sudo 本地权限提升漏洞 漏洞信息漏洞名称: sudo 本地权限提升漏洞 漏洞编号: CVE: CVE-2025-32463 漏洞类型: 权限提升 漏洞等级: 高危 漏洞描述: 本项目提供了一个基于Docker的实验环境,专门用于复现和测试CVE-2025-32463漏洞,这是一个sudo的本地权限提升漏洞。sudo是一个在Linux和Unix-like操作系统中广泛使用的程序,允许用户以其他用户(通常是超级用户)的权 2025-08-02 Github Poc #CVE-2025:github search #权限提升
Microsoft Windows RD Gateway Remote Code Execution Vulnerability 漏洞信息漏洞名称: Microsoft Windows RD Gateway Remote Code Execution Vulnerability 漏洞编号: CVE: CVE-2020-0610 漏洞类型: 命令执行 漏洞等级: 严重 漏洞描述: ### 受影响产品Microsoft Windows远程桌面网关(RD Gateway)是微软提供的一种服务,允许用户通过互联网安全地连接到内部 2025-08-02 Github Poc #projectdiscovery/nuclei-templates:github issues #命令执行
Gandia Integra Total Authenticated SQL Injection Vulnerability 漏洞信息漏洞名称: Gandia Integra Total Authenticated SQL Injection Vulnerability 漏洞编号: CVE: CVE-2025-41373 漏洞类型: SQL注入 漏洞等级: 高危 漏洞描述: Gandia Integra Total是一款广泛使用的企业级服务软件,主要用于集成和管理企业资源。它通常部署在企业内部网络中,用于提高业务流程 2025-08-01 Github Poc #CVE-2025:github search #SQL注入
Pretalx Limited File Write to Remote Code Execution 漏洞信息漏洞名称: Pretalx Limited File Write to Remote Code Execution 漏洞编号: CVE: CVE-2023-28458 漏洞类型: 命令执行 漏洞等级: 高危 漏洞描述: Pretalx是一个开源的会议管理和调度系统,广泛用于各种会议和活动的组织。它提供了一个完整的解决方案,包括提交管理、日程安排和演讲者管理等功能。由于其灵活性和易用性, 2025-08-01 Github Poc #rapid7/metasploit-framework:github issues #命令执行
Insecure permissions in LangChain-ChatGLM-Webui commit ef829 allows attackers to arbitrarily view 链接: https://github.com/advisories/GHSA-7w87-cwwm-qff7 CVSS 评分: 9.8 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-45150 https://gist.github.com/ycshao12/69a48551cc6c9cc69153d137afe9ecef https://gi 2025-08-01 安全公告 #Github Advisory
Saurus CMS Community Edition since commit d886e5b0 (2010-04-23) is vulnerable to a SQL Injection 链接: https://github.com/advisories/GHSA-xfj7-2jg6-3957 CVSS 评分: 9.1 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-52390 https://github.com/sauruscms/Saurus-CMS-Community-Edition/blob/d886e5b0c1e2b4 2025-08-01 安全公告 #Github Advisory
The modelscope/ms-swift library thru 261 is vulnerable to arbitrary code execution through 链接: https://github.com/advisories/GHSA-qgm9-fp3r-vm5v CVSS 评分: 9.8 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-50472 https://github.com/modelscope/ms-swift/blob/ab38bff0387a86fd9f068246c326ee7b0 2025-08-01 安全公告 #Github Advisory
A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may 链接: https://github.com/advisories/GHSA-mr4h-qf9j-f665 CVSS 评分: 9.1 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-6000 https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-ex 2025-08-01 安全公告 #Github Advisory
@nestjs/devtools-integration CSRF to Sandbox Escape Allows for RCE against JS Developers 链接: https://github.com/advisories/GHSA-85cg-cmq5-qjm7 仓库 Star: 72034 参考链接: https://github.com/nestjs/nest/security/advisories/GHSA-85cg-cmq5-qjm7 https://github.com/JLLeitschuh/nestjs-typescript-sta 2025-08-01 安全公告 #Github Advisory
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution 链接: https://github.com/advisories/GHSA-q6gg-9f92-r9wg 仓库 Star: 55832 参考链接: https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg https://github.com/traefik/plugin-service/pull/7 2025-08-01 安全公告 #Github Advisory