当前节点:cve-famous
时间节点
2021-05-07 14:59:12知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:深信服
2021-05-06 19:00:20知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Django
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.

在 Django 2.2之前2.2.21,3.1.9之前3.1,3.2之前3.2,MultiPartParser,UploadedFile,and FieldFile 中允许通过上传的文件进行目录遍历,这些文件有适当的精心设计的文件名。
2021-05-06 18:59:24知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Drupal
Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.

在 Drupal 核心中的跨网站脚本安全漏洞。Drupal AJAX API 默认情况下不禁用 JSONP,允许使用 XSS 攻击。这个问题影响到: Drupal Core 7.x 版本在7.73之前; 8.8. x 版本在8.8.10之前; 8.9. x 版本在8.9.6之前; 9.0.x 版本在9.0.6之前。
2021-05-06 18:59:20知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Drupal
Access bypass vulnerability in Drupal Core allows JSON:API when JSON:API is in read/write mode. Only sites that have the read_only set to FALSE under jsonapi.settings config are vulnerable. This issue affects: Drupal Drupal Core 8.8.x versions prior to 8.8.8; 8.9.x versions prior to 8.9.1; 9.0.x versions prior to 9.0.1.

Drupal Core 中的访问绕过漏洞在 JSON: API 处于读/写模式时允许 JSON: API。只有那些在 jsonapi.settings config 中将 read_only 设置为 FALSE 的站点才是脆弱的。这个问题影响到: Drupal Core 8.8.8之前的版本; 8.9. x 之前的版本; 9.0.1之前的版本。
2021-05-06 18:59:18知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Drupal
Arbitrary PHP code execution vulnerability in Drupal Core under certain circumstances. An attacker could trick an administrator into visiting a malicious site that could result in creating a carefully named directory on the file system. With this directory in place, an attacker could attempt to brute force a remote code execution vulnerability. Windows servers are most likely to be affected. This issue affects: Drupal Drupal Core 8.8.x versions prior to 8.8.8; 8.9.x versions prior to 8.9.1; 9.0.1 versions prior to 9.0.1.

在某些情况下 Drupal Core 中的任意 PHP 代码执行漏洞。攻击者可以欺骗管理员访问恶意站点,导致在文件系统上创建一个精心命名的目录。有了这个目录,攻击者可以尝试暴力破解远程代码执行漏洞。服务器最有可能受到影响。这个问题影响到: Drupal Core 8.8.8之前的版本; 8.9. x 之前的版本; 9.0.1之前的版本。
2021-05-06 18:59:15知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Drupal
Open Redirect vulnerability in Drupal Core allows a user to be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. This issue affects: Drupal Drupal Core 7 version 7.70 and prior versions.

Drupal Core 中的开放重定向漏洞允许用户被欺骗访问一个特别设计的链接,这个链接会将他们重定向到一个任意的外部 URL。这个问题影响到: Drupal Core 7.70版本和以前的版本。
2021-05-05 22:59:35知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Sentry
iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

iWT Ltd FaceSentry 访问控制系统6.4.8使用默认凭据受到经过身份验证的操作系统命令注入漏洞的影响。可以通过 pingTest PHP 脚本中的‘ strInIP’POST 参数将任意 shell 命令作为 root 用户注入和执行。
2021-05-04 19:26:50知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.

在版本1.5.5之前的 Apache Unomi 允许 CRLF 日志注入,因为日志语句中没有转义。
2021-05-03 23:26:10知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely. Update to Airflow 1.10.15 or 2.0.2. Please also update your Python version to the latest available PATCH releases of the installed MINOR versions, example update to Python 3.6.13 if you are on Python 3.6. (Those contain the fix for CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336).

传递给某些端点(如’/trigger’)的“ origin”参数很容易被 XSS 攻击。这个问题会影响到1.10.15系列中小于1.10.15的 Apache Airflow 版本,并影响到2.0.0、2.0.1和2. x 系列。这是相同的 CVE-2020-13944 & CVE-2020-17515,但实施的修复没有完全解决这个问题。更新到气流1.10.15或2.0.2。还请将您的 Python 版本更新为已安装的 MINOR 版本的最新 PATCH 版本,如果您使用的是 Python 3.6.13,则示例更新为 Python 3.6.13。(其中包含针对 CVE-2021-23336 https://nvd.nist.gov/vuln/detail/CVE-2021-23336的修正)。
2021-05-02 07:26:38知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:RTX
Dell EMC Networking X-Series firmware versions prior to 3.0.1.8 and Dell EMC PowerEdge VRTX Switch Module firmware versions prior to 2.0.0.82 contain a Weak Password Encryption Vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable system with privileges of the compromised account.

