrypt and are running in a BoKS 8.1 domain. 详情
dd99b659139ac7daa03a434be78e2de8 CVE-2025-68270 2025-12-16 19:16:00 The Open edX Platform is a learning management platform. Prior to commit 05d0d0936daf82c476617257aa6c35f0cd4ca060, CourseLimitedStaffRole users are able to access and edit courses in studio if they are granted the role on an org rather than on a course, and CourseLimitedStaffRole users are able to list courses they have the role on in studio even though they are not meant to have any access on the studio side for the course. Commit 05d0d0936daf82c476617257aa6c35f0cd4ca060 fixes the issue. 详情
879c9e265c9c3babdf29e0f3a4009aff CVE-2025-68156 2025-12-16 19:16:00 Expr is an expression language and expression evaluation for Go. Prior to version 1.17.7, several builtin functions in Expr, including `flatten`, `min`, `max`, `mean`, and `median`, perform recursive traversal over user-provided data structures without enforcing a maximum recursion depth. If the evaluation environment contains deeply nested or cyclic data structures, these functions may recurse indefinitely until exceed the Go runtime stack limit. This results in a stack overflow panic, causing the host application to crash. While exploitability depends on whether an attacker can influence or inject cyclic or pathologically deep data into the evaluation environment, this behavior represents a denial-of-service (DoS) risk and affects overall library robustness. Instead of returning a recoverable evaluation error, the process may terminate unexpectedly. In affected versions, evaluation of expressions that invoke certain builtin functions on untrusted or insufficiently validated data structures can lead to a process-level crash due to stack exhaustion. This issue is most relevant in scenarios where Expr is used to evaluate expressions against externally supplied or dynamically constructed environments; cyclic references (directly or indirectly) can be introduced into arrays, maps, or structs; and there are no application-level safeguards preventing deeply nested input data. In typical use cases with controlled, acyclic data, the issue may not manifest. However, when present, the resulting panic can be used to reliably crash the application, constituting a denial of service. The issue has been fixed in the v1.17.7 versions of Expr. The patch introduces a maximum recursion depth limit for affected builtin functions. When this limit is exceeded, evaluation aborts gracefully and returns a descriptive error instead of panicking. Additionally, the maximum depth can be customized by users via `builtin.MaxDepth`, allowing applications with legitimate deep structures to raise the limit in a controlled manner. Users are strongly encouraged to upgrade to the patched release, which includes both the recursion guard and comprehensive test coverage to prevent regressions. For users who cannot immediately upgrade, some mitigations are recommended. Ensure that evaluation environments cannot contain cyclic references, validate or sanitize externally supplied data structures before passing them to Expr, and/or wrap expression evaluation with panic recovery to prevent a full process crash (as a last-resort defensive measure). These workarounds reduce risk but do not fully eliminate the issue without the patch. 详情
cdea3cffe08f97ff42ccd455783bd39b CVE-2025-68155 2025-12-16 19:16:00 @vitejs/plugin-rs provides React Server Components (RSC) support for Vite. Prior to version 0.5.8, the `/__vite_rsc_findSourceMapURL` endpoint in `@vitejs/plugin-rsc` allows unauthenticated arbitrary file read during development mode. An attacker can read any file accessible to the Node.js process by sending a crafted HTTP request with a `file://` URL in the `filename` query parameter. Version 0.5.8 fixes the issue. 详情
28bb03fd5cad7b0d98a74930894a19d7 CVE-2025-68154 2025-12-16 19:16:00 systeminformation is a System and OS information library for node.js. In versions prior to 5.27.14, the `fsSize()` function in systeminformation is vulnerable to OS command injection on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. The actual exploitability depends on how applications use this function. If an application does not pass user-controlled input to `fsSize()`, it is not vulnerable. Version 5.27.14 contains a patch. 详情
6233c70b771552e0c86c01fc641bbb8d CVE-2025-68150 2025-12-16 19:16:00 Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.2 and 9.1.1-alpha.1, the Instagram authentication adapter allows clients to specify a custom API URL via the `apiURL` parameter in `authData`. This enables SSRF attacks and possibly authentication bypass if malicious endpoints return fake responses to validate unauthorized users. This is fixed in versions 8.6.2 and 9.1.1-alpha.1 by hardcoding the Instagram Graph API URL `https://graph.instagram.com` and ignoring client-provided `apiURL` values. No known workarounds are available. 详情
