360 网络安全响应中心 [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
4d42b2e96c478df11ac597898d1526f0 | 2024-04-17 11:18:19 | 2024-04 补丁日: Oracle多个产品漏洞安全风险通告 | 详情 | |
448cfa0216a0757ec96f5862f86eafd4 | 2024-04-01 10:42:50 | 安全事件周报 2024-03-25 第13周 | 详情 | |
1205680821e2717a58c599f99a9fb422 | 2024-03-26 07:23:13 | 安全事件周报 2024-03-18 第12周 | 详情 | |
2e93df858fc2c5b287883dc9313a87fc | 2024-03-18 07:07:47 | 安全事件周报 2024-03-11 第11周 | 详情 | |
c1cad147c12a38c089cd941022bc395e | 2024-03-13 04:34:11 | 2024-03 补丁日: 微软多个漏洞安全更新通告 | 详情 | |
7119e349c423ea015d6f2a824c67ed63 | 2024-03-11 06:17:28 | 安全事件周报 2024-03-04 第10周 | 详情 | |
b2c0e23dcf540c0b5d2bb144ceade98d | CVE-2024-27198 | 2024-03-06 08:44:35 | CVE-2024-27198:JetBrains TeamCity 身份验证绕过漏洞通告 | 详情 |
5e103cbd4bae3244e692ba33c1d7fcf8 | 2024-03-04 07:07:59 | 安全事件周报 2024-02-26 第9周 | 详情 | |
cab02a763bf285b3dc009731f40f8c29 | CVE-2024-25065 | 2024-03-01 09:06:25 | CVE-2024-25065:Apache OFBiz目录遍历漏洞通告 | 详情 |
194761e30d263596338cc998ac88cbaa | 2024-02-28 08:51:55 | SupermanMiner挖矿木马新变种持续活跃 | 详情 | |
213a4c5c76a220c24da1c38c605fcc10 | CVE-2024-25600 | 2024-02-27 09:55:55 | CVE-2024-25600:WordPress Bricks Builder远程命令执行漏洞通告 | 详情 |
bc2c3923f651854c68f2dd6f99d69f0a | 2024-02-26 03:00:09 | 安全事件周报 2024-02-19 第8周 | 详情 | |
55c72f6f2af616fbddbb643df06c3b3a | CVE-2024-21413 | 2024-02-23 06:57:46 | CVE-2024-21413:Microsoft Outlook 远程代码执行漏洞通告 | 详情 |
f000a20bfa53fd8b0f5231b52ff34577 | 2024-02-19 10:10:13 | 2024-02 补丁日: 微软多个漏洞安全更新通告 | 详情 | |
48ff3925c0cc22862b0d6e1f52140bdc | 2024-02-06 07:10:07 | 安全事件周报 2024-01-29 第5周 | 详情 | |
d8c34853fbcc6b39ae0a3783c6fa6d44 | CVE-2024-21626 | 2024-02-01 08:38:56 | CVE-2024-21626:runc容器逃逸漏洞通告 | 详情 |
6ff357e8344fde5ea96c964cc0161137 | 2024-01-29 10:02:54 | 安全事件周报 2024-01-22 第4周 | 详情 | |
8fc558ad63c1387fb3ed919bf754820e | CVE-2024-0204 | 2024-01-25 08:26:39 | CVE-2024-0204:GoAnywhere MFT 身份认证绕过漏洞通告 | 详情 |
f4359caac3c70e9141439aa773e1e8a5 | 2024-01-22 11:39:38 | 安全事件周报 2024-01-15 第3周 | 详情 | |
4939f25b3f3d3242726cd400c645be04 | CVE-2024-0519 | 2024-01-17 09:08:07 | CVE-2024-0519:Google Chrome V8越界访问漏洞通告 | 详情 |
300687d61adecf75afb4de6d78398518 | CVE-2024-0519 | 2024-01-17 08:09:14 | CVE-2024-0519:Google Chrome V8类型混淆漏洞通告 | 详情 |
28f74976e64bebdcd2b71df42f44817e | CVE-2023-22527 | 2024-01-16 09:50:35 | CVE-2023-22527:Atlassian Confluence 远程代码执行漏洞通告 | 详情 |
ec39eae21390157f92422897b04aad66 | 2024-01-15 08:28:24 | 安全事件周报 2024-01-08 第2周 | 详情 | |
de12aee5eaff6382190430b22e2c643f | 2024-01-11 10:55:37 | 2024-01 补丁日: 微软多个漏洞安全更新通告 | 详情 | |
c2b35c67c2732343be5c23579ebcdd04 | 2024-01-08 07:37:47 | 安全事件周报 2024-01-01 第1周 | 详情 | |
666a3a36b86650d472f7203220b3a4f5 | 2024-01-02 09:34:01 | 安全事件周报 2023-12-25 第52周 | 详情 | |
f91862c02f62f7f8e9d01e209e59487b | CVE-2023-51467 | 2023-12-27 08:57:10 | CVE-2023-51467:Apache OFBiz 未授权远程代码执行漏洞通告 | 详情 |
0c520d1f3614bc8cba4450fee6f03f5d | 2023-12-25 08:21:40 | 安全事件周报 2023-12-18 第51周 | 详情 | |
ffb5d5f9ba0fa1576f9bd8325a8d3e66 | 2023-12-18 08:50:39 | 安全事件周报 2023-12-11 第50周 | 详情 | |
382c73d6388430b9cea6072c6c61858e | 2023-12-13 08:50:10 | 2023-12 补丁日: 微软多个漏洞安全更新通告 | 详情 |
Tenable (Nessus) [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
cafb56ca569c4ccd15d05aaf86b1137f | CVE-2025-6904 | 2025-06-30 11:15:26 ![]() |
A vulnerability was found in code-projects Car Rental System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add_cars.php. The manipulation of the argument car_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | 详情 |
28aa48cc656236ac5c93b587ddcd6477 | CVE-2025-6903 | 2025-06-30 11:15:25 ![]() |
A vulnerability was found in code-projects Car Rental System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/approve.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | 详情 |
a1af6d89e10e1731de72b7dd98ada825 | CVE-2025-40710 | 2025-06-30 11:15:25 ![]() |
Host Header Injection (HHI) vulnerability in the Hotspot Shield VPN client, which can induce unexpected behaviour when accessing third-party web applications through the VPN tunnel. Although such applications do not present this vulnerability per se, the use of the tunnel, together with a forged Host header, can cause the VPN client to redirect or forward HTTP requests to servers other than those originally intended, leading to consequences such as open redirects or delivery of traffic to infrastructure controlled by an attacker. This does not imply a flaw in the target applications, but in how the VPN client internally handles outgoing headers and requests. | 详情 |
b27ddb2f2d0485c1ee78dd2cbd417152 | CVE-2025-6902 | 2025-06-30 10:15:26 ![]() |
A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /php_action/editUser.php. The manipulation of the argument edituserName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | 详情 |
8b0fba075b4419262e72e85c012fe31d | CVE-2025-6901 | 2025-06-30 10:15:26 ![]() |
A vulnerability was found in code-projects Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /php_action/removeUser.php. The manipulation of the argument userid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | 详情 |
4a0fb2c63b47d5d771d6c327ad6d193e | CVE-2025-53416 | 2025-06-30 10:15:26 ![]() |
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 详情 |
8cc51be3f83d3977187cda3f1eed57fd | CVE-2025-41439 | 2025-06-30 10:15:25 ![]() |
A reflected cross-site scripting vulnerability via a specific parameter exists in SLNX Help Documentation of RICOH Streamline NX. If this vulnerability is exploited, an arbitrary script may be executed in the web browser of the user who accessed the product. | 详情 |
2d94008fa1fb3238989d66660f727fed | CVE-2024-8419 | 2025-06-30 10:15:24 ![]() |
The endpoint hosts a script that allows an unauthorized remote attacker to put the system in a fail-safe state over the network due to missing authentication. | 详情 |