戴尔 EMC 网络 x 系列固件版本之前的3.0.1.8和戴尔 EMC PowerEdge VRTX 交换模块固件版本之前的2.0.0.82包含一个弱密码加密漏洞。未经身份验证的远程攻击者可能会利用此漏洞,导致某些用户凭据的泄露。攻击者可以使用公开的凭据,以受损帐户的特权访问易受攻击的系统。
2021-05-01 11:26:31知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Yii
有新的漏洞组件被发现啦,组件ID:ECShop
An issue was found in yii2_fecshop 2.x. There is a reflected XSS vulnerability in the check cart page.

在 yi2fecshop 2.x 中发现了一个问题,在检查购物车页面中有一个反映 XSS 漏洞。
2021-05-01 11:26:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Django
django-filter is a generic system for filtering Django QuerySets based on user selections. In django-filter before version 2.4.0, automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50 to the form field used by `NumberFilter` instances. In addition, `NumberFilter` implements the new `get_max_validator()` which should return a configured validator instance to customise the limit, or else `None` to disable the additional validation. Users may manually apply an equivalent validator if they are not able to upgrade.

Django-filter 是一个基于用户选择过滤 Django QuerySets 的通用系统。在2.4.0版本之前的 django-filter 中,自动生成的‘ NumberFilter’实例,其值后来被转换为整数,使用带有足够大指数的指数格式被恶意输入,从而受到潜在的 DoS 攻击。版本2.4.0 + 对 NumberFilter 实例使用的表单字段应用默认值为1e50的 MaxValueValidator。此外,‘ NumberFilter’实现了新的‘ get _ ma
2021-04-30 15:26:04知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:网神
2021-04-29 19:27:33知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
ManageWiki is an extension to the MediaWiki project. The 'wikiconfig' API leaked the value of private configuration variables set through the ManageWiki variable to all users. This has been patched by https://github.com/miraheze/ManageWiki/compare/99f3b2c8af18...befb83c66f5b.patch. If you are unable to patch set `$wgAPIListModules['wikiconfig'] = 'ApiQueryDisabled';` or remove private config as a workaround.

ManageWiki 是 MediaWiki 项目的扩展。‘ wikiconfig’API 将通过 ManageWiki 变量设置的私有配置变量的值泄露给所有用户。这个问题已经被 https://github.com/miraheze/managewiki/compare/99f3b2c8af18...befb83c66f5b.patch 修补过了。如果您无法修补设置‘ $wgAPIListModules [‘ wikiconfig’] = ‘ ApiQueryDisabled’; 或者删除私有配置作为一种解决方案。
2021-04-29 19:27:25知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Nexus Repository Manager
A cross-site scripting (XSS) vulnerability has been discovered in Nexus Repository Manager 3.x before 3.30.1. An attacker with a local account can create entities with crafted properties that, when viewed by an administrator, can execute arbitrary JavaScript in the context of the NXRM application.

在3.30.1之前,Nexus Repository Manager 3. x 中发现了一个跨网站脚本安全漏洞。使用本地帐户的攻击者可以创建具有精心设计属性的实体,当管理员查看时,可以在 NXRM 应用程序的上下文中执行任意的 JavaScript。
2021-04-29 19:26:13知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:KindEditor
Cross Site Scripting (XSS) in Qibosoft QiboCMS v7 and earlier allows remote attackers to execute arbitrary code or obtain sensitive information by injecting arbitrary commands in a HTTP request to the "ewebeditor\3.1.1\kindeditor.js" component.

在 qiboosoft QiboCMS v7以及更早版本中,通过向“ ewebeditor 3.1.1 kindeditor.js”组件注入 HTTP 请求中的任意命令,远程攻击者可以执行任意代码或获取敏感信息。跨网站脚本。
2021-04-29 19:26:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:海康威视
2021-04-29 19:26:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:海康威视
2021-04-29 19:26:05知名组件CVE监控
2021-04-29 19:26:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:通达
2021-04-29 19:26:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:通达
2021-04-29 19:26:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:通达
2021-04-29 19:26:04知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:通达
2021-04-28 23:30:48知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Redmine
Redmine before 4.0.9 and 4.1.x before 4.1.3 allows an attacker to learn the values of internal authentication keys by observing timing differences in string comparison operations within SysController and MailHandlerController.