216cdfb529e10e0582abcd5f07c8238e CVE-2025-68146 2025-12-16 19:15:59 filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of UnixFileLock/WindowsFileLock (note: different locking semantics, may not be suitable for all use cases); ensure lock file directories have restrictive permissions (chmod 0700) to prevent untrusted users from creating symlinks; and/or monitor lock file directories for suspicious symlinks before running trusted applications. These workarounds provide only partial mitigation. The race condition remains exploitable. Upgrading to version 3.20.1 is strongly recommended. 详情
6aefe88e682df5a68bc5614f5701cc6a CVE-2025-65593 2025-12-16 19:15:59 nopCommerce 4.90.0 is vulnerable to Cross Site Request Forgery (CSRF) via the Schedule Tasks functionality. 详情
229be00841ed2b2ddce584dfd5ceeb36 CVE-2025-14722 2025-12-15 20:32:06 A vulnerability was determined in vion707 DMadmin up to 3403cafdb42537a648c30bf8cbc8148ec60437d1. This impacts the function Add of the file Admin/Controller/AddonsController.class.php of the component Backend. Executing manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way. 详情
37fe5105d96581ee9959fc7ab916a58f CVE-2023-53887 2025-12-15 20:28:22 Zomplog 3.9 contains a cross-site scripting vulnerability that allows authenticated users to inject malicious scripts when creating new pages. Attackers can craft malicious image source and onerror attributes to execute arbitrary JavaScript code in victim's browser. 详情
71fcaa419ab668804723a77b7514b422 CVE-2023-53886 2025-12-15 20:28:21 Xlight FTP Server 3.9.3.6 contains a stack buffer overflow vulnerability in the 'Execute Program' configuration that allows attackers to crash the application. Attackers can trigger the vulnerability by inserting 294 characters into the program execution configuration, causing a denial of service condition. 详情
84279ac02c4364171d38329a79e41e08 CVE-2023-53880 2025-12-15 20:28:18 Lucee 5.4.2.17 contains a reflected cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through administrative interface parameters. Attackers can craft specific payloads targeting admin pages like server.cfm and web.cfm to execute arbitrary JavaScript in victim's browser sessions. 详情
c2997c01007de0d362f7e694abcad4d0 CVE-2023-53873 2025-12-15 20:28:15 SyncBreeze 15.2.24 contains a denial of service vulnerability in the login authentication mechanism that allows attackers to crash the service. Attackers can send an oversized password parameter with repeated 'password=' values to overwhelm the login endpoint and potentially disrupt service availability. 详情
2a0958f5514ae88e2634e2358bb3bd6c CVE-2023-53868 2025-12-15 20:22:36 Coppermine Gallery 1.6.25 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the plugin manager. Attackers can upload a zipped PHP file with system commands to the plugin directory and execute arbitrary code by accessing the uploaded plugin script. 详情
5dd574b992b9002fed2af20b45f4dae8 CVE-2025-55703 2025-12-15 20:15:51 An error-based SQL injection vulnerability exists in the Sunbird Power IQ 9.2.0 API. The vulnerability is due to an outdated API endpoint that applied arrays without proper input validation. This can allow attackers to manipulate SQL queries. This has been addressed in Power IQ version 9.2.1, where the API call code was updated to ensure safe handling of input values. 详情
4a62b7eab9aae8791b924af51ccff0c8 CVE-2025-66439 2025-12-15 18:15:48 An issue was discovered in Frappe ERPNext through 15.89.0. Function get_outstanding_reference_documents() at erpnext.accounts.doctype.payment_entry.payment_entry.py is vulnerable to SQL Injection. It allows an attacker to extract arbitrary data from the database by injecting SQL payloads via the from_posting_date parameter, which is directly interpolated into the query without proper sanitization or parameter binding. 详情
5fc1a5491de7386c915863f76834c15b CVE-2025-66438 2025-12-15 18:15:48 A Server-Side Template Injection (SSTI) vulnerability exists in the Frappe ERPNext through 15.89.0 Print Format rendering mechanism. Specifically, the API frappe.www.printview.get_html_and_style() triggers the rendering of the html field inside a Print Format document using frappe.render_template(template, doc) via the get_rendered_template() call chain. Although ERPNext wraps Jinja2 in a SandboxedEnvironment, it exposes sensitive functions such as frappe.db.sql through get_safe_globals(). An authenticated attacker with permission to create or modify a Print Format can inject arbitrary Jinja expressions into the html field. Once the malicious Print Format is saved, the attacker can call get_html_and_style() with a target document (e.g., Supplier or Sales Invoice) to trigger the render process. This leads to information disclosure from the database, such as database version, schema details, or sensitive values, depending on the injected payload. Exploitation flow: Create a Print Format with SSTI payload in the html field; call the get_html_and_style() API; triggers frappe.render_template(template, doc) inside get_rendered_template(); leaks database information via frappe.db.sql or other exposed globals. 详情