13090263d610b64d0e6ebd48299a90cf | CVE-2025-6900 | 2025-06-30 09:15:27 ![]() |
A vulnerability has been found in code-projects Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-book.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | 详情 |
677da77585ca0c2138c12c2803dddc31 | CVE-2025-6899 | 2025-06-30 09:15:27 ![]() |
A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ and DI-8200G 17.12.20A1/19.12.25A1. This affects an unknown part of the file msp_info.htm. The manipulation of the argument flag/cmd/iface leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | 详情 |
ea206506785cde2c87d0272bc56094df | CVE-2025-6856 | 2025-06-29 09:31:05 ![]() |
A vulnerability, which was classified as problematic, was found in HDF5 1.14.6. Affected is the function H5FL__reg_gc_list of the file src/H5FL.c. The manipulation leads to use after free. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. | 详情 |
f0da58ebba0a4aff430a61f7b59404b2 | CVE-2025-6855 | 2025-06-29 09:15:24 ![]() |
A vulnerability, which was classified as critical, has been found in chatchat-space Langchain-Chatchat up to 0.3.1. This issue affects some unknown processing of the file /v1/file. The manipulation of the argument flag leads to path traversal. The exploit has been disclosed to the public and may be used. | 详情 |
37654711e0e9da511f077aefc4a8eb20 | CVE-2025-6854 | 2025-06-29 09:15:24 ![]() |
A vulnerability classified as problematic was found in chatchat-space Langchain-Chatchat up to 0.3.1. This vulnerability affects unknown code of the file /v1/files?purpose=assistants. The manipulation leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | 详情 |
1e2c3341dc2cacadc099336acbf437b5 | CVE-2025-6853 | 2025-06-29 08:15:21 ![]() |
A vulnerability classified as critical has been found in chatchat-space Langchain-Chatchat up to 0.3.1. This affects the function upload_temp_docs of the file /knowledge_base/upload_temp_docs of the component Backend. The manipulation of the argument flag leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | 详情 |
06cb1329450a5a70854faed93d01adf3 | CVE-2025-6850 | 2025-06-29 07:15:25 ![]() |
A vulnerability has been found in code-projects Simple Forum 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /forum1.php. The manipulation of the argument File leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | 详情 |
edb7689e156864b99824464d35aaa545 | CVE-2025-6849 | 2025-06-29 07:15:24 ![]() |
A vulnerability, which was classified as problematic, was found in code-projects Simple Forum 1.0. Affected is an unknown function of the file /forum_edit1.php. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | 详情 |
a1748e3f69c4ccc9bd54e9b0ea8f8c02 | CVE-2025-6848 | 2025-06-29 06:15:23 ![]() |
A vulnerability, which was classified as critical, has been found in code-projects Simple Forum 1.0. This issue affects some unknown processing of the file /forum1.php. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | 详情 |
ff21ed03ae45af3b97cdcea7a9b2ea89 | CVE-2025-6847 | 2025-06-29 06:15:21 ![]() |
A vulnerability classified as critical was found in code-projects Simple Forum 1.0. This vulnerability affects unknown code of the file /forum_edit.php. The manipulation of the argument iii leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | 详情 |
784d22f66501e7a83433ad2a02e09c42 | CVE-2025-6846 | 2025-06-29 05:15:21 ![]() |
A vulnerability classified as critical has been found in code-projects Simple Forum 1.0. This affects an unknown part of the file /forum_viewfile.php. The manipulation of the argument Name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | 详情 |
6a2e0668d1b0b69a3e5696c1b9d94b34 | CVE-2025-6845 | 2025-06-29 05:15:21 ![]() |
A vulnerability was found in code-projects Simple Forum 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /register1.php. The manipulation of the argument User leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | 详情 |
55c4a45fa724e17c21f85f1e62876ba3 | CVE-2025-6816 | 2025-06-28 08:15:25 | A vulnerability classified as problematic was found in HDF5 1.14.6. This vulnerability affects the function H5O__fsinfo_encode of the file /src/H5Ofsinfo.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. | 详情 |
9c4113529a8a92ec30af69de833e1da8 | CVE-2025-5937 | 2025-06-28 08:15:25 | The MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Wallet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the adminOptions() function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 详情 |
ac5589801fe8c2a56e24a52019045f9f | CVE-2025-38086 | 2025-06-28 08:15:24 | In the Linux kernel, the following vulnerability has been resolved: net: ch9200: fix uninitialised access during mii_nway_restart In mii_nway_restart() the code attempts to call mii->mdio_read which is ch9200_mdio_read(). ch9200_mdio_read() utilises a local buffer called "buff", which is initialised with control_read(). However "buff" is conditionally initialised inside control_read(): if (err == size) { memcpy(data, buf, size); } If the condition of "err == size" is not met, then "buff" remains uninitialised. Once this happens the uninitialised "buff" is accessed and returned during ch9200_mdio_read(): return (buff[0] | buff[1] << 8); The problem stems from the fact that ch9200_mdio_read() ignores the return value of control_read(), leading to uinit-access of "buff". To fix this we should check the return value of control_read() and return early on error. | 详情 |