4.0.9和4.1.3之前的 Redmine 允许攻击者通过观察 SysController 和 MailHandlerController 中字符串比较操作的时间差异来学习内部身份验证密钥的值。
2021-04-28 23:30:46知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Redmine
Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows users to circumvent the allowed filename extensions of uploaded attachments.

4.0.9之前的 Redmine,4.1.3之前的4.1. x 和4.2. x 之前的 Redmine 允许用户绕过上传附件的允许的文件扩展名。
2021-04-28 23:30:42知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Redmine
Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows attackers to bypass the add_issue_notes permission requirement by leveraging the incoming mail handler.

4.0.9之前的 Redmine,4.1.3之前的4.1. x,4.2.1之前的4.2. x 允许攻击者通过利用传入的邮件处理程序来绕过 add _ issue _ notes 的权限要求。
2021-04-28 23:30:36知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Redmine
Insufficient input validation in the Git repository integration of Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows Redmine users to read arbitrary local files accessible by the application server process.

在4.0.9、4.1.3和4.2.1之前,Redmine 的 Git 存储库集成中的输入验证不足,允许 Redmine 用户读取应用程序服务器进程可访问的任意本地文件。
2021-04-28 23:29:50知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.

Apache Tapestry 上下文资产处理中的信息暴露漏洞允许攻击者使用特定构造的 URL 在 WEB-INF 内部下载文件。这是由于 CVE-2020-13953的不完全修复造成的。这个问题影响到 Apache Tapestry Tapestry 5.4.0版本到 Apache Tapestry 5.6.3; Apache Tapestry 5.7.0版本和 Apache Tapestry 5.7.1。
2021-04-28 23:29:46知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Apache OFBiz has unsafe deserialization prior to 17.12.07 version

在17.12.07版本之前,Apache OFBiz 进行了不安全的反序列化
2021-04-28 23:28:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack

在17.12.07版本之前,Apache OFBiz 有不安全的反序列化。未经身份验证的用户可以执行 RCE 攻击
2021-04-28 23:27:55知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.

Apache 超级设置为并包含1.0.1,允许创建可能是恶意的外部 URL。通过不检查用户输入的打开重定向功能,URL 缩短服务将允许恶意用户创建一个简短的指示板 URL,可以说服用户点击链接。
2021-04-28 23:26:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
The S3 buckets and keys in a secure Apache Ozone Cluster must be inaccessible to anonymous access by default. The current security vulnerability allows access to keys and buckets through a curl command or an unauthenticated HTTP request. This enables unauthorized access to buckets and keys thereby exposing data to anonymous clients or users. This affected Apache Ozone prior to the 1.1.0 release. Improper Authorization vulnerability in __COMPONENT__ of Apache Ozone allows an attacker to __IMPACT__. This issue affects Apache Ozone Apache Ozone version 1.0.0 and prior versions.

默认情况下,安全的 Apache Ozone 集群中的 S3存储桶和密钥不能被匿名访问。当前的安全漏洞允许通过 curl 命令或未经身份验证的 HTTP 请求访问密钥和存储桶。这使得对存储桶和密钥的未授权访问成为可能,从而将数据暴露给匿名客户机或用户。这影响了1.1.0版本之前的 Apache Ozone。Apache Ozone 的 _component _ _ 中的错误授权漏洞允许攻击者使用 _impact _。这个问题影响到 Apache Ozone 版本1.0.0和以前的版本。
2021-04-28 03:27:58知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Nexus Repository Manager
Sonatype Nexus Repository Manager 3.x before 3.30.1 allows a remote attacker to get a list of files and directories that exist in a UI-related folder via directory traversal (no customer-specific data is exposed).

Sonatype Nexus Repository Manager 3.x before 3.30.1允许远程攻击者通过目录遍历获得 ui 相关文件夹中存在的文件和目录的列表(不公开客户特定的数据)。
2021-04-28 03:27:50知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Docker
HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker is able to receive arbitrary files from the file system when exporting a note to PDF. Since the code injection has to take place as note content, there fore this exploit requires the attackers ability to modify a note. This will affect all instances, which have pdf export enabled. This issue has been fixed by https://github.com/hedgedoc/hedgedoc/commit/c1789474020a6d668d616464cb2da5e90e123f65 and is available in version 1.5.0. Starting the CodiMD/HedgeDoc instance with `CMD_ALLOW_PDF_EXPORT=false` or set `"allowPDFExport": false` in config.json can mitigate this issue for those who cannot upgrade. This exploit works because while PhantomJS doesn't actually render the `file:///` references to the PDF file itself, it still uses them internally, and exfiltration is possible, and easy through JavaScript rendering. The impact is pretty bad, as the attacker is able to read the CodiMD/HedgeDoc `co
2021-04-27 07:26:29知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
cPanel before 94.0.3 allows self-XSS via EasyApache 4 Save Profile (SEC-581).