b1c5710f78e7afc5717cb045eb8d0a1d CVE-2025-66436 2025-12-15 18:15:48 An SSTI (Server-Side Template Injection) vulnerability exists in the get_terms_and_conditions method of Frappe ERPNext through 15.89.0. The function renders attacker-controlled Jinja2 templates (terms) using frappe.render_template() with a user-supplied context (doc). Although Frappe uses a custom SandboxedEnvironment, several dangerous globals such as frappe.db.sql are still available in the execution context via get_safe_globals(). An authenticated attacker with access to create or modify a Terms and Conditions document can inject arbitrary Jinja expressions into the terms field, resulting in server-side code execution within a restricted but still unsafe context. This vulnerability can be used to leak database information. 详情

国家信息安全漏洞共享平台(CNVD) [TOP 30] CVES TIME TITLE URL
8686fda9b2b49e4e1666b54e2248f935 CNVD-2021-74882 2021-11-14 16:43:52 四创科技有限公司建站系统存在SQL注入漏洞 详情
8f6972d84ad188b05ff9cc14d4334949 CNVD-2021-87021 (CVE-2020-4690) 2021-11-12 12:43:14 IBM Security Guardium硬编码凭证漏洞 详情
3bfe7b053a0c59d8a3d38c18f86aa143 CNVD-2021-87022 (CVE-2021-38870) 2021-11-12 12:43:12 IBM Aspera跨站脚本漏洞 详情
a4649bb17f4db4d1c7f879ebceb46ed0 CNVD-2021-87011 (CVE-2021-29753) 2021-11-12 12:43:11 IBM Business Automation Workflow存在未明漏洞 详情
094c613f9ed4b8b9d887dc912789043c CNVD-2021-87025 (CVE-2021-20563) 2021-11-12 12:43:10 IBM Sterling File Gateway信息泄露漏洞 详情
41c47f01a4c65dcb6efc9ebf483fe762 CNVD-2021-87010 (CVE-2021-38887) 2021-11-12 12:43:08 IBM InfoSphere Information Server信息泄露漏洞 详情
f51d33e7a09fd61ca90ede453515a830 CNVD-2021-87016 (CVE-2021-29764) 2021-11-12 12:43:07 IBM Sterling B2B Integrator跨站脚本漏洞 详情
33615a5f78df822e82e6d3436045c48c CNVD-2021-87026 (CVE-2021-38877) 2021-11-12 12:43:06 IBM Jazz for Service Management跨站脚本漏洞 详情
8e729177bcb4105dd831fb1e123ed1bb CNVD-2021-87014 (CVE-2021-29679) 2021-11-12 12:43:04 IBM Cognos Analytics远程代码执行漏洞 详情
1a3b856f78e9fbdca12aeddc7d665aca CNVD-2021-87029 (CVE-2021-29752) 2021-11-12 12:43:03 IBM Db2信息泄露漏洞 详情
6f1aa3a0cb819d97519baa47fd0232d5 CNVD-2021-87015 (CVE-2021-29745) 2021-11-12 12:43:02 IBM Cognos Analytics权限提升漏洞 详情
cbcb12f5f51d6e7d6d8a9fa581aa863a CNVD-2021-73908 2021-11-11 16:42:44 泛微e-cology存在SQL注入漏洞 详情
ae6fd467da55de31aa7219187cf5c2d4 CNVD-2021-86904 (CVE-2021-20351) 2021-11-11 08:31:46 IBM Engineering跨站脚本漏洞 详情
412a15b40959ed9cf9330ee79f99e079 CNVD-2021-86903 (CVE-2021-31173) 2021-11-11 08:31:44 Microsoft SharePoint Server信息泄露漏洞 详情
1cbc5d5faac431d3e82c9e5ea9588b5f CNVD-2021-86902 (CVE-2021-31172) 2021-11-11 08:31:43 Microsoft SharePoint欺骗漏洞 详情
686c7cfb20933b41c3d679cbba79a2ad CNVD-2021-86901 (CVE-2021-31181) 2021-11-11 08:31:42 Microsoft SharePoint远程代码执行漏洞 详情
72fdfb2d44c0d41d638e4632bdfc10b8 CNVD-2021-86900 (CVE-2021-3561) 2021-11-11 08:31:41 fig2dev缓冲区溢出漏洞 详情
3ba6f0e9394f9414e2cadb9495e2d5f5 CNVD-2021-85884 (CVE-2021-41210) 2021-11-10 07:24:57 Google TensorFlow堆分配数组越界读取漏洞 详情
4d8c4744ea972fb2fcb9673fea1fc7b7 CNVD-2021-85883 (CVE-2021-41226) 2021-11-10 07:24:56 Google TensorFlow堆越界访问漏洞 详情
8778f9cd924cae585ca5e2e0b8be3b3f CNVD-2021-85882 (CVE-2021-41224) 2021-11-10 07:24:54 Google TensorFlow堆越界访问漏洞 详情
e1b2722e6d5c509c680b584416d9cb20 CNVD-2021-85881 (CVE-2021-42770) 2021-11-10 07:24:53 OPNsense跨站脚本漏洞 详情
ed09c9fa5586e2d4d9b4e95fe3b447a0 CNVD-2021-85880 (CVE-2021-28024) 2021-11-10 07:24:52 ServiceTonic访问控制不当漏洞 详情
8a642f0922f7f915e81b2b947276a96c CNVD-2021-85879 (CVE-2021-28023) 2021-11-10 07:24:50 ServiceTonic任意文件上传漏洞 详情
c00b061c2cfdee4016a869a188135db5 CNVD-2021-85878 (CVE-2021-28022) 2021-11-10 07:24:49 ServiceTonic SQL注入漏洞 详情
9c4b20a28ad2bd4ab916448f0e1272bd CNVD-2021-85877 (CVE-2021-32483) 2021-11-10 07:24:48 Cloudera Manager不正确访问控制漏洞 详情
4d4423857b7b1f38e49738f00e8949ba CNVD-2021-85876 (CVE-2021-32481) 2021-11-10 07:24:46 Cloudera Hue跨站脚本漏洞 详情
6b12b7fc216d603e8e07351603851c86 CNVD-2021-85875 (CVE-2021-29994) 2021-11-10 07:24:45 Cloudera Hue跨站脚本漏洞 详情
72894fb3a3538de240d2f6810aae63c9 CNVD-2021-85892 (CVE-2021-42701) 2021-11-10 02:38:27 DAQFactory中间人攻击漏洞 详情
94a1f99a64ba24540cc1594d0a0b3152 CNVD-2021-85893 (CVE-2021-42699) 2021-11-10 02:38:26 DAQFactory明文传输漏洞 详情
5d9bac33be8f2f88391f6de02fb89c73 CNVD-2021-85894 (CVE-2021-42698) 2021-11-10 02:38:24 DAQFactory反序列化漏洞 详情

国家信息安全漏洞库(CNNVD) [TOP 30] CVES TIME TITLE URL
b5815af17792cf5abac5732bae3094e9 CNNVD-202308-131 (CVE-2023-20215) 2023-08-03 12:41:47 Cisco Secure Web Appliance 安全漏洞 详情