f92aa7d7b2f16038fcc79b724b86c25e | CVE-2025-38085 | 2025-06-28 08:15:24 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race huge_pmd_unshare() drops a reference on a page table that may have previously been shared across processes, potentially turning it into a normal page table used in another process in which unrelated VMAs can afterwards be installed. If this happens in the middle of a concurrent gup_fast(), gup_fast() could end up walking the page tables of another process. While I don't see any way in which that immediately leads to kernel memory corruption, it is really weird and unexpected. Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(), just like we do in khugepaged when removing page tables for a THP collapse. | 详情 |
54c5c0d983407f769b0f91ad3c288356 | CVE-2025-38084 | 2025-06-28 08:15:23 | In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: unshare page tables during VMA split, not before Currently, __split_vma() triggers hugetlb page table unsharing through vm_ops->may_split(). This happens before the VMA lock and rmap locks are taken - which is too early, it allows racing VMA-locked page faults in our process and racing rmap walks from other processes to cause page tables to be shared again before we actually perform the split. Fix it by explicitly calling into the hugetlb unshare logic from __split_vma() in the same place where THP splitting also happens. At that point, both the VMA and the rmap(s) are write-locked. An annoying detail is that we can now call into the helper hugetlb_unshare_pmds() from two different locking contexts: 1. from hugetlb_split(), holding: - mmap lock (exclusively) - VMA lock - file rmap lock (exclusively) 2. hugetlb_unshare_all_pmds(), which I think is designed to be able to call us with only the mmap lock held (in shared mode), but currently only runs while holding mmap lock (exclusively) and VMA lock Backporting note: This commit fixes a racy protection that was introduced in commit b30c14cd6102 ("hugetlb: unshare some PMDs when splitting VMAs"); that commit claimed to fix an issue introduced in 5.13, but it should actually also go all the way back. [[email protected]: v2] | 详情 |
9b93673a1873b5a12f9cf4393de16a8b | CVE-2025-6755 | 2025-06-28 06:15:23 | The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution. | 详情 |
71290ffbef5793d02ed0109a47e9f84e | CVE-2025-5304 | 2025-06-28 06:15:22 | The PT Project Notebooks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the wpnb_pto_new_users_add() function in versions 1.0.0 through 1.1.3. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator. | 详情 |
420d2e0f274e7c3888c15152bbf9aab5 | CVE-2025-6252 | 2025-06-28 05:15:24 | The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in all versions up to, and including, 1.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 详情 |
dd4e30b6cbbca8110155d70cc75dd8d5 | CVE-2025-6381 | 2025-06-28 04:15:46 | The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover. | 详情 |
09be8bb6a36131ef58e0e92d1cee7efc | CVE-2025-6379 | 2025-06-28 04:15:45 | The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover. | 详情 |
国家信息安全漏洞共享平台(CNVD) [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
8686fda9b2b49e4e1666b54e2248f935 | CNVD-2021-74882 | 2021-11-14 16:43:52 | 四创科技有限公司建站系统存在SQL注入漏洞 | 详情 |
8f6972d84ad188b05ff9cc14d4334949 | CNVD-2021-87021 (CVE-2020-4690) | 2021-11-12 12:43:14 | IBM Security Guardium硬编码凭证漏洞 | 详情 |
3bfe7b053a0c59d8a3d38c18f86aa143 | CNVD-2021-87022 (CVE-2021-38870) | 2021-11-12 12:43:12 | IBM Aspera跨站脚本漏洞 | 详情 |
a4649bb17f4db4d1c7f879ebceb46ed0 | CNVD-2021-87011 (CVE-2021-29753) | 2021-11-12 12:43:11 | IBM Business Automation Workflow存在未明漏洞 | 详情 |
094c613f9ed4b8b9d887dc912789043c | CNVD-2021-87025 (CVE-2021-20563) | 2021-11-12 12:43:10 | IBM Sterling File Gateway信息泄露漏洞 | 详情 |
41c47f01a4c65dcb6efc9ebf483fe762 | CNVD-2021-87010 (CVE-2021-38887) | 2021-11-12 12:43:08 | IBM InfoSphere Information Server信息泄露漏洞 | 详情 |
f51d33e7a09fd61ca90ede453515a830 | CNVD-2021-87016 (CVE-2021-29764) | 2021-11-12 12:43:07 | IBM Sterling B2B Integrator跨站脚本漏洞 | 详情 |
33615a5f78df822e82e6d3436045c48c | CNVD-2021-87026 (CVE-2021-38877) | 2021-11-12 12:43:06 | IBM Jazz for Service Management跨站脚本漏洞 | 详情 |
8e729177bcb4105dd831fb1e123ed1bb | CNVD-2021-87014 (CVE-2021-29679) | 2021-11-12 12:43:04 | IBM Cognos Analytics远程代码执行漏洞 | 详情 |
1a3b856f78e9fbdca12aeddc7d665aca | CNVD-2021-87029 (CVE-2021-29752) | 2021-11-12 12:43:03 | IBM Db2信息泄露漏洞 | 详情 |
6f1aa3a0cb819d97519baa47fd0232d5 | CNVD-2021-87015 (CVE-2021-29745) | 2021-11-12 12:43:02 | IBM Cognos Analytics权限提升漏洞 | 详情 |
cbcb12f5f51d6e7d6d8a9fa581aa863a | CNVD-2021-73908 | 2021-11-11 16:42:44 | 泛微e-cology存在SQL注入漏洞 | 详情 |
ae6fd467da55de31aa7219187cf5c2d4 | CNVD-2021-86904 (CVE-2021-20351) | 2021-11-11 08:31:46 | IBM Engineering跨站脚本漏洞 | 详情 |
412a15b40959ed9cf9330ee79f99e079 | CNVD-2021-86903 (CVE-2021-31173) | 2021-11-11 08:31:44 | Microsoft SharePoint Server信息泄露漏洞 | 详情 |
1cbc5d5faac431d3e82c9e5ea9588b5f | CNVD-2021-86902 (CVE-2021-31172) | 2021-11-11 08:31:43 | Microsoft SharePoint欺骗漏洞 | 详情 |
686c7cfb20933b41c3d679cbba79a2ad | CNVD-2021-86901 (CVE-2021-31181) | 2021-11-11 08:31:42 | Microsoft SharePoint远程代码执行漏洞 | 详情 |
72fdfb2d44c0d41d638e4632bdfc10b8 | CNVD-2021-86900 (CVE-2021-3561) | 2021-11-11 08:31:41 | fig2dev缓冲区溢出漏洞 | 详情 |
3ba6f0e9394f9414e2cadb9495e2d5f5 | CNVD-2021-85884 (CVE-2021-41210) | 2021-11-10 07:24:57 | Google TensorFlow堆分配数组越界读取漏洞 | 详情 |
4d8c4744ea972fb2fcb9673fea1fc7b7 | CNVD-2021-85883 (CVE-2021-41226) | 2021-11-10 07:24:56 | Google TensorFlow堆越界访问漏洞 | 详情 |
8778f9cd924cae585ca5e2e0b8be3b3f | CNVD-2021-85882 (CVE-2021-41224) | 2021-11-10 07:24:54 | Google TensorFlow堆越界访问漏洞 | 详情 |
e1b2722e6d5c509c680b584416d9cb20 | CNVD-2021-85881 (CVE-2021-42770) | 2021-11-10 07:24:53 | OPNsense跨站脚本漏洞 | 详情 |
ed09c9fa5586e2d4d9b4e95fe3b447a0 | CNVD-2021-85880 (CVE-2021-28024) | 2021-11-10 07:24:52 | ServiceTonic访问控制不当漏洞 | 详情 |
