Craw Info
  • 首页
  • 归档
  • 分类
  • 标签
  • 关于

sudo 本地权限提升漏洞

漏洞信息漏洞名称: sudo 本地权限提升漏洞 漏洞编号: CVE: CVE-2025-32463 漏洞类型: 权限提升 漏洞等级: 高危 漏洞描述: 本项目提供了一个基于Docker的实验环境,专门用于复现和测试CVE-2025-32463漏洞,这是一个sudo的本地权限提升漏洞。sudo是一个在Linux和Unix-like操作系统中广泛使用的程序,允许用户以其他用户(通常是超级用户)的权
2025-08-02
Github Poc
#CVE-2025:github search #权限提升

Microsoft Windows RD Gateway Remote Code Execution Vulnerability

漏洞信息漏洞名称: Microsoft Windows RD Gateway Remote Code Execution Vulnerability 漏洞编号: CVE: CVE-2020-0610 漏洞类型: 命令执行 漏洞等级: 严重 漏洞描述: ### 受影响产品Microsoft Windows远程桌面网关(RD Gateway)是微软提供的一种服务,允许用户通过互联网安全地连接到内部
2025-08-02
Github Poc
#projectdiscovery/nuclei-templates:github issues #命令执行

Gandia Integra Total Authenticated SQL Injection Vulnerability

漏洞信息漏洞名称: Gandia Integra Total Authenticated SQL Injection Vulnerability 漏洞编号: CVE: CVE-2025-41373 漏洞类型: SQL注入 漏洞等级: 高危 漏洞描述: Gandia Integra Total是一款广泛使用的企业级服务软件,主要用于集成和管理企业资源。它通常部署在企业内部网络中,用于提高业务流程
2025-08-01
Github Poc
#CVE-2025:github search #SQL注入

Pretalx Limited File Write to Remote Code Execution

漏洞信息漏洞名称: Pretalx Limited File Write to Remote Code Execution 漏洞编号: CVE: CVE-2023-28458 漏洞类型: 命令执行 漏洞等级: 高危 漏洞描述: Pretalx是一个开源的会议管理和调度系统,广泛用于各种会议和活动的组织。它提供了一个完整的解决方案,包括提交管理、日程安排和演讲者管理等功能。由于其灵活性和易用性,
2025-08-01
Github Poc
#rapid7/metasploit-framework:github issues #命令执行

Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows attackers to arbitrarily view

链接: https://github.com/advisories/GHSA-7w87-cwwm-qff7 CVSS 评分: 9.8 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-45150 https://gist.github.com/ycshao12/69a48551cc6c9cc69153d137afe9ecef https://gi
2025-08-01
安全公告
#Github Advisory

Saurus CMS Community Edition since commit d886e5b0 (2010-04-23) is vulnerable to a SQL Injection

链接: https://github.com/advisories/GHSA-xfj7-2jg6-3957 CVSS 评分: 9.1 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-52390 https://github.com/sauruscms/Saurus-CMS-Community-Edition/blob/d886e5b0c1e2b4
2025-08-01
安全公告
#Github Advisory

The modelscope/ms-swift library thru 261 is vulnerable to arbitrary code execution through

链接: https://github.com/advisories/GHSA-qgm9-fp3r-vm5v CVSS 评分: 9.8 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-50472 https://github.com/modelscope/ms-swift/blob/ab38bff0387a86fd9f068246c326ee7b0
2025-08-01
安全公告
#Github Advisory

A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may

链接: https://github.com/advisories/GHSA-mr4h-qf9j-f665 CVSS 评分: 9.1 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-6000 https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-ex
2025-08-01
安全公告
#Github Advisory

@nestjs/devtools-integration CSRF to Sandbox Escape Allows for RCE against JS Developers

链接: https://github.com/advisories/GHSA-85cg-cmq5-qjm7 仓库 Star: 72034 参考链接: https://github.com/nestjs/nest/security/advisories/GHSA-85cg-cmq5-qjm7 https://github.com/JLLeitschuh/nestjs-typescript-sta
2025-08-01
安全公告
#Github Advisory

Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution

链接: https://github.com/advisories/GHSA-q6gg-9f92-r9wg 仓库 Star: 55832 参考链接: https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg https://github.com/traefik/plugin-service/pull/7
2025-08-01
安全公告
#Github Advisory
1…56789…232

搜索

Hexo Fluid