8d98bb094a70919c9e881cc7da5898d4 CNNVD-202308-132 (CVE-2023-20204) 2023-08-03 12:40:44 Cisco BroadWorks CommPilot 安全漏洞 详情
c65e18d821cb73d6036dc2df6a726951 CNNVD-202308-123 (CVE-2023-29409) 2023-08-02 12:45:03 Google Golang 资源管理错误漏洞 详情
452c53b54ef3a658eaf6bd8e7d93fe05 CNNVD-202308-124 (CVE-2023-4070) 2023-08-02 12:44:01 Google Chrome 安全漏洞 详情
ac7b17414d163c2f26008516638e3a99 CNNVD-202308-125 (CVE-2023-39113) 2023-08-02 12:42:59 ngiflib 安全漏洞 详情
224fd467b813dbee234efe1e61e2ec66 CNNVD-202308-126 (CVE-2023-39114) 2023-08-02 12:42:57 ngiflib 安全漏洞 详情
72d862f454eb3d0e4dd221413d85f6b2 CNNVD-202308-127 (CVE-2023-1437) 2023-08-02 12:42:55 Advantech WebAccess/SCADA 安全漏洞 详情
a3b636c53a2116b7ab85ea0c29470e76 CNNVD-202308-128 (CVE-2023-3329) 2023-08-02 12:42:53 SpiderControl SCADA Webserver 路径遍历漏洞 详情
0e8e3c3600e145e70920c2026bde8feb CNNVD-202308-129 (CVE-2023-4069) 2023-08-02 12:42:51 Google Chrome 安全漏洞 详情
619ce483843859fb783525b2b8d00f59 CNNVD-202308-130 (CVE-2023-4068) 2023-08-02 12:41:48 Google Chrome 安全漏洞 详情
6a73381eaa628503bd8c242cd313f005 CNNVD-202308-057 (CVE-2023-36121) 2023-08-01 12:48:12 e107 跨站脚本漏洞 详情
086c171bc44677f87e0ad45c8ab5dab6 CNNVD-202308-058 (CVE-2023-2164) 2023-08-01 12:47:10 GitLab 跨站脚本漏洞 详情
bc6915cfb72ce7e27f2aa64ff3a35ee2 CNNVD-202308-059 (CVE-2023-31432) 2023-08-01 12:47:08 Brocade Fabric OS 安全漏洞 详情
915090fa2939ee9d9978125be4eeff27 CNNVD-202308-060 (CVE-2023-3739) 2023-08-01 12:46:07 Google Chrome 安全漏洞 详情
b790441bc923d37c914ea50edcdfaa16 CNNVD-202308-061 (CVE-2023-3385) 2023-08-01 12:46:05 GitLab 路径遍历漏洞 详情
a6be4479387eddda68e1c7808965c1bc CNNVD-202308-062 (CVE-2022-40609) 2023-08-01 12:46:03 IBM SDK, Java Technology Edition 安全漏洞 详情
55409ee74ffe87168f7d61814b568334 CNNVD-202308-063 (CVE-2023-31431) 2023-08-01 12:46:02 Brocade Fabric OS 安全漏洞 详情
a4340da9d26800c671fa800a080c3d01 CNNVD-202308-064 (CVE-2023-36210) 2023-08-01 12:45:00 MotoCMS 安全漏洞 详情
d70ae2187ae1aa50a2af6befce15bfbd CNNVD-202308-065 (CVE-2023-31428) 2023-08-01 12:43:58 Brocade Fabric OS 代码问题漏洞 详情
8b0e98f117732e813318bdec77d0fb4b CNNVD-202308-066 (CVE-2023-31928) 2023-08-01 12:42:57 Brocade Fabric OS 跨站脚本漏洞 详情
73ffd9540daad0a04d3d54041ba9df14 CNNVD-202307-2321 (CVE-2023-37772) 2023-07-31 12:44:10 Online Shopping Portal 安全漏洞 详情
10f462bbd81ee431ab32c6a160fc068d CNNVD-202307-2322 (CVE-2023-3983) 2023-07-31 12:44:08 Advantech iView 安全漏洞 详情
91dcd4420b85064dbae045bceabb71b9 CNNVD-202307-2323 (CVE-2023-37496) 2023-07-31 12:44:07 HCL Technologies HCL Verse 安全漏洞 详情
c81e50233ec479272b638b8dbddedeea CNNVD-202307-2324 (CVE-2023-38989) 2023-07-31 12:44:05 jeesite 安全漏洞 详情
775849c6f8c5fe41588806137e12cfa8 CNNVD-202307-2326 (CVE-2023-3462) 2023-07-31 12:44:03 HashiCorp Vault 安全漏洞 详情
f995ebc4f6961ed50c6d18ec0f7efcf4 CNNVD-202307-2327 (CVE-2022-42183) 2023-07-31 12:44:01 Precisely Spectrum Spatial Analyst 安全漏洞 详情
67539644d8b06577c03aeab1ac018450 CNNVD-202307-2328 (CVE-2022-42182) 2023-07-31 12:43:59 Precisely Spectrum Spatial Analyst 安全漏洞 详情
b61f0e730dfb90bb1c6f8f6e83508ae7 CNNVD-202307-2329 (CVE-2023-39122) 2023-07-31 12:43:56 BMC Control-M 安全漏洞 详情
a09d1da1d10d2b5f823d7b8b41490660 CNNVD-202307-2330 (CVE-2023-3825) 2023-07-31 12:42:54 PTC Kepware KEPServerEX 资源管理错误漏洞 详情
05caf2e95b7a0f72e0c071c443e1d82b CNNVD-202307-2331 (CVE-2023-4033) 2023-07-31 12:42:52 Mlflow 操作系统命令注入漏洞 详情

奇安信 [TOP 30] CVES TIME TITLE URL
45ab4afdafe578698bcfccccd65d833e yt QiAnXinTI-SV-2020-0009 Microsoft Windows Type 1字体处理远程代码执行漏洞(ADV200006)通告 详情
74691465618764c64d52a2ff58013ac4 yt QiAnXinTI-SV-2019-0013 Firefox远程代码执行漏洞(CVE-2019-11707)预警通告 详情
6bd01daffa85191c80698354fc8e252f wt QianxinTI-SV-2019-0015 Microsoft Windows RDP远程桌面服务多个远程代码执行漏洞通告 详情
59085bf4ae9a7a3802468d9764c94968 wt QiAnXinTI-SV-2019-0022 微软IE浏览器JScript脚本引擎远程代码执行漏洞通告 详情
7010355bb6ffff38cb1a885acf784ca7 ft QiAnXinTI-SV-2020-0008 Microsoft Windows SMBv3.0服务远程代码执行漏洞(CVE-2020-0796)通告 详情
5edb21a58a7e21692bd0ddd622d39279 St QiAnXinTI-SV-2020-0013 Microsoft DNS Server远程代码执行漏洞(CVE-2020-1350)通告 详情
3e8973410ef7c04408d63fa10c230487 St QiAnXinTI-SV-2020-0002 Microsoft IE jscript远程命令执行0day漏洞(CVE-2020-0674)通告 详情
e8bc02a0c3bfbafd4c84d9ec26e9bede St QianxinTI-SV-2020-0001 微软核心加密库漏洞(CVE-2020-0601)通告 详情
f749eac58b87d0954f0e4a84b5d67057 CVE-2020-1350 2020-07-15 15:57:00 QiAnXinTI-SV-2020-0013 Microsoft DNS Server远程代码执行漏洞(CVE-2020-1350)通告 详情
90b93cb7073fe73b17746ac166a09637 CVE-2020-6819, CVE-2020-6820 2020-04-08 10:34:35 QianxinTI-SV-2020-0012 Firefox在野远程代码执行漏洞(CVE-2020-6819、CVE-2020-6820)通告 详情
e318a5efa4803b50cdef480b90b1784d 2020-03-25 13:58:51 QiAnXinTI-SV-2020-0009 Microsoft Windows Type 1字体处理远程代码执行漏洞(ADV200006)通告 详情
cffc3035f7899495cfeae521451f91b2 CVE-2020-0796 2020-03-12 10:32:09 QiAnXinTI-SV-2020-0008 Microsoft Windows SMBv3.0服务远程代码执行漏洞(CVE-2020-0796)通告 详情
3e6175d47d17c6f94bd9ba10d81c3717 CVE-2020-0674 2020-03-02 14:52:46 QiAnXinTI-SV-2020-0002 Microsoft IE jscript远程命令执行0day漏洞(CVE-2020-0674)通告 详情
