当前节点:cve-famous
时间节点
2020年6月4日 17:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper validation of parameters in a Flexible NetFlow Version 9 record. An attacker could exploit this vulnerability by sending a malformed Flexible NetFlow Version 9 packet to the Control and Provisioning of Wireless Access Points (CAPWAP) data port of an affected device. An exploit could allow the attacker to trigger an infinite loop, resulting in a process crash that would cause a reload of the device.

用于Cisco Catalyst 9800系列无线控制器的Cisco IOS XE软件的Flexible NetFlow版本9数据包处理器中的漏洞可能允许未经身份验证的远程攻击者在受影响的设备上导致拒绝服务(DoS)条件。该漏洞是由于Flexible NetFlow版本9记录中的参数验证不正确引起的。攻击者可以通过将格式错误的Flexible NetFlow版本9数据包发送到受影响设备的控制和配置无线访问点(CAPWAP)数据端口来利用此漏洞。利用此漏洞可能使攻击者触发无限循环,从而导致进程崩溃,从而导致设备重新加载。
2020年6月4日 17:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. The vulnerability is due to insufficient verification of authenticity of received Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by tampering with ESP cleartext values as a man-in-the-middle.

适用于Cisco 4300系列集成多业务路由器和Cisco Catalyst 9800-L无线控制器的Cisco IOS XE软件的硬件加密驱动程序中的漏洞可能允许未经身份验证的远程攻击者断开合法IPsec VPN会话与受影响设备的连接。该漏洞是由于未对接收到的封装安全有效载荷(ESP)数据包的真实性进行验证所致。攻击者可以通过中间人篡改ESP明文值来利用此漏洞。
2020年6月4日 17:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. The vulnerability is due to insufficient validation of user-supplied input to the web UI. An attacker could exploit this vulnerability by submitting crafted input to the web UI. A successful exploit could allow an attacker to execute arbitrary commands with administrative privileges on an affected device.

Cisco IOS XE软件的Web UI中的漏洞可能允许经过身份验证的远程攻击者在受影响的设备的基础操作系统上注入并执行具有管理特权的任意命令。该漏洞是由于用户对Web UI提供的输入的验证不足而引起的。攻击者可以通过向Web UI提交精心设计的输入来利用此漏洞。成功利用此漏洞可能使攻击者在受影响的设备上以管理特权执行任意命令。
2020年6月4日 17:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with administrative privileges to execute arbitrary code with root privileges on the underlying Linux shell. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by first creating a malicious file on the affected device itself and then uploading a second malicious file to the device. A successful exploit could allow the attacker to execute arbitrary code with root privileges or bypass licensing requirements on the device.

Cisco IOS XE软件的Web UI中的漏洞可能允许经过身份验证的具有管理特权的远程攻击者在基础Linux Shell上以root特权执行任意代码。该漏洞是由于对用户提供的输入进行了不正确的验证所致。攻击者可以通过首先在受影响的设备本身上创建恶意文件,然后将第二个恶意文件上传到设备来利用此漏洞。成功的利用可能使攻击者能够以root特权执行任意代码,或者绕过设备上的许可要求。
2020年6月4日 17:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the Topology Discovery Service of Cisco One Platform Kit (onePK) in Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient length restrictions when the onePK Topology Discovery Service parses Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol message to an affected device. An exploit could allow the attacker to cause a stack overflow, which could allow the attacker to execute arbitrary code with administrative privileges, or to cause a process crash, which could result in a reload of the device and cause a DoS condition.

Cisco IOS软件,Cisco IOS XE软件,Cisco IOS XR软件和Cisco NX-OS软件中的Cisco One Platform Kit(onePK)拓扑发现服务中的漏洞可能允许未经身份验证的相邻攻击者执行任意代码或导致受影响的设备上的拒绝服务(DoS)条件。该漏洞是由于onePK
2020年6月4日 17:08知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in Cisco IOS XE SD-WAN Software could allow an unauthenticated, physical attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by stopping the boot initialization of an affected device. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device.

Cisco IOS XE SD-WAN软件中的漏洞可能允许未经身份验证的物理攻击者绕过身份验证,并不受限制地访问受影响设备的根外壳。存在此漏洞是因为受影响的软件对某些命令的身份验证机制不足。攻击者可以通过停止受影响设备的启动初始化来利用此漏洞。成功利用该漏洞可能使攻击者绕过身份验证并获得对受影响设备根外壳程序的不受限制的访问。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the Virtual Services Container of Cisco IOS XE Software could allow an authenticated, local attacker to gain root-level privileges on an affected device. The vulnerability is due to insufficient validation of a user-supplied open virtual appliance (OVA). An attacker could exploit this vulnerability by installing a malicious OVA on an affected device.