8a642f0922f7f915e81b2b947276a96c | CNVD-2021-85879 (CVE-2021-28023) | 2021-11-10 07:24:50 | ServiceTonic任意文件上传漏洞 | 详情 |
c00b061c2cfdee4016a869a188135db5 | CNVD-2021-85878 (CVE-2021-28022) | 2021-11-10 07:24:49 | ServiceTonic SQL注入漏洞 | 详情 |
9c4b20a28ad2bd4ab916448f0e1272bd | CNVD-2021-85877 (CVE-2021-32483) | 2021-11-10 07:24:48 | Cloudera Manager不正确访问控制漏洞 | 详情 |
4d4423857b7b1f38e49738f00e8949ba | CNVD-2021-85876 (CVE-2021-32481) | 2021-11-10 07:24:46 | Cloudera Hue跨站脚本漏洞 | 详情 |
6b12b7fc216d603e8e07351603851c86 | CNVD-2021-85875 (CVE-2021-29994) | 2021-11-10 07:24:45 | Cloudera Hue跨站脚本漏洞 | 详情 |
72894fb3a3538de240d2f6810aae63c9 | CNVD-2021-85892 (CVE-2021-42701) | 2021-11-10 02:38:27 | DAQFactory中间人攻击漏洞 | 详情 |
94a1f99a64ba24540cc1594d0a0b3152 | CNVD-2021-85893 (CVE-2021-42699) | 2021-11-10 02:38:26 | DAQFactory明文传输漏洞 | 详情 |
5d9bac33be8f2f88391f6de02fb89c73 | CNVD-2021-85894 (CVE-2021-42698) | 2021-11-10 02:38:24 | DAQFactory反序列化漏洞 | 详情 |
国家信息安全漏洞库(CNNVD) [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
b5815af17792cf5abac5732bae3094e9 | CNNVD-202308-131 (CVE-2023-20215) | 2023-08-03 12:41:47 | Cisco Secure Web Appliance 安全漏洞 | 详情 |
8d98bb094a70919c9e881cc7da5898d4 | CNNVD-202308-132 (CVE-2023-20204) | 2023-08-03 12:40:44 | Cisco BroadWorks CommPilot 安全漏洞 | 详情 |
c65e18d821cb73d6036dc2df6a726951 | CNNVD-202308-123 (CVE-2023-29409) | 2023-08-02 12:45:03 | Google Golang 资源管理错误漏洞 | 详情 |
452c53b54ef3a658eaf6bd8e7d93fe05 | CNNVD-202308-124 (CVE-2023-4070) | 2023-08-02 12:44:01 | Google Chrome 安全漏洞 | 详情 |
ac7b17414d163c2f26008516638e3a99 | CNNVD-202308-125 (CVE-2023-39113) | 2023-08-02 12:42:59 | ngiflib 安全漏洞 | 详情 |
224fd467b813dbee234efe1e61e2ec66 | CNNVD-202308-126 (CVE-2023-39114) | 2023-08-02 12:42:57 | ngiflib 安全漏洞 | 详情 |
72d862f454eb3d0e4dd221413d85f6b2 | CNNVD-202308-127 (CVE-2023-1437) | 2023-08-02 12:42:55 | Advantech WebAccess/SCADA 安全漏洞 | 详情 |
a3b636c53a2116b7ab85ea0c29470e76 | CNNVD-202308-128 (CVE-2023-3329) | 2023-08-02 12:42:53 | SpiderControl SCADA Webserver 路径遍历漏洞 | 详情 |
0e8e3c3600e145e70920c2026bde8feb | CNNVD-202308-129 (CVE-2023-4069) | 2023-08-02 12:42:51 | Google Chrome 安全漏洞 | 详情 |
619ce483843859fb783525b2b8d00f59 | CNNVD-202308-130 (CVE-2023-4068) | 2023-08-02 12:41:48 | Google Chrome 安全漏洞 | 详情 |
6a73381eaa628503bd8c242cd313f005 | CNNVD-202308-057 (CVE-2023-36121) | 2023-08-01 12:48:12 | e107 跨站脚本漏洞 | 详情 |
086c171bc44677f87e0ad45c8ab5dab6 | CNNVD-202308-058 (CVE-2023-2164) | 2023-08-01 12:47:10 | GitLab 跨站脚本漏洞 | 详情 |
bc6915cfb72ce7e27f2aa64ff3a35ee2 | CNNVD-202308-059 (CVE-2023-31432) | 2023-08-01 12:47:08 | Brocade Fabric OS 安全漏洞 | 详情 |
915090fa2939ee9d9978125be4eeff27 | CNNVD-202308-060 (CVE-2023-3739) | 2023-08-01 12:46:07 | Google Chrome 安全漏洞 | 详情 |
b790441bc923d37c914ea50edcdfaa16 | CNNVD-202308-061 (CVE-2023-3385) | 2023-08-01 12:46:05 | GitLab 路径遍历漏洞 | 详情 |
a6be4479387eddda68e1c7808965c1bc | CNNVD-202308-062 (CVE-2022-40609) | 2023-08-01 12:46:03 | IBM SDK, Java Technology Edition 安全漏洞 | 详情 |
55409ee74ffe87168f7d61814b568334 | CNNVD-202308-063 (CVE-2023-31431) | 2023-08-01 12:46:02 | Brocade Fabric OS 安全漏洞 | 详情 |
a4340da9d26800c671fa800a080c3d01 | CNNVD-202308-064 (CVE-2023-36210) | 2023-08-01 12:45:00 | MotoCMS 安全漏洞 | 详情 |
d70ae2187ae1aa50a2af6befce15bfbd | CNNVD-202308-065 (CVE-2023-31428) | 2023-08-01 12:43:58 | Brocade Fabric OS 代码问题漏洞 | 详情 |
8b0e98f117732e813318bdec77d0fb4b | CNNVD-202308-066 (CVE-2023-31928) | 2023-08-01 12:42:57 | Brocade Fabric OS 跨站脚本漏洞 | 详情 |
73ffd9540daad0a04d3d54041ba9df14 | CNNVD-202307-2321 (CVE-2023-37772) | 2023-07-31 12:44:10 | Online Shopping Portal 安全漏洞 | 详情 |
10f462bbd81ee431ab32c6a160fc068d | CNNVD-202307-2322 (CVE-2023-3983) | 2023-07-31 12:44:08 | Advantech iView 安全漏洞 | 详情 |
91dcd4420b85064dbae045bceabb71b9 | CNNVD-202307-2323 (CVE-2023-37496) | 2023-07-31 12:44:07 | HCL Technologies HCL Verse 安全漏洞 | 详情 |
c81e50233ec479272b638b8dbddedeea | CNNVD-202307-2324 (CVE-2023-38989) | 2023-07-31 12:44:05 | jeesite 安全漏洞 | 详情 |
775849c6f8c5fe41588806137e12cfa8 | CNNVD-202307-2326 (CVE-2023-3462) | 2023-07-31 12:44:03 | HashiCorp Vault 安全漏洞 | 详情 |
f995ebc4f6961ed50c6d18ec0f7efcf4 | CNNVD-202307-2327 (CVE-2022-42183) | 2023-07-31 12:44:01 | Precisely Spectrum Spatial Analyst 安全漏洞 | 详情 |
67539644d8b06577c03aeab1ac018450 | CNNVD-202307-2328 (CVE-2022-42182) | 2023-07-31 12:43:59 | Precisely Spectrum Spatial Analyst 安全漏洞 | 详情 |
b61f0e730dfb90bb1c6f8f6e83508ae7 | CNNVD-202307-2329 (CVE-2023-39122) | 2023-07-31 12:43:56 | BMC Control-M 安全漏洞 | 详情 |
a09d1da1d10d2b5f823d7b8b41490660 | CNNVD-202307-2330 (CVE-2023-3825) | 2023-07-31 12:42:54 | PTC Kepware KEPServerEX 资源管理错误漏洞 | 详情 |
05caf2e95b7a0f72e0c071c443e1d82b | CNNVD-202307-2331 (CVE-2023-4033) | 2023-07-31 12:42:52 | Mlflow 操作系统命令注入漏洞 | 详情 |
奇安信 [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
45ab4afdafe578698bcfccccd65d833e | yt | QiAnXinTI-SV-2020-0009 Microsoft Windows Type 1字体处理远程代码执行漏洞(ADV200006)通告 | 详情 | |
74691465618764c64d52a2ff58013ac4 | yt | QiAnXinTI-SV-2019-0013 Firefox远程代码执行漏洞(CVE-2019-11707)预警通告 | 详情 | |
6bd01daffa85191c80698354fc8e252f | wt | QianxinTI-SV-2019-0015 Microsoft Windows RDP远程桌面服务多个远程代码执行漏洞通告 | 详情 | |
59085bf4ae9a7a3802468d9764c94968 | wt | QiAnXinTI-SV-2019-0022 微软IE浏览器JScript脚本引擎远程代码执行漏洞通告 | 详情 | |
7010355bb6ffff38cb1a885acf784ca7 | ft | QiAnXinTI-SV-2020-0008 Microsoft Windows SMBv3.0服务远程代码执行漏洞(CVE-2020-0796)通告 | 详情 | |
5edb21a58a7e21692bd0ddd622d39279 | St | QiAnXinTI-SV-2020-0013 Microsoft DNS Server远程代码执行漏洞(CVE-2020-1350)通告 | 详情 | |
3e8973410ef7c04408d63fa10c230487 | St | QiAnXinTI-SV-2020-0002 Microsoft IE jscript远程命令执行0day漏洞(CVE-2020-0674)通告 | 详情 | |
e8bc02a0c3bfbafd4c84d9ec26e9bede | St | QianxinTI-SV-2020-0001 微软核心加密库漏洞(CVE-2020-0601)通告 | 详情 | |