d99d073afb7d248a8a62fb068921997f CVE-2020-0601 2020-01-15 14:11:41 QianxinTI-SV-2020-0001 微软核心加密库漏洞(CVE-2020-0601)通告 详情
b7b45b14a3af1225ef6eec72d74964df CVE-2019-1367 2019-09-25 17:23:00 QiAnXinTI-SV-2019-0022 微软IE浏览器JScript脚本引擎远程代码执行漏洞通告 详情
504fc79f0123db109a11b149c334b75c CVE-2019-0708 2019-09-09 10:20:47 QiAnXinTI-SV-2019-0006 微软远程桌面服务远程代码执行漏洞(CVE-2019-0708)预警通告 详情
5b727692d583d4a6e7cdb0f670eac12a CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, CVE-2019-1226 2019-08-14 11:09:05 QianxinTI-SV-2019-0015 Microsoft Windows RDP远程桌面服务多个远程代码执行漏洞通告 详情
54b48d765fccbc8dcfa3de0920459f8d CVE-2019-11707 2019-06-19 16:53:47 QiAnXinTI-SV-2019-0013 Firefox远程代码执行漏洞(CVE-2019-11707)预警通告 详情
5b4d5fea09fbc2dca45be53f162d39de CVE-2019-0708 2019-05-31 17:03:19 QiAnXinTI-SV-2019-0006 微软远程桌面服务远程代码执行漏洞(CVE-2019-0708)预警通告 详情

安全客 [TOP 30] CVES TIME TITLE URL
03afa8b4eaf4a0160784152fca5465b2 CVE-2021-27308 2021-07-11 14:22:05 4images 跨站脚本漏洞 详情
8b0ace4c54a7fc20a99d21e294152a99 CVE-2020-15261 2021-07-11 14:22:05 Veyon Service 安全漏洞 详情
d4f12de949590ab346b61986a29d8b4d CVE-2021-35039 2021-07-09 17:30:13 Linux kernel 安全漏洞 详情
f790e7ef3b5de3774d42ee32b9b10c01 CVE-2021-34626 2021-07-09 17:30:13 WordPress 访问控制错误漏洞 详情
71bf261eb2113d5ff870ab9bafd29f55 CVE-2021-25952 2021-07-09 17:30:13 just-safe-set 安全漏洞 详情
152793cbc104933584f5f227606f433d CVE-2021-0597 2021-07-09 17:30:13 Google Android 信息泄露漏洞 详情
75f153c327984fdfdd2d9c463a91371d CVE-2021-34430 2021-07-09 17:30:13 Eclipse TinyDTLS 安全特征问题漏洞 详情
9610336f1a41241cc8edea22a2780ec5 CVE-2021-3638 2021-07-09 17:30:13 QEMU 安全漏洞 详情
92fe450ae5c5dfa48072aca79d64ba63 CVE-2021-34614 2021-07-09 14:24:32 Aruba ClearPass Policy Manager 安全漏洞 详情
680a4218fc32922746717210664a3d62 CVE-2021-22144 2021-07-09 13:28:16 Elasticsearch 安全漏洞 详情
373930f669f2c1f7b61101a925304779 CVE-2021-24022 2021-07-09 13:28:16 Fortinet FortiManager 安全漏洞 详情
8556f9cd0699f88c1f6cca9a43463bdd CVE-2021-33012 2021-07-09 13:28:16 Allen Bradley Micrologix 1100输入验证错误漏洞 详情
480ae713cc88cc0985e1ebc079974d83 CVE-2021-0592 2021-07-09 13:28:16 Google Android 安全漏洞 详情
8ef4dbefa6604ea2312621401c3ec0b9 CVE-2021-1598 2021-07-09 13:28:16 Cisco Video Surveillance 7000 Series IP Cameras 安全漏洞 详情
d6e8714c32df7a0dcc2f3910ec68b42d CVE-2021-20782 2021-07-09 13:28:16 Software License Manager 跨站请求伪造漏洞 详情
4e60b22611b8bb0fd7e532896498af29 CVE-2021-20781 2021-07-09 13:28:16 WordPress 跨站请求伪造漏洞 详情
5ca48ad58fb499c069ae0800c3b39875 CVE-2021-32961 2021-07-09 13:28:16 MDT AutoSave代码问题漏洞 详情
2ed854890b43f08e52340a1e8fe6d39f CVE-2021-0577 2021-07-09 13:28:16 Google Android 安全漏洞 详情
8d63110e1475bbd245715b2ee1824d13 CVE-2021-31816 2021-07-09 13:28:16 Octopus Server 安全漏洞 详情
72bef2ae2f5db7dd066e1cdefa618dc5 CVE-2021-31817 2021-07-09 13:28:16 Octopus Server 安全漏洞 详情
1f7369b2609dbd2cd40d091f7de540cd CVE-2020-20217 2021-07-09 13:28:16 Mikrotik RouterOs 安全漏洞 详情
1793176eecc5813c3348f026dc9909c9 CVE-2020-28598 2021-07-09 13:28:16 PrusaSlicer 安全漏洞 详情
7f4cf34ceb545548dcfcc3c0e7120268 CVE-2021-32945 2021-07-09 13:28:16 MDT AutoSave加密问题漏洞 详情
58553eb00d6e3e83b633f09464c4e98a CVE-2021-29712 2021-07-09 13:28:16 IBM InfoSphere Information Server 跨站脚本漏洞 详情
d8e27ec42fb0b89998fcc006f49b249b CVE-2021-25432 2021-07-09 13:28:16 Samsung Members 信息泄露漏洞 详情
8f2adc6c247725bf2eb7f53256c93ea7 CVE-2021-25433 2021-07-09 13:28:16 Samsung Tizen安全漏洞 详情
8f949676124339eb6f64f9c607af5470 CVE-2021-25431 2021-07-09 13:28:16 Samsung Mobile Device Cameralyzer 访问控制错误漏洞 详情
069818a8958f9c158fcb0956ee32fc03 CVE-2021-25434 2021-07-09 13:28:16 Samsung Tizen 代码注入漏洞 详情
55b9126220b9722ff5d730d3996877e9 CVE-2021-32949 2021-07-09 13:28:16 MDT AutoSave 路径遍历漏洞 详情
ebab009fffdee3d360dcdff74b0ed061 CVE-2021-25435 2021-07-09 13:28:16 Samsung Tizen代码注入漏洞 详情

斗象 [TOP 30] CVES TIME TITLE URL
096b6298d82574500dc1a14c9dba4065 CVE-2022-22038, CVE-2022-22047, CVE-2022-30216, CVE-2022-22029 2022-07-15 00:38:28 微软2022年7月补丁日漏洞通告 详情
6018f718b2d751478bf1ce069ac65f0d CVE-2022-2185 2022-07-01 09:02:05 GitLab 远程代码执行漏洞(CVE-2022-2185) 详情
844719cf0bb4843aff73d2f33cc6dd0b CVE-2022-30190, CVE-2022-30136 2022-06-15 05:48:12 微软2022年6月补丁日漏洞通告 详情
8b47000e1abfbacdadb7df6f09152d89 CVE-2022-26134 2022-06-03 05:48:38 Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134) 详情
eebe93468b36d2ca24cf4b82136a5635 CVE-2022-30190 2022-05-31 13:57:17 Microsoft Windows MSDT 远程代码执行漏洞(CVE-2022-30190) 详情
95525e3f5907a776dc7cd4f87f2e2154 2022-05-23 07:11:04 Fastjson 反序列化漏洞 详情
945fd6e612634d9721f861833f1ecb75 CVE-2022-26925, CVE-2022-26937, CVE-2022-22017, CVE-2022-26923 2022-05-11 03:45:48 微软2022年5月补丁日漏洞通告 详情
e2938ff82d0cc152508e0240697def4c CVE-2022-1388 2022-05-06 05:53:04 F5 BIG-IP iControl REST 身份验证绕过漏洞(CVE-2022-1388) 详情
bcf7253d2ee580c618737de137d370c4 CVE-2022-29464 2022-04-22 02:21:17 WSO2 Carbon Server 远程代码执行漏洞(CVE-2022-29464) 详情