94.0.3之前的 cPanel 允许通过 EasyApache 4 Save Profile (SEC-581)实现自 xss。
2021-04-26 11:25:56知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:泛微
2021-04-26 11:25:56知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:泛微
2021-04-25 15:25:56知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:致远
2021-04-25 15:25:55知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:天融信
2021-04-24 19:28:11知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Sentry
In Hardware Sentry KM before 10.0.01 for BMC PATROL, a cleartext password may be discovered after a failure or timeout of a command.

在 BMC PATROL 10.0.01之前的硬件哨兵 KM 中,命令失败或超时后可能会发现明文密码。
2021-04-24 19:27:33知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Nexus Repository Manager
Sonatype Nexus Repository Manager 3 Pro up to and including 3.30.0 has Incorrect Access Control.

Sonatype Nexus 仓库管理器3专业版,包括3.30.0有不正确的访问控制。
2021-04-24 19:27:27知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Apache Maven will follow repositories that are defined in a dependency&#8217;s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html

Apache Maven 将跟踪在依赖项中定义的存储库,这些存储库可能会让某些用户感到惊讶,如果恶意参与者接管存储库或者能够将自己插入到假装存储库的位置上,就会产生潜在的风险。Maven 将3.8.1 + 中的默认行为改为默认情况下不再遵循 http (非 ssl)存储库引用。更多细节请参考相关链接。如果您目前使用存储库管理器来管理构建所使用的存储库,那么您不会
2021-04-24 19:27:01知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:GitLab
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.

GitLab CE/EE 中发现了一个问题,影响从11.9开始的所有版本。没有正确验证传递给文件解析器的图像文件,导致远程命令执行。
2021-04-24 06:20:16知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:SaltStack
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).

在 SaltStack Salt 2016.9到3002.6中,命令注入漏洞存在于 snapper 模块中,该模块允许在仆从上进行本地权限提升操作。该攻击要求创建一个文件,其路径名由 snapper 备份,并且主服务器调用 snapper.diff 函数(不安全地执行 popen)。
2021-04-24 06:18:34知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L).

Oracle Fusion 中间件 WebLogic 产品中的漏洞。受影响的支持版本有10.3.6.0.0、12.1.3.0、12.2.1.3.0、12.2.1.4.0和14.1.1.0.0。易于利用的漏洞允许通过 t 3,IIOP 进行网络访问的未经身份验证的攻击者入侵 WebLogic。这个漏洞的成功攻击可能导致未经授权的更新,插入或删除访问一些 WebLogic 数据和未经授权的能力,造成部分分布式拒绝服务攻击(部分 DOS) WebLogic。CVSS 3.1基本得分6.5(完整性和可用性影响)。C
2021-04-24 06:15:49知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:GitLab
An issue has been discovered in GitLab affecting all versions starting with 12.9. GitLab was vulnerable to a stored XSS if scoped labels were used.

在 GitLab 已经发现了一个影响所有版本的问题,从12.9开始。如果使用限定作用域的标签,GitLab 很容易被存储的 XSS 攻击。
2021-04-24 06:15:38知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).

Oracle Fusion 中间件(组件: 控制台) WebLogic 产品中的漏洞。受影响的支持版本有10.3.6.0.0、12.1.3.0、12.2.1.3.0、12.2.1.4.0和14.1.1.0.0。难以利用的漏洞允许通过 HTTP 进行网络访问的高特权攻击者入侵 WebLogic。成功攻击此漏洞可能导致未经授权访问关键数据或完全访问所有可访问的 WebLogic 数据。CVSS 3.1基本得分4.4(机密性影响)。CVSS 向量: (CVSS: 3.1/AV: n/AC: h/PR: h/UI: n/s: u/c: h/i: n/a: n)。
2021-04-24 06:15:33知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