f749eac58b87d0954f0e4a84b5d67057 | CVE-2020-1350 | 2020-07-15 15:57:00 | QiAnXinTI-SV-2020-0013 Microsoft DNS Server远程代码执行漏洞(CVE-2020-1350)通告 | 详情 |
90b93cb7073fe73b17746ac166a09637 | CVE-2020-6819, CVE-2020-6820 | 2020-04-08 10:34:35 | QianxinTI-SV-2020-0012 Firefox在野远程代码执行漏洞(CVE-2020-6819、CVE-2020-6820)通告 | 详情 |
e318a5efa4803b50cdef480b90b1784d | 2020-03-25 13:58:51 | QiAnXinTI-SV-2020-0009 Microsoft Windows Type 1字体处理远程代码执行漏洞(ADV200006)通告 | 详情 | |
cffc3035f7899495cfeae521451f91b2 | CVE-2020-0796 | 2020-03-12 10:32:09 | QiAnXinTI-SV-2020-0008 Microsoft Windows SMBv3.0服务远程代码执行漏洞(CVE-2020-0796)通告 | 详情 |
3e6175d47d17c6f94bd9ba10d81c3717 | CVE-2020-0674 | 2020-03-02 14:52:46 | QiAnXinTI-SV-2020-0002 Microsoft IE jscript远程命令执行0day漏洞(CVE-2020-0674)通告 | 详情 |
d99d073afb7d248a8a62fb068921997f | CVE-2020-0601 | 2020-01-15 14:11:41 | QianxinTI-SV-2020-0001 微软核心加密库漏洞(CVE-2020-0601)通告 | 详情 |
b7b45b14a3af1225ef6eec72d74964df | CVE-2019-1367 | 2019-09-25 17:23:00 | QiAnXinTI-SV-2019-0022 微软IE浏览器JScript脚本引擎远程代码执行漏洞通告 | 详情 |
504fc79f0123db109a11b149c334b75c | CVE-2019-0708 | 2019-09-09 10:20:47 | QiAnXinTI-SV-2019-0006 微软远程桌面服务远程代码执行漏洞(CVE-2019-0708)预警通告 | 详情 |
5b727692d583d4a6e7cdb0f670eac12a | CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, CVE-2019-1226 | 2019-08-14 11:09:05 | QianxinTI-SV-2019-0015 Microsoft Windows RDP远程桌面服务多个远程代码执行漏洞通告 | 详情 |
54b48d765fccbc8dcfa3de0920459f8d | CVE-2019-11707 | 2019-06-19 16:53:47 | QiAnXinTI-SV-2019-0013 Firefox远程代码执行漏洞(CVE-2019-11707)预警通告 | 详情 |
5b4d5fea09fbc2dca45be53f162d39de | CVE-2019-0708 | 2019-05-31 17:03:19 | QiAnXinTI-SV-2019-0006 微软远程桌面服务远程代码执行漏洞(CVE-2019-0708)预警通告 | 详情 |
安全客 [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
03afa8b4eaf4a0160784152fca5465b2 | CVE-2021-27308 | 2021-07-11 14:22:05 | 4images 跨站脚本漏洞 | 详情 |
8b0ace4c54a7fc20a99d21e294152a99 | CVE-2020-15261 | 2021-07-11 14:22:05 | Veyon Service 安全漏洞 | 详情 |
d4f12de949590ab346b61986a29d8b4d | CVE-2021-35039 | 2021-07-09 17:30:13 | Linux kernel 安全漏洞 | 详情 |
f790e7ef3b5de3774d42ee32b9b10c01 | CVE-2021-34626 | 2021-07-09 17:30:13 | WordPress 访问控制错误漏洞 | 详情 |
71bf261eb2113d5ff870ab9bafd29f55 | CVE-2021-25952 | 2021-07-09 17:30:13 | just-safe-set 安全漏洞 | 详情 |
152793cbc104933584f5f227606f433d | CVE-2021-0597 | 2021-07-09 17:30:13 | Google Android 信息泄露漏洞 | 详情 |
75f153c327984fdfdd2d9c463a91371d | CVE-2021-34430 | 2021-07-09 17:30:13 | Eclipse TinyDTLS 安全特征问题漏洞 | 详情 |
9610336f1a41241cc8edea22a2780ec5 | CVE-2021-3638 | 2021-07-09 17:30:13 | QEMU 安全漏洞 | 详情 |
92fe450ae5c5dfa48072aca79d64ba63 | CVE-2021-34614 | 2021-07-09 14:24:32 | Aruba ClearPass Policy Manager 安全漏洞 | 详情 |
680a4218fc32922746717210664a3d62 | CVE-2021-22144 | 2021-07-09 13:28:16 | Elasticsearch 安全漏洞 | 详情 |
373930f669f2c1f7b61101a925304779 | CVE-2021-24022 | 2021-07-09 13:28:16 | Fortinet FortiManager 安全漏洞 | 详情 |
8556f9cd0699f88c1f6cca9a43463bdd | CVE-2021-33012 | 2021-07-09 13:28:16 | Allen Bradley Micrologix 1100输入验证错误漏洞 | 详情 |
480ae713cc88cc0985e1ebc079974d83 | CVE-2021-0592 | 2021-07-09 13:28:16 | Google Android 安全漏洞 | 详情 |
8ef4dbefa6604ea2312621401c3ec0b9 | CVE-2021-1598 | 2021-07-09 13:28:16 | Cisco Video Surveillance 7000 Series IP Cameras 安全漏洞 | 详情 |
d6e8714c32df7a0dcc2f3910ec68b42d | CVE-2021-20782 | 2021-07-09 13:28:16 | Software License Manager 跨站请求伪造漏洞 | 详情 |
4e60b22611b8bb0fd7e532896498af29 | CVE-2021-20781 | 2021-07-09 13:28:16 | WordPress 跨站请求伪造漏洞 | 详情 |
5ca48ad58fb499c069ae0800c3b39875 | CVE-2021-32961 | 2021-07-09 13:28:16 | MDT AutoSave代码问题漏洞 | 详情 |
2ed854890b43f08e52340a1e8fe6d39f | CVE-2021-0577 | 2021-07-09 13:28:16 | Google Android 安全漏洞 | 详情 |
8d63110e1475bbd245715b2ee1824d13 | CVE-2021-31816 | 2021-07-09 13:28:16 | Octopus Server 安全漏洞 | 详情 |
72bef2ae2f5db7dd066e1cdefa618dc5 | CVE-2021-31817 | 2021-07-09 13:28:16 | Octopus Server 安全漏洞 | 详情 |
1f7369b2609dbd2cd40d091f7de540cd | CVE-2020-20217 | 2021-07-09 13:28:16 | Mikrotik RouterOs 安全漏洞 | 详情 |
1793176eecc5813c3348f026dc9909c9 | CVE-2020-28598 | 2021-07-09 13:28:16 | PrusaSlicer 安全漏洞 | 详情 |
7f4cf34ceb545548dcfcc3c0e7120268 | CVE-2021-32945 | 2021-07-09 13:28:16 | MDT AutoSave加密问题漏洞 | 详情 |
58553eb00d6e3e83b633f09464c4e98a | CVE-2021-29712 | 2021-07-09 13:28:16 | IBM InfoSphere Information Server 跨站脚本漏洞 | 详情 |
d8e27ec42fb0b89998fcc006f49b249b | CVE-2021-25432 | 2021-07-09 13:28:16 | Samsung Members 信息泄露漏洞 | 详情 |
8f2adc6c247725bf2eb7f53256c93ea7 | CVE-2021-25433 | 2021-07-09 13:28:16 | Samsung Tizen安全漏洞 | 详情 |
8f949676124339eb6f64f9c607af5470 | CVE-2021-25431 | 2021-07-09 13:28:16 | Samsung Mobile Device Cameralyzer 访问控制错误漏洞 | 详情 |
069818a8958f9c158fcb0956ee32fc03 | CVE-2021-25434 | 2021-07-09 13:28:16 | Samsung Tizen 代码注入漏洞 | 详情 |
55b9126220b9722ff5d730d3996877e9 | CVE-2021-32949 | 2021-07-09 13:28:16 | MDT AutoSave 路径遍历漏洞 | 详情 |
ebab009fffdee3d360dcdff74b0ed061 | CVE-2021-25435 | 2021-07-09 13:28:16 | Samsung Tizen代码注入漏洞 | 详情 |
斗象 [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
096b6298d82574500dc1a14c9dba4065 | CVE-2022-22038, CVE-2022-22047, CVE-2022-30216, CVE-2022-22029 | 2022-07-15 00:38:28 | 微软2022年7月补丁日漏洞通告 | 详情 |
6018f718b2d751478bf1ce069ac65f0d | CVE-2022-2185 | 2022-07-01 09:02:05 | GitLab 远程代码执行漏洞(CVE-2022-2185) | 详情 |
844719cf0bb4843aff73d2f33cc6dd0b | CVE-2022-30190, CVE-2022-30136 | 2022-06-15 05:48:12 | 微软2022年6月补丁日漏洞通告 | 详情 |
8b47000e1abfbacdadb7df6f09152d89 | CVE-2022-26134 | 2022-06-03 05:48:38 | Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134) | 详情 |
eebe93468b36d2ca24cf4b82136a5635 | CVE-2022-30190 | 2022-05-31 13:57:17 | Microsoft Windows MSDT 远程代码执行漏洞(CVE-2022-30190) | 详情 |
95525e3f5907a776dc7cd4f87f2e2154 | 2022-05-23 07:11:04 | Fastjson 反序列化漏洞 | 详情 | |