07c09799b08afb04c63a9de750b70aca CVE-2022-26809, CVE-2022-24491, CVE-2022-24497, CVE-2022-26815, CVE-2022-26904 2022-04-13 07:51:00 微软2022年4月补丁日漏洞通告 详情
f5b543501ed5679d423411edac502e24 CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 2022-04-08 03:49:31 VMware 产品多个高危漏洞通告 详情
f421bcdb306e2bc1ffbf58fcb024a0dd 2022-03-29 17:11:30 Spring 框架远程代码执行漏洞 详情
0473358d95e58c7c3f2e7db0109f56f4 2022-03-29 17:11:30 Spring Framework 远程代码执行漏洞(CVE-2022-22965) 详情
a888c948ca1172f8a06a3879479f1de4 CVE-2022-22965 2022-03-29 17:11:30 Spring Framework 远程代码执行漏洞(CVE-2022-22965) 详情
71ed541bb737196268b75c7ba435e1a9 2022-03-28 04:57:30 Spring Cloud Function SpEL表达式注入漏洞 详情
f7a5dcd376be777c6593a29b8ebd411a CVE-2022-0778 2022-03-18 07:09:22 OpenSSL拒绝服务漏洞(CVE-2022-0778) 详情
6c4124fed44906a79843cd2dd383c695 CVE-2022-0847 2022-03-15 03:32:03 Linux Kernel本地提权漏洞(CVE-2022-0847) 详情
a2795e4829bff16f108cf191eba663c3 CVE-2022-21990, CVE-2022-24508, CVE-2022-23277 2022-03-11 02:14:56 微软2022年3月补丁日漏洞通告 详情
d09f0641bf65c64a16d802cd78e14097 CVE-2022-0847 2022-03-08 08:23:08 Linux 内核本地提权漏洞(CVE-2022-0847) 详情
69052e2a8c09416f5df674f92cba25a6 CVE-2022-22947 2022-03-02 11:42:55 Spring Cloud Gateway 远程代码执行漏洞(CVE-2022-22947) 详情
5f42b6f584a9ace426787dc8dfd6e6e5 2022-02-16 10:44:18 向日葵远程命令执行漏洞(CNVD-2022-10270) 详情
79556071f6236ab4674f75b3beee4d79 CVE-2022-24112 2022-02-11 06:13:35 Apache APISIX 远程代码执行漏洞 (CVE-2022-24112) 详情
485f2c57713f4a39830e8c2d01e43cfe CVE-2021-4034 2022-01-26 06:19:16 Linux Polkit 权限提升漏洞(CVE-2021-4034) 详情
0aa6eab412c0318b74c6a470ee774df1 CVE-2022-21907, CVE-2022-21969, CVE-2022-21846, CVE-2022-21855, CVE-2022-21874, CVE-2022-21893, CVE-2022-21850, CVE-2022-21851, CVE-2022-21836, CVE-2022-21919 2022-01-12 03:44:50 微软2022年1月补丁日漏洞通告 详情
88a8c676b52a739c0335d7c21ca810a9 2022-01-06 08:19:17 MeterSphere 远程代码执行漏洞 详情
76cad61d2d5a8750a6a714ab2c6dbc97 CVE-2021-45232 2021-12-28 10:31:16 Apache APISIX Dashboard 接口未授权访问漏洞(CVE-2021-45232) 详情
af4f5f63390eb00de8705b5029d8c376 CVE-2021-44228, CVE-2021-45046 2021-12-14 01:56:52 Apache Log4j 远程代码执行漏洞 详情
43456ae172e45c12087c40c03d925e0e CVE-2021-44228 2021-12-11 03:21:34 Apache Log4j 远程代码执行漏洞 详情
392b133d98d6f61aee36ce6c8784f4df 2021-12-09 15:20:54 Apache Log4j 远程代码执行漏洞 详情
1e193280a8f45427c06cb4945be4f126 2021-12-07 06:48:55 Grafana 任意文件读取漏洞 详情

红后 [TOP 30] CVES TIME TITLE URL
6fa0a347889bf0da0cae47ef068a6a99 CVE-2023-32836 2023-11-16 21:05:37 GOOGLE ANDROID Vulnerability 详情
49751f9f84ed69956c96cc87959ec666 CVE-2021-22499 2023-11-16 21:05:34 Micro Focus Application Performance Management 跨站脚本漏洞 详情
eaa040f80d817832a627456843d3e24c CVE-2021-23883 2023-11-16 21:05:33 迈克菲 McAfee Endpoint Security 代码问题漏洞 详情
d52ddce51389f668d6fad6e7044bd974 CVE-2021-23878 2023-11-16 21:05:33 迈克菲 McAfee Endpoint Security 加密问题漏洞 详情
b62432054e9970a34c4d9e4d9efd1075 CVE-2023-32838 2023-11-16 21:05:33 GOOGLE ANDROID Vulnerability 详情
162855c32b8e1a1dafd6ef3e7a3b3da8 CVE-2022-43554 2023-11-16 21:05:33 IVANTI AVALANCHE Vulnerability 详情
dff8e982c8571446fc1d46fdb5263781 CVE-2021-21019 2023-11-16 21:05:33 Adobe Magento 注入漏洞 详情
5c28bf13629d4240819bb4f492d588a9 CVE-2022-34396 2023-11-15 21:56:12 DELL OPENMANAGE_SERVER_ADMINISTRATOR Vulnerability 详情
8876fd1be50182e42f17aaf033bfaf25 CVE-2022-45098 2023-11-15 21:56:10 DELL EMC_POWERSCALE_ONEFS Vulnerability 详情
d8a4cb7ca4e0f29533302f9f97f22a55 CVE-2022-45102 2023-11-15 21:55:56 DELL Multiple product Vulnerability 详情
72e081fb5149198ecc92f3f06383f0d5 CVE-2023-0512 2023-11-15 21:55:53 VIM VIM Vulnerability 详情
741e4f08caf4baef7072136884f07ae6 CVE-2023-24829 2023-11-15 21:55:48 APACHE IOTDB Vulnerability 详情
06eca26d44409544e5ec96702bf85ce0 CVE-2023-23628 2023-11-15 21:54:44 METABASE METABASE Vulnerability 详情
830da4b9e4f027d37c9e39125a30cc18 CVE-2022-3488 2023-11-15 21:54:27 ISC BIND Vulnerability 详情
93ceb6d645101eee2b05535717260299 CVE-2022-45808 2023-11-15 21:54:21 THIMPRESS LEARNPRESS Vulnerability 详情
d79756a4e0c6522a5ba958c82d0b4c88 CVE-2023-22482 2023-11-15 21:54:17 LINUXFOUNDATION ARGO-CD Vulnerability 详情
1c317622086c85695ff9266e3c5cf66f CVE-2022-4323 2023-11-15 21:54:16 SUMO GOOGLE_ANALYTICATOR Vulnerability 详情
6e8e12e7cd90fd6550e5cef8c12a4a50 CVE-2023-24069 2023-11-15 21:54:13 SIGNAL SIGNAL-DESKTOP Vulnerability 详情
de78bbaf8c5f6d744b657b8b7733d20e CVE-2023-24044 2023-11-15 21:54:12 PLESK OBSIDIAN Vulnerability 详情
44e1e95916d186bbbc5cabca01532712 CVE-2022-41733 2023-11-15 21:54:05 IBM INFOSPHERE_INFORMATION_SERVER Vulnerability 详情
136d79ca309f157fcf93764b6993609c CVE-2022-20752 2023-11-15 20:59:35 Cisco Unified Communications Manager 和 Cisco Unity Connection安全漏洞 详情
cfa598cc25996bf7c25d8622f86868f3 CVE-2022-32208 2023-11-15 20:59:35 curl 缓冲区错误漏洞 详情
5dc2248c28a031fb6cb3e94f714da748 CVE-2021-31677 2023-11-15 20:59:35 PESCMS 跨站请求伪造漏洞 详情
2df25199d06527c66c1929ede927aa18 CVE-2022-20800 2023-11-15 20:59:35 Cisco Unified Communications Manager 跨站脚本漏洞 详情