Oracle Fusion 中间件(组件: Web 服务) WebLogic 产品中的漏洞。受影响的支持版本有10.3.6.0.0、12.2.1.3.0、12.2.1.4.0和14.1.1.0.0。难以利用的漏洞允许未经身份验证的攻击者通过 t 3,IIOP 访问网络,从而危及 WebLogic 安全。成功攻击此漏洞可能导致未经授权访问关键数据或完全访问所有可访问的 WebLogic 数据。CVSS 3.1基本得分5.9(机密性影响)。CVSS 向量: (CVSS: 3.1/AV: n/AC: h/PR: n/UI: n/s: u/c: h/i: n/a: n)。
2021-04-24 06:15:21知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

Oracle Fusion 中间件 WebLogic 产品中的漏洞。受影响的支持版本有10.3.6.0.0、12.1.3.0、12.2.1.3.0、12.2.1.4.0和14.1.1.0.0。易于利用的漏洞允许通过 HTTP 进行网络访问的未经身份验证的攻击者入侵 WebLogic。成功攻击这个漏洞可能导致未经授权的读取访问 WebLogic 可访问的数据子集。CVSS 3.1基本得分5.3(机密性影响)。CVSS 向量: (CVSS: 3.1/AV: n/AC: l/PR: n/UI: n/s: u/c: l/i: n/a: n)。
2021-04-24 06:14:15知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: TopLink Integration). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Oracle Fusion 中间件 WebLogic 产品的漏洞(组件: TopLink 集成)。受影响的支持版本是10.3.6.0.0、12.1.3.0.0、12.2.1.3.0和12.2.1.4.0。易于利用的漏洞允许通过 HTTP 进行网络访问的未经身份验证的攻击者入侵 WebLogic。成功攻击此漏洞可能导致未经授权访问关键数据或完全访问所有可访问的 WebLogic 数据。CVSS 3.1基本得分7.5(机密性影响)。CVSS 向量: (CVSS: 3.1/AV: n/AC: l/PR: n/UI: n/s: u/c: h/i: n/a: n)。
2021-04-24 06:13:52知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). The supported version that is affected is 10.3.6.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).

Oracle Fusion 中间件(组件: 控制台) WebLogic 产品中的漏洞。受影响的支持版本是10.3.6.0.0。易于利用的漏洞允许通过 HTTP 进行网络访问的未经身份验证的攻击者入侵 WebLogic。成功的攻击需要攻击者以外
2021-04-24 06:13:47知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Oracle Fusion 中间件 WebLogic 产品中的漏洞。受影响的支持版本有12.1.3.0.0、12.2.1.3.0、12.2.1.1.4.0和14.1.1.0.0。易于利用的漏洞允许未经身份验证的攻击者通过 IIOP 进行网络访问,从而危及 WebLogic 安全。成功攻击这个漏洞可以导致 WebLogic 的被接管。CVSS 3.1基本得分9.8(机密性、完整性和可用性影响)。CVSS 向量: (CVSS: 3.1/AV: n/AC: l/PR: n/UI: n/s: u/c: h/i: h/a: h)。
2021-04-24 06:13:45知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:WebLogic
有新的漏洞组件被发现啦,组件ID:WebLogic
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Coherence Container). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Oracle Fusion 中间件 WebLogic 产品的漏洞(组件: Coherence Container)。受影响的支持版本有12.1.3.0.0、12.2.1.3.0、12.2.1.1.4.0和14.1.1.0.0。易于利用的漏洞允许通过 t 3,IIOP 进行网络访问的未经身份验证的攻击者入侵 WebLogic。成功攻击这个漏洞可以导致 WebLogic 的被接管。CVSS 3.1基本得分9.8(机密性、完整性和可用性影响)。CVSS 向量: (CVSS: 3.1/AV: n/AC: l/PR: n/UI: n/s: u/c: h/i: h/a: h)。
2021-04-24 06:11:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:深信服
2021-04-23 10:12:25知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins CloudBees CD Plugin 1.1.21 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Item/Read permission to schedule builds of projects without having Item/Build permission.

Jenkins CloudBees CD Plugin 1.1.21及更早版本在 HTTP 端点中不执行权限检查,允许具有 Item/Read 权限的攻击者在没有 Item/Build 权限的情况下安排项目构建。
2021-04-23 10:12:23知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Templating Engine Plugin 2.1 and earlier does not protect its pipeline configurations using Script Security Plugin, allowing attackers with Job/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.

Jenkins 模板引擎插件2.1和更早版本没有使用脚本安全插件保护其管道配置,允许具有 Job/Configure 权限的攻击者在 Jenkins 控制器 JVM 的上下文中执行任意代码。