945fd6e612634d9721f861833f1ecb75 | CVE-2022-26925, CVE-2022-26937, CVE-2022-22017, CVE-2022-26923 | 2022-05-11 03:45:48 | 微软2022年5月补丁日漏洞通告 | 详情 |
e2938ff82d0cc152508e0240697def4c | CVE-2022-1388 | 2022-05-06 05:53:04 | F5 BIG-IP iControl REST 身份验证绕过漏洞(CVE-2022-1388) | 详情 |
bcf7253d2ee580c618737de137d370c4 | CVE-2022-29464 | 2022-04-22 02:21:17 | WSO2 Carbon Server 远程代码执行漏洞(CVE-2022-29464) | 详情 |
07c09799b08afb04c63a9de750b70aca | CVE-2022-26809, CVE-2022-24491, CVE-2022-24497, CVE-2022-26815, CVE-2022-26904 | 2022-04-13 07:51:00 | 微软2022年4月补丁日漏洞通告 | 详情 |
f5b543501ed5679d423411edac502e24 | CVE-2022-22954, CVE-2022-22955, CVE-2022-22956, CVE-2022-22957, CVE-2022-22958, CVE-2022-22959, CVE-2022-22960, CVE-2022-22961 | 2022-04-08 03:49:31 | VMware 产品多个高危漏洞通告 | 详情 |
f421bcdb306e2bc1ffbf58fcb024a0dd | 2022-03-29 17:11:30 | Spring 框架远程代码执行漏洞 | 详情 | |
0473358d95e58c7c3f2e7db0109f56f4 | 2022-03-29 17:11:30 | Spring Framework 远程代码执行漏洞(CVE-2022-22965) | 详情 | |
a888c948ca1172f8a06a3879479f1de4 | CVE-2022-22965 | 2022-03-29 17:11:30 | Spring Framework 远程代码执行漏洞(CVE-2022-22965) | 详情 |
71ed541bb737196268b75c7ba435e1a9 | 2022-03-28 04:57:30 | Spring Cloud Function SpEL表达式注入漏洞 | 详情 | |
f7a5dcd376be777c6593a29b8ebd411a | CVE-2022-0778 | 2022-03-18 07:09:22 | OpenSSL拒绝服务漏洞(CVE-2022-0778) | 详情 |
6c4124fed44906a79843cd2dd383c695 | CVE-2022-0847 | 2022-03-15 03:32:03 | Linux Kernel本地提权漏洞(CVE-2022-0847) | 详情 |
a2795e4829bff16f108cf191eba663c3 | CVE-2022-21990, CVE-2022-24508, CVE-2022-23277 | 2022-03-11 02:14:56 | 微软2022年3月补丁日漏洞通告 | 详情 |
d09f0641bf65c64a16d802cd78e14097 | CVE-2022-0847 | 2022-03-08 08:23:08 | Linux 内核本地提权漏洞(CVE-2022-0847) | 详情 |
69052e2a8c09416f5df674f92cba25a6 | CVE-2022-22947 | 2022-03-02 11:42:55 | Spring Cloud Gateway 远程代码执行漏洞(CVE-2022-22947) | 详情 |
5f42b6f584a9ace426787dc8dfd6e6e5 | 2022-02-16 10:44:18 | 向日葵远程命令执行漏洞(CNVD-2022-10270) | 详情 | |
79556071f6236ab4674f75b3beee4d79 | CVE-2022-24112 | 2022-02-11 06:13:35 | Apache APISIX 远程代码执行漏洞 (CVE-2022-24112) | 详情 |
485f2c57713f4a39830e8c2d01e43cfe | CVE-2021-4034 | 2022-01-26 06:19:16 | Linux Polkit 权限提升漏洞(CVE-2021-4034) | 详情 |
0aa6eab412c0318b74c6a470ee774df1 | CVE-2022-21907, CVE-2022-21969, CVE-2022-21846, CVE-2022-21855, CVE-2022-21874, CVE-2022-21893, CVE-2022-21850, CVE-2022-21851, CVE-2022-21836, CVE-2022-21919 | 2022-01-12 03:44:50 | 微软2022年1月补丁日漏洞通告 | 详情 |
88a8c676b52a739c0335d7c21ca810a9 | 2022-01-06 08:19:17 | MeterSphere 远程代码执行漏洞 | 详情 | |
76cad61d2d5a8750a6a714ab2c6dbc97 | CVE-2021-45232 | 2021-12-28 10:31:16 | Apache APISIX Dashboard 接口未授权访问漏洞(CVE-2021-45232) | 详情 |
af4f5f63390eb00de8705b5029d8c376 | CVE-2021-44228, CVE-2021-45046 | 2021-12-14 01:56:52 | Apache Log4j 远程代码执行漏洞 | 详情 |
43456ae172e45c12087c40c03d925e0e | CVE-2021-44228 | 2021-12-11 03:21:34 | Apache Log4j 远程代码执行漏洞 | 详情 |
392b133d98d6f61aee36ce6c8784f4df | 2021-12-09 15:20:54 | Apache Log4j 远程代码执行漏洞 | 详情 | |
1e193280a8f45427c06cb4945be4f126 | 2021-12-07 06:48:55 | Grafana 任意文件读取漏洞 | 详情 |
红后 [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
6fa0a347889bf0da0cae47ef068a6a99 | CVE-2023-32836 | 2023-11-16 21:05:37 | GOOGLE ANDROID Vulnerability | 详情 |
49751f9f84ed69956c96cc87959ec666 | CVE-2021-22499 | 2023-11-16 21:05:34 | Micro Focus Application Performance Management 跨站脚本漏洞 | 详情 |
eaa040f80d817832a627456843d3e24c | CVE-2021-23883 | 2023-11-16 21:05:33 | 迈克菲 McAfee Endpoint Security 代码问题漏洞 | 详情 |
d52ddce51389f668d6fad6e7044bd974 | CVE-2021-23878 | 2023-11-16 21:05:33 | 迈克菲 McAfee Endpoint Security 加密问题漏洞 | 详情 |
b62432054e9970a34c4d9e4d9efd1075 | CVE-2023-32838 | 2023-11-16 21:05:33 | GOOGLE ANDROID Vulnerability | 详情 |
162855c32b8e1a1dafd6ef3e7a3b3da8 | CVE-2022-43554 | 2023-11-16 21:05:33 | IVANTI AVALANCHE Vulnerability | 详情 |
dff8e982c8571446fc1d46fdb5263781 | CVE-2021-21019 | 2023-11-16 21:05:33 | Adobe Magento 注入漏洞 | 详情 |
5c28bf13629d4240819bb4f492d588a9 | CVE-2022-34396 | 2023-11-15 21:56:12 | DELL OPENMANAGE_SERVER_ADMINISTRATOR Vulnerability | 详情 |
8876fd1be50182e42f17aaf033bfaf25 | CVE-2022-45098 | 2023-11-15 21:56:10 | DELL EMC_POWERSCALE_ONEFS Vulnerability | 详情 |
d8a4cb7ca4e0f29533302f9f97f22a55 | CVE-2022-45102 | 2023-11-15 21:55:56 | DELL Multiple product Vulnerability | 详情 |
72e081fb5149198ecc92f3f06383f0d5 | CVE-2023-0512 | 2023-11-15 21:55:53 | VIM VIM Vulnerability | 详情 |
741e4f08caf4baef7072136884f07ae6 | CVE-2023-24829 | 2023-11-15 21:55:48 | APACHE IOTDB Vulnerability | 详情 |
06eca26d44409544e5ec96702bf85ce0 | CVE-2023-23628 | 2023-11-15 21:54:44 | METABASE METABASE Vulnerability | 详情 |
830da4b9e4f027d37c9e39125a30cc18 | CVE-2022-3488 | 2023-11-15 21:54:27 | ISC BIND Vulnerability | 详情 |
93ceb6d645101eee2b05535717260299 | CVE-2022-45808 | 2023-11-15 21:54:21 | THIMPRESS LEARNPRESS Vulnerability | 详情 |
d79756a4e0c6522a5ba958c82d0b4c88 | CVE-2023-22482 | 2023-11-15 21:54:17 | LINUXFOUNDATION ARGO-CD Vulnerability | 详情 |
1c317622086c85695ff9266e3c5cf66f | CVE-2022-4323 | 2023-11-15 21:54:16 | SUMO GOOGLE_ANALYTICATOR Vulnerability | 详情 |
6e8e12e7cd90fd6550e5cef8c12a4a50 | CVE-2023-24069 | 2023-11-15 21:54:13 | SIGNAL SIGNAL-DESKTOP Vulnerability | 详情 |
de78bbaf8c5f6d744b657b8b7733d20e | CVE-2023-24044 | 2023-11-15 21:54:12 | PLESK OBSIDIAN Vulnerability | 详情 |
44e1e95916d186bbbc5cabca01532712 | CVE-2022-41733 | 2023-11-15 21:54:05 | IBM INFOSPHERE_INFORMATION_SERVER Vulnerability | 详情 |
136d79ca309f157fcf93764b6993609c | CVE-2022-20752 | 2023-11-15 20:59:35 | Cisco Unified Communications Manager 和 Cisco Unity Connection安全漏洞 | 详情 |
cfa598cc25996bf7c25d8622f86868f3 | CVE-2022-32208 | 2023-11-15 20:59:35 | curl 缓冲区错误漏洞 | 详情 |
5dc2248c28a031fb6cb3e94f714da748 | CVE-2021-31677 | 2023-11-15 20:59:35 | PESCMS 跨站请求伪造漏洞 | 详情 |