537152d5106a70b12b4e0204db3ba5b3 CVE-2022-2304 2023-11-15 20:59:34 Vim 安全漏洞 详情
dee30b1a759cdba8cda08222c3b6cf63 CVE-2022-2309 2023-11-15 20:59:34 lxml 和 libxml2 代码问题漏洞 详情
edc189cc3f6caea2e67f158e0f93dd19 CVE-2022-31116 2023-11-15 20:59:34 UltraJSON 其他漏洞 详情
3e53baf169ff30745b9dfa6f9505233b CVE-2022-20791 2023-11-15 20:59:26 Cisco Unified Communications Manager 路径遍历漏洞 详情
6ae237378a32e08e6f0495fa3dbce32b CVE-2022-20812 2023-11-15 20:59:26 Cisco Expressway Series 和 Cisco TelePresence Video Communication Server 路径遍历漏洞 详情
a2523ef82d3016d54faf64dd9af12f3f CVE-2022-31129 2023-11-15 20:59:26 Moment.js 资源管理错误漏洞 详情

绿盟 [TOP 30] CVES TIME TITLE URL
07ff13766e6eda544e413ceb300607e9 CVE-2024-12312 2025-02-28 13:27:57 WordPress Print Science Designer plugin不受信任数据反序列化漏洞 详情
96e0b0c91b06d953b4a5ecfec71bc612 CVE-2024-12329 2025-02-28 13:27:57 WordPress Essential Real Estate plugin敏感信息泄露漏洞 详情
205143180fd646aa434da08572dc37a5 CVE-2024-12564 2025-02-28 13:27:57 Open Design Alliance CDE inWEB SDK敏感信息泄露漏洞 详情
78c4aba7419004dcc8345585d527ae37 CVE-2024-12333 2025-02-28 13:27:57 WordPress Woodmart theme代码注入漏洞 详情
2d3fe5437226d262f5c3df68dba66d7c CVE-2024-11760 2025-02-28 13:27:57 WordPress Currency Converter Widget PRO plugin跨站脚本漏洞 详情
319c981098d0f2d7bc91e06390e4800c CVE-2024-12160 2025-02-28 13:27:57 WordPress Seraphinite Bulk Discounts for WooCommerce跨站脚本漏洞 详情
9c491939e6e0bd7c2901366e18b6d07c CVE-2024-10043 2025-02-28 13:27:57 GitLab EE授权错误漏洞 详情
b01d6119078e51c36fd74abe01052e61 CVE-2024-12201 2025-02-28 13:27:57 WordPress Hash Form plugin授权缺失漏洞 详情
1589394801933a9f20626d1ddb8fceee CVE-2024-12397 2025-02-28 13:27:57 Quarkus HTTP请求夹带漏洞 详情
d03ae50732ec3864b9ee63b6ca0d6819 CVE-2024-11727 2025-02-28 13:27:57 WordPress NotificationX plugin跨站脚本漏洞 详情
2a7dc7fdb9b96a3347032f71650e65e0 CVE-2024-12401 2025-02-28 13:27:57 cert-manager输入验证错误漏洞 详情
96ac6565cb6d60af90a82f5ca6441700 CVE-2024-11724 2025-02-28 13:27:57 WordPress Cookie Consent for WP plugin授权缺失漏洞 详情
ef7b44b2166f0d595eba2dc2089677ea CVE-2024-21574 2025-02-28 13:27:57 ComfyUI-Manager代码注入漏洞 详情
a3bd04b9029a521aaf5f3ffe4484cd2d CVE-2024-11181 2025-02-28 13:27:57 WordPress Greenshift plugin信息泄露漏洞 详情
09791539b80d43a3e70c0c615a371846 CVE-2024-12265 2025-02-28 13:27:57 WordPress Web3 Crypto Payments by DePay for WooCommerce授权缺失漏洞 详情
f1ebe5e8c4d2b27532decaae22b958c3 CVE-2024-46622 2025-02-26 09:29:43 SecureAge Security Suite权限提升漏洞 详情
11c80e9d55ccd43a588f386f66557910 CVE-2025-22395 2025-02-26 09:29:43 Dell Update Package Framework权限提升漏洞 详情
978a3b64cac54d324490e1d9ccb9d973 CVE-2024-48455 2025-02-26 09:29:43 Netis Systems多款产品信息泄露漏洞 详情
937d32d09ab3d79285bd35cefe2e4fc8 CVE-2024-54880 2025-02-26 09:29:43 SeaCMS访问控制错误漏洞 详情
b142cb6a61cb3f3bca079b01c03d1daa CVE-2024-56828 2025-02-26 09:29:43 ChestnutCMS文件上传漏洞 详情
565566dae4c14015c56f1686d51158d9 CVE-2024-48457 2025-02-26 09:29:43 Netis Systems多款产品越界读取漏洞 详情
88439523bbc7fbb5316a3d53d7ef8045 CVE-2024-48456 2025-02-26 09:29:43 Netis Systems多款产品越界读取漏洞 详情
48d06e40461ebe2a07d633bbaac7f98b CVE-2024-12402 2025-02-26 09:29:43 WordPress Themes Coder Plugin权限提升漏洞 详情
091cbc8c2acc33047566c6ba72c0a5f2 CVE-2024-11777 2025-02-26 09:29:43 WordPress Sell Media Plugin跨站脚本漏洞 详情
992986b17991ac85700a5c82085792fe CVE-2024-55074 2025-02-26 09:29:43 Grocy跨站脚本漏洞 详情
6dde449c96bd83c445bd0f39adf55b81 CVE-2024-11290 2025-02-26 09:29:43 WordPress Member Access Plugin信息泄露漏洞 详情
b44a11235219206cb5e4232040129753 CVE-2024-12098 2025-02-26 09:29:43 WordPress ARS Affiliate Page Plugin跨站脚本漏洞 详情
6c2b3d895b8b3067dd3c52f6ee79ce05 CVE-2024-11337 2025-02-26 09:29:43 WordPress Horoscope And Tarot Plugin跨站脚本漏洞 详情
3f7a46526136bcfc4aa36cc908a1439c CVE-2024-12541 2025-02-26 09:29:43 WordPress Chative Live chat and Chatbot Plugin跨站请求伪造漏洞 详情
7ba57109b7dd16786a8483309a85c322 CVE-2024-11899 2025-02-26 09:29:43 WordPress Slider Pro Lite Plugin跨站脚本漏洞 详情

美国国家漏洞数据库(NVD) [TOP 30] CVES TIME TITLE URL
c6b3897e8411249dddc03a2582c3afdc CVE-2023-45955 2023-10-31 18:15:08 An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands. 详情
752c86d745d9d6748f49970fc6c72bf7 CVE-2022-48189 2023-10-30 15:15:39 An SMM driver input validation vulnerability in the BIOS of some ThinkPad models could allow an attacker with local access and elevated privileges to execute arbitrary code. 详情
8e0bb5e55759a9b19da4ce8a5bf48799 CVE-2022-4573 2023-10-30 15:15:39 An SMI handler input validation vulnerability in the ThinkPad X1 Fold Gen 1 could allow an attacker with local access and elevated privileges to execute arbitrary code. 详情
790b026d2f9b8a38a121baf7cc9fbbe2 CVE-2023-45797 2023-10-30 07:15:12 A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. 详情
9fee627171b8e0c7c2f065dae65c293c CVE-2023-46468 2023-10-28 01:15:51 An issue in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted file to the custom plugin function. 详情
