Below 本地权限提升漏洞 漏洞信息漏洞名称: Below 本地权限提升漏洞 漏洞编号: CVE: CVE-2025-27591 漏洞类型: 权限提升 漏洞等级: 高危 漏洞描述: 本漏洞(CVE-2025-27591)涉及Below软件的一个本地权限提升漏洞。Below是一个系统监控工具,广泛用于Linux系统中,用于实时监控系统资源使用情况,如CPU、内存、磁盘和网络等。由于其功能的实用性和广泛的应用场景,Below 2025-07-18 Github Poc #CVE-2025:github search #权限提升
Roundcube Webmail PHP Object Deserialization Vulnerability 漏洞信息漏洞名称: Roundcube Webmail PHP Object Deserialization Vulnerability 漏洞编号: CVE: CVE-2025-49113 漏洞类型: 反序列化 漏洞等级: 严重 漏洞描述: Roundcube Webmail是一款广泛使用的开源网页邮件客户端,它提供了类似于桌面邮件客户端的用户界面,支持IMAP和SMTP协议,常用于企业邮件系 2025-07-18 Github Poc #反序列化 #CVE-2025:github search
Leviton AcquiSuite and Energy Monitoring Hub are susceptible to a cross-site scripting 链接: https://github.com/advisories/GHSA-6qwv-2xc3-64j3 CVSS 评分: 9.3 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-6185 https://leviton.com/support/resources/product-support https://www.cisa.gov/ne 2025-07-18 安全公告 #Github Advisory
NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to 链接: https://github.com/advisories/GHSA-vmg3-7v43-9g23 CVSS 评分: 9.1 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-23266 https://nvidia.custhelp.com/app/answers/detail/a_id/5659 https://github.com/ 2025-07-17 安全公告 #Github Advisory
GoldenDict 150 and 151 has an exposed dangerous method that allows reading and modifying 链接: https://github.com/advisories/GHSA-xfp5-23mr-jwjm CVSS 评分: 9.6 参考链接: https://nvd.nist.gov/vuln/detail/CVE-2025-53964 https://github.com/goldendict/goldendict/releases https://github.com/tigr78/ 2025-07-17 安全公告 #Github Advisory
Multer vulnerable to Denial of Service via unhandled exception from malformed request 链接: https://github.com/advisories/GHSA-fjgf-rc76-4x9p 仓库 Star: 11855 CVSS 评分: 7.5 参考链接: https://github.com/expressjs/multer/security/advisories/GHSA-fjgf-rc76-4x9p https://nvd.nist.gov/vuln/detail/C 2025-07-17 安全公告 #Github Advisory
OpenZeppelin Contracts Bytes's lastIndexOf function with position argument performs out-of-bound memory access on empty buffers 链接: https://github.com/advisories/GHSA-9rcw-c2f9-2j55 仓库 Star: 25978 参考链接: https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9rcw-c2f9-2j55 https://github.com/OpenZeppe 2025-07-17 安全公告 #Github Advisory
Splashin iOS 访问控制漏洞 漏洞信息漏洞名称: Splashin iOS 访问控制漏洞 漏洞编号: CVE: CVE-2025-45156, CVE-2025-45157 漏洞类型: 权限绕过 漏洞等级: 高危 漏洞描述: Splashin iOS是一款提供实时位置服务的应用程序,主要面向个人用户,允许用户分享和查看彼此的位置信息。该应用程序在v2.0版本中存在两个严重的访问控制漏洞(CVE-2025-45156和CVE 2025-07-17 Github Poc #CVE-2025:github search #权限绕过
Livewire is vulnerable to remote command execution during component property update hydration 链接: https://github.com/advisories/GHSA-29cq-5w36-x7w3 仓库 Star: 22989 参考链接: https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 https://github.com/livewire/livewire/commit/ef 2025-07-17 安全公告 #Github Advisory
offsectraining Twitter Update ! 博主: offsectraining 推文: 深度解析:CVE-2024-12029(InvokeAI中的严重远程代码执行漏洞)⚠️ CVSS 9.8 | EPSS 61.17% 未受保护的API + 不安全的torch反序列化 = 系统完全被接管。 攻击者可以托管恶意模型文件,并通过/api/v2/models/install端点触发远程代码执行 2025-07-17 推特监控 #offsectraining