2df25199d06527c66c1929ede927aa18 | CVE-2022-20800 | 2023-11-15 20:59:35 | Cisco Unified Communications Manager 跨站脚本漏洞 | 详情 |
537152d5106a70b12b4e0204db3ba5b3 | CVE-2022-2304 | 2023-11-15 20:59:34 | Vim 安全漏洞 | 详情 |
dee30b1a759cdba8cda08222c3b6cf63 | CVE-2022-2309 | 2023-11-15 20:59:34 | lxml 和 libxml2 代码问题漏洞 | 详情 |
edc189cc3f6caea2e67f158e0f93dd19 | CVE-2022-31116 | 2023-11-15 20:59:34 | UltraJSON 其他漏洞 | 详情 |
3e53baf169ff30745b9dfa6f9505233b | CVE-2022-20791 | 2023-11-15 20:59:26 | Cisco Unified Communications Manager 路径遍历漏洞 | 详情 |
6ae237378a32e08e6f0495fa3dbce32b | CVE-2022-20812 | 2023-11-15 20:59:26 | Cisco Expressway Series 和 Cisco TelePresence Video Communication Server 路径遍历漏洞 | 详情 |
a2523ef82d3016d54faf64dd9af12f3f | CVE-2022-31129 | 2023-11-15 20:59:26 | Moment.js 资源管理错误漏洞 | 详情 |
绿盟 [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
07ff13766e6eda544e413ceb300607e9 | CVE-2024-12312 | 2025-02-28 13:27:57 | WordPress Print Science Designer plugin不受信任数据反序列化漏洞 | 详情 |
96e0b0c91b06d953b4a5ecfec71bc612 | CVE-2024-12329 | 2025-02-28 13:27:57 | WordPress Essential Real Estate plugin敏感信息泄露漏洞 | 详情 |
205143180fd646aa434da08572dc37a5 | CVE-2024-12564 | 2025-02-28 13:27:57 | Open Design Alliance CDE inWEB SDK敏感信息泄露漏洞 | 详情 |
78c4aba7419004dcc8345585d527ae37 | CVE-2024-12333 | 2025-02-28 13:27:57 | WordPress Woodmart theme代码注入漏洞 | 详情 |
2d3fe5437226d262f5c3df68dba66d7c | CVE-2024-11760 | 2025-02-28 13:27:57 | WordPress Currency Converter Widget PRO plugin跨站脚本漏洞 | 详情 |
319c981098d0f2d7bc91e06390e4800c | CVE-2024-12160 | 2025-02-28 13:27:57 | WordPress Seraphinite Bulk Discounts for WooCommerce跨站脚本漏洞 | 详情 |
9c491939e6e0bd7c2901366e18b6d07c | CVE-2024-10043 | 2025-02-28 13:27:57 | GitLab EE授权错误漏洞 | 详情 |
b01d6119078e51c36fd74abe01052e61 | CVE-2024-12201 | 2025-02-28 13:27:57 | WordPress Hash Form plugin授权缺失漏洞 | 详情 |
1589394801933a9f20626d1ddb8fceee | CVE-2024-12397 | 2025-02-28 13:27:57 | Quarkus HTTP请求夹带漏洞 | 详情 |
d03ae50732ec3864b9ee63b6ca0d6819 | CVE-2024-11727 | 2025-02-28 13:27:57 | WordPress NotificationX plugin跨站脚本漏洞 | 详情 |
2a7dc7fdb9b96a3347032f71650e65e0 | CVE-2024-12401 | 2025-02-28 13:27:57 | cert-manager输入验证错误漏洞 | 详情 |
96ac6565cb6d60af90a82f5ca6441700 | CVE-2024-11724 | 2025-02-28 13:27:57 | WordPress Cookie Consent for WP plugin授权缺失漏洞 | 详情 |
ef7b44b2166f0d595eba2dc2089677ea | CVE-2024-21574 | 2025-02-28 13:27:57 | ComfyUI-Manager代码注入漏洞 | 详情 |
a3bd04b9029a521aaf5f3ffe4484cd2d | CVE-2024-11181 | 2025-02-28 13:27:57 | WordPress Greenshift plugin信息泄露漏洞 | 详情 |
09791539b80d43a3e70c0c615a371846 | CVE-2024-12265 | 2025-02-28 13:27:57 | WordPress Web3 Crypto Payments by DePay for WooCommerce授权缺失漏洞 | 详情 |
f1ebe5e8c4d2b27532decaae22b958c3 | CVE-2024-46622 | 2025-02-26 09:29:43 | SecureAge Security Suite权限提升漏洞 | 详情 |
11c80e9d55ccd43a588f386f66557910 | CVE-2025-22395 | 2025-02-26 09:29:43 | Dell Update Package Framework权限提升漏洞 | 详情 |
978a3b64cac54d324490e1d9ccb9d973 | CVE-2024-48455 | 2025-02-26 09:29:43 | Netis Systems多款产品信息泄露漏洞 | 详情 |
937d32d09ab3d79285bd35cefe2e4fc8 | CVE-2024-54880 | 2025-02-26 09:29:43 | SeaCMS访问控制错误漏洞 | 详情 |
b142cb6a61cb3f3bca079b01c03d1daa | CVE-2024-56828 | 2025-02-26 09:29:43 | ChestnutCMS文件上传漏洞 | 详情 |
565566dae4c14015c56f1686d51158d9 | CVE-2024-48457 | 2025-02-26 09:29:43 | Netis Systems多款产品越界读取漏洞 | 详情 |
88439523bbc7fbb5316a3d53d7ef8045 | CVE-2024-48456 | 2025-02-26 09:29:43 | Netis Systems多款产品越界读取漏洞 | 详情 |
48d06e40461ebe2a07d633bbaac7f98b | CVE-2024-12402 | 2025-02-26 09:29:43 | WordPress Themes Coder Plugin权限提升漏洞 | 详情 |
091cbc8c2acc33047566c6ba72c0a5f2 | CVE-2024-11777 | 2025-02-26 09:29:43 | WordPress Sell Media Plugin跨站脚本漏洞 | 详情 |
992986b17991ac85700a5c82085792fe | CVE-2024-55074 | 2025-02-26 09:29:43 | Grocy跨站脚本漏洞 | 详情 |
6dde449c96bd83c445bd0f39adf55b81 | CVE-2024-11290 | 2025-02-26 09:29:43 | WordPress Member Access Plugin信息泄露漏洞 | 详情 |
b44a11235219206cb5e4232040129753 | CVE-2024-12098 | 2025-02-26 09:29:43 | WordPress ARS Affiliate Page Plugin跨站脚本漏洞 | 详情 |
6c2b3d895b8b3067dd3c52f6ee79ce05 | CVE-2024-11337 | 2025-02-26 09:29:43 | WordPress Horoscope And Tarot Plugin跨站脚本漏洞 | 详情 |
3f7a46526136bcfc4aa36cc908a1439c | CVE-2024-12541 | 2025-02-26 09:29:43 | WordPress Chative Live chat and Chatbot Plugin跨站请求伪造漏洞 | 详情 |
7ba57109b7dd16786a8483309a85c322 | CVE-2024-11899 | 2025-02-26 09:29:43 | WordPress Slider Pro Lite Plugin跨站脚本漏洞 | 详情 |
美国国家漏洞数据库(NVD) [TOP 30] | CVES | TIME | TITLE | URL |
---|---|---|---|---|
c6b3897e8411249dddc03a2582c3afdc | CVE-2023-45955 | 2023-10-31 18:15:08 | An issue discovered in Nanoleaf Light strip v3.5.10 allows attackers to cause a denial of service via crafted write binding attribute commands. | 详情 |
752c86d745d9d6748f49970fc6c72bf7 | CVE-2022-48189 | 2023-10-30 15:15:39 | An SMM driver input validation vulnerability in the BIOS of some ThinkPad models could allow an attacker with local access and elevated privileges to execute arbitrary code. | 详情 |
8e0bb5e55759a9b19da4ce8a5bf48799 | CVE-2022-4573 | 2023-10-30 15:15:39 | An SMI handler input validation vulnerability in the ThinkPad X1 Fold Gen 1 could allow an attacker with local access and elevated privileges to execute arbitrary code. | 详情 |
790b026d2f9b8a38a121baf7cc9fbbe2 | CVE-2023-45797 | 2023-10-30 07:15:12 | A Buffer overflow vulnerability in DreamSecurity MagicLine4NX versions 1.0.0.1 to 1.0.0.26 allows an attacker to remotely execute code. | 详情 |
9fee627171b8e0c7c2f065dae65c293c | CVE-2023-46468 | 2023-10-28 01:15:51 | An issue in juzawebCMS v.3.4 and before allows a remote attacker to execute arbitrary code via a crafted file to the custom plugin function. | 详情 |