1f2c404d06acfac83f7761c8ab878dee CVE-2023-43322 2023-10-28 01:15:51 ZPE Systems, Inc Nodegrid OS v5.0.0 to v5.0.17, v5.2.0 to v5.2.19, v5.4.0 to v5.4.16, v5.6.0 to v5.6.13, v5.8.0 to v5.8.10, and v5.10.0 to v5.10.3 was discovered to contain a command injection vulnerability via the endpoint /v1/system/toolkit/files/. 详情
eea9f6fc871d45cb3672714124c1d416 CVE-2023-46211 2023-10-27 21:15:09 Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder plugin <= 3.19.14 versions. 详情
8496e7ff58df6fda25c681900fb6dfb8 CVE-2023-46209 2023-10-27 21:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in G5Theme Grid Plus – Unlimited grid plugin <= 1.3.2 versions. 详情
751468e26927001b02f1b97a3d980488 CVE-2023-46208 2023-10-27 21:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in StylemixThemes Motors – Car Dealer, Classifieds & Listing plugin <= 1.4.6 versions. 详情
26e1875553f4c463d954949d41128765 CVE-2023-46200 2023-10-27 21:15:09 Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephen Darlington, Wandle Software Limited Smart App Banner plugin <= 1.1.3 versions. 详情
a86c2cbf359259b1e38cd6e0c560a363 CVE-2023-46509 2023-10-27 21:15:09 An issue in Contec SolarView Compact v.6.0 and before allows an attacker to execute arbitrary code via the texteditor.php component. 详情
c608240b549dc25f03e04b5397e48e1b CVE-2023-46199 2023-10-27 08:15:31 Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Triberr plugin <= 4.1.1 versions. 详情
c4bd3098463c3624a284c838fd6ecb48 CVE-2023-46194 2023-10-27 08:15:31 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.5 versions. 详情
e79edbb292a519fa08055a884d86921e CVE-2023-46192 2023-10-27 08:15:31 Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Internet Marketing Ninjas Internal Link Building plugin <= 1.2.3 versions. 详情
528422b82114eedfc8a332c895b5d475 CVE-2023-46504 2023-10-27 04:15:10 Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component. 详情
4b4a8cd15c35de7b7cb3e0f5110f178b CVE-2023-46503 2023-10-27 04:15:10 Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules. 详情
9637804577e375e89e0c34d1e9dc7daa CVE-2023-46505 2023-10-27 01:15:32 Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file. 详情
ccc0d1dc9e1e6371fc7ed4a7e6bc67c9 CVE-2023-46491 2023-10-27 00:15:09 ZenTao Biz version 4.1.3 and before has a Cross Site Scripting (XSS) vulnerability in the Version Library. 详情
925767e89590e6107a882a20468a3153 CVE-2023-42188 2023-10-27 00:15:09 IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF). 详情
8affd999965e83dbd42583837011424c CVE-2023-42406 2023-10-26 22:15:08 SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component. 详情
7d0ccfb0da7a7225f1fd25c20c95a57e CVE-2023-46435 2023-10-26 18:15:08 Sourcecodester Packers and Movers Management System v1.0 is vulnerable to SQL Injection via mpms/?p=services/view_service&id. 详情
0ab665a469513a0f70af2e1f17519e41 CVE-2023-5792 2023-10-26 17:15:10 A vulnerability has been found in SourceCodester Sticky Notes App 1.0 and classified as critical. This vulnerability affects unknown code of the file endpoint/delete-note.php. The manipulation of the argument note leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243598 is the identifier assigned to this vulnerability. 详情
692b9ba4d9cf7c90b6a3e5b8396a5302 CVE-2023-5791 2023-10-26 17:15:10 A vulnerability, which was classified as problematic, was found in SourceCodester Sticky Notes App 1.0. This affects an unknown part of the file endpoint/add-note.php. The manipulation of the argument noteTitle/noteContent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243597 was assigned to this vulnerability. 详情
7e262fff58c0ebc8ddc6cdfb7535d7e2 CVE-2023-5790 2023-10-26 17:15:10 A vulnerability classified as critical was found in SourceCodester File Manager App 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-file.php. The manipulation of the argument uploadedFileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243595. 详情
c643f1003e7a0ee28d9e54cda26d6b85 CVE-2023-43208 2023-10-26 17:15:09 NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679. 详情
3d3bc04cd7ec7fdf5aaaa0aa0a140b90 CVE-2023-46450 2023-10-26 15:15:09 Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function. 详情
844b1b549a5543c879cdc68d7237f444 CVE-2023-46449 2023-10-26 15:15:09 Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function. 详情
f494a8af43bc7ce0e5b6f1d2f18f3740 CVE-2023-46081 2023-10-26 13:15:09 Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Lavacode Lava Directory Manager plugin <= 1.1.34 versions. 详情
3a451401fdd162ad57ab72c2f5d7b984 CVE-2023-46077 2023-10-26 13:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed – Custom Feed plugin <= 2.2.5 versions. 详情
428d0a0df20b616e36d68a5b76023a38 CVE-2023-46076 2023-10-26 13:15:09 Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao WooCommerce PDF Invoice Builder, Create invoices, packing slips and more plugin <= 1.2.102 versions. 详情