1f2c404d06acfac83f7761c8ab878dee | CVE-2023-43322 | 2023-10-28 01:15:51 | ZPE Systems, Inc Nodegrid OS v5.0.0 to v5.0.17, v5.2.0 to v5.2.19, v5.4.0 to v5.4.16, v5.6.0 to v5.6.13, v5.8.0 to v5.8.10, and v5.10.0 to v5.10.3 was discovered to contain a command injection vulnerability via the endpoint /v1/system/toolkit/files/. | 详情 |
eea9f6fc871d45cb3672714124c1d416 | CVE-2023-46211 | 2023-10-27 21:15:09 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Brainstorm Force Ultimate Addons for WPBakery Page Builder plugin <=Â 3.19.14 versions. | 详情 |
8496e7ff58df6fda25c681900fb6dfb8 | CVE-2023-46209 | 2023-10-27 21:15:09 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in G5Theme Grid Plus – Unlimited grid plugin <= 1.3.2 versions. | 详情 |
751468e26927001b02f1b97a3d980488 | CVE-2023-46208 | 2023-10-27 21:15:09 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in StylemixThemes Motors – Car Dealer, Classifieds & Listing plugin <= 1.4.6 versions. | 详情 |
26e1875553f4c463d954949d41128765 | CVE-2023-46200 | 2023-10-27 21:15:09 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Stephen Darlington, Wandle Software Limited Smart App Banner plugin <=Â 1.1.3 versions. | 详情 |
a86c2cbf359259b1e38cd6e0c560a363 | CVE-2023-46509 | 2023-10-27 21:15:09 | An issue in Contec SolarView Compact v.6.0 and before allows an attacker to execute arbitrary code via the texteditor.php component. | 详情 |
c608240b549dc25f03e04b5397e48e1b | CVE-2023-46199 | 2023-10-27 08:15:31 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Triberr plugin <=Â 4.1.1 versions. | 详情 |
c4bd3098463c3624a284c838fd6ecb48 | CVE-2023-46194 | 2023-10-27 08:15:31 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.5 versions. | 详情 |
e79edbb292a519fa08055a884d86921e | CVE-2023-46192 | 2023-10-27 08:15:31 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Internet Marketing Ninjas Internal Link Building plugin <=Â 1.2.3 versions. | 详情 |
528422b82114eedfc8a332c895b5d475 | CVE-2023-46504 | 2023-10-27 04:15:10 | Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a physically proximate attacker to execute arbitrary code via the library name function in the general settings component. | 详情 |
4b4a8cd15c35de7b7cb3e0f5110f178b | CVE-2023-46503 | 2023-10-27 04:15:10 | Cross Site Scripting (XSS) vulnerability in PwnCYN YXBOOKCMS v.1.0.2 allows a remote attacker to execute arbitrary code via the reader management and book input modules. | 详情 |
9637804577e375e89e0c34d1e9dc7daa | CVE-2023-46505 | 2023-10-27 01:15:32 | Cross Site Scripting vulnerability in FanCMS v.1.0.0 allows an attacker to execute arbitrary code via the content1 parameter in the demo.php file. | 详情 |
ccc0d1dc9e1e6371fc7ed4a7e6bc67c9 | CVE-2023-46491 | 2023-10-27 00:15:09 | ZenTao Biz version 4.1.3 and before has a Cross Site Scripting (XSS) vulnerability in the Version Library. | 详情 |
925767e89590e6107a882a20468a3153 | CVE-2023-42188 | 2023-10-27 00:15:09 | IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF). | 详情 |
8affd999965e83dbd42583837011424c | CVE-2023-42406 | 2023-10-26 22:15:08 | SQL injection vulnerability in D-Link Online behavior audit gateway DAR-7000 V31R02B1413C allows a remote attacker to obtain sensitive information and execute arbitrary code via the editrole.php component. | 详情 |
7d0ccfb0da7a7225f1fd25c20c95a57e | CVE-2023-46435 | 2023-10-26 18:15:08 | Sourcecodester Packers and Movers Management System v1.0 is vulnerable to SQL Injection via mpms/?p=services/view_service&id. | 详情 |
0ab665a469513a0f70af2e1f17519e41 | CVE-2023-5792 | 2023-10-26 17:15:10 | A vulnerability has been found in SourceCodester Sticky Notes App 1.0 and classified as critical. This vulnerability affects unknown code of the file endpoint/delete-note.php. The manipulation of the argument note leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243598 is the identifier assigned to this vulnerability. | 详情 |
692b9ba4d9cf7c90b6a3e5b8396a5302 | CVE-2023-5791 | 2023-10-26 17:15:10 | A vulnerability, which was classified as problematic, was found in SourceCodester Sticky Notes App 1.0. This affects an unknown part of the file endpoint/add-note.php. The manipulation of the argument noteTitle/noteContent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243597 was assigned to this vulnerability. | 详情 |
7e262fff58c0ebc8ddc6cdfb7535d7e2 | CVE-2023-5790 | 2023-10-26 17:15:10 | A vulnerability classified as critical was found in SourceCodester File Manager App 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-file.php. The manipulation of the argument uploadedFileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243595. | 详情 |
c643f1003e7a0ee28d9e54cda26d6b85 | CVE-2023-43208 | 2023-10-26 17:15:09 | NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679. | 详情 |
3d3bc04cd7ec7fdf5aaaa0aa0a140b90 | CVE-2023-46450 | 2023-10-26 15:15:09 | Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function. | 详情 |
844b1b549a5543c879cdc68d7237f444 | CVE-2023-46449 | 2023-10-26 15:15:09 | Sourcecodester Free and Open Source inventory management system v1.0 is vulnerable to Incorrect Access Control. An arbitrary user can change the password of another user and takeover the account via IDOR in the password change function. | 详情 |
f494a8af43bc7ce0e5b6f1d2f18f3740 | CVE-2023-46081 | 2023-10-26 13:15:09 | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Lavacode Lava Directory Manager plugin <=Â 1.1.34 versions. | 详情 |
3a451401fdd162ad57ab72c2f5d7b984 | CVE-2023-46077 | 2023-10-26 13:15:09 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Arrow Plugins The Awesome Feed – Custom Feed plugin <= 2.2.5 versions. | 详情 |
428d0a0df20b616e36d68a5b76023a38 | CVE-2023-46076 | 2023-10-26 13:15:09 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RedNao WooCommerce PDF Invoice Builder, Create invoices, packing slips and more plugin <=Â 1.2.102 versions. | 详情 |