Cisco IOS XE软件的虚拟服务容器中的漏洞可能允许经过身份验证的本地攻击者获得受影响设备上的根级特权。该漏洞是由于对用户提供的开放式虚拟设备(OVA)的验证不足所致。攻击者可以通过在受影响的设备上安装恶意的OVA来利用此漏洞。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker to escalate their privileges to a user with root-level privileges. The vulnerability is due to insufficient validation of user-supplied content. This vulnerability could allow an attacker to load malicious software onto an affected device.

Cisco IOS XE软件中的漏洞可能允许经过身份验证的本地攻击者将其特权升级为具有根级特权的用户。该漏洞是由于对用户提供的内容的验证不足所致。此漏洞可能允许攻击者将恶意软件加载到受影响的设备上。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the ROMMON of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to those of the root user of the underlying operating system. The vulnerability is due to the ROMMON allowing for special parameters to be passed to the device at initial boot up. An attacker could exploit this vulnerability by sending parameters to the device at initial boot up. An exploit could allow the attacker to elevate from a Priv15 user to the root user and execute arbitrary commands with the privileges of the root user.

Cisco IOS XE软件ROMMON中的漏洞可能允许经过身份验证的本地攻击者将特权提升到基础操作系统的根用户的特权。该漏洞是由于ROMMON允许在初次启动时将特殊参数传递给设备的缘故。攻击者可以通过在初次启动时向设备发送参数来利用此漏洞。漏洞利用可能使攻击者从Priv15用户提升为root用户,并以root用户的特权执行任意命令。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected device. The vulnerability is due to improper input sanitization. An attacker could exploit this vulnerability by uploading a crafted file to the web UI of an affected device. A successful exploit could allow the attacker to inject and execute arbitrary commands with root privileges on the device.

Cisco IOS XE软件的Web UI中的漏洞可能允许经过身份验证的远程攻击者在受影响的设备的基础操作系统上以root特权执行任意命令。该漏洞是由于不正确的输入清理造成的。攻击者可以通过将精心制作的文件上传到受影响设备的Web UI来利用此漏洞。成功的利用可能使攻击者能够在设备上以root特权注入并执行任意命令。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected device. The vulnerability is due to improper input sanitization. An attacker who has valid administrative access to an affected device could exploit this vulnerability by supplying a crafted input parameter on a form in the web UI and then submitting that form. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the device, which could lead to complete system compromise.

Cisco IOS XE软件的Web UI中的漏洞可能允许经过身份验证的远程攻击者在受影响的设备的基础操作系统上以root特权执行任意命令。该漏洞是由于不正确的输入清理造成的。具有对受影响设备的有效管理访问权限的攻击者可以通过在Web UI的表单上提供精心设计的输入参数,然后提交该表单来利用此漏洞。成功的利用可能使攻击者能够在设备上以root用户特权执行任意命令,这可能导致完全的系统破坏。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the CLI parsers of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated, local attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The attacker must have valid user credentials at privilege level 15. The vulnerability is due to insufficient validation of arguments that are passed to specific VDS-related CLI commands. An attacker could exploit this vulnerability by authenticating to the targeted device and including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user.

适用于Cisco 809和829工业集成多业务路由器(工业ISR)和Cisco 1000系列互联网格路由器(CGR1000)的Cisco IOS软件的CLI解析器中的漏洞可能允许经过身份验证的本地攻击者在虚拟设备服务器上执行任意shell命令(VDS)的受影响的设备。攻击者必须具有特权级别15的有效用户凭据。该漏洞是由于传递给特定V
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in software image verification in Cisco IOS XE Software could allow an unauthenticated, physical attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability is due to an improper check on the area of code that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device.

Cisco IOS XE软件中的软件映像验证中的漏洞可能允许未经身份验证的物理攻击者在受影响的设备上安装和引导恶意软件映像或执行未签名的二进制文件。该漏洞是由于在初始引导过程中对用于管理系统映像文件的数字签名验证的代码区域检查不当造成的。攻击者可以通过在受影响的设备上加载未签名的软件来利用此漏洞。成功的利用可能使攻击者能够在目标设备上安装和引导恶意软件映像或执行未签名的二进制文件。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the image verification feature of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) could allow an authenticated, local attacker to boot a malicious software image on an affected device. The vulnerability is due to insufficient access restrictions on the area of code that manages the image verification feature. An attacker could exploit this vulnerability by first authenticating to the targeted device and then logging in to the Virtual Device Server (VDS) of an affected device. The attacker could then, from the VDS shell, disable Cisco IOS Software integrity (image) verification. A successful exploit could allow the attacker to boot a malicious Cisco IOS Software image on the targeted device. To exploit this vulnerability, the attacker must have valid user credentials at privilege level 15.

用于Cisco 809和829工业集成多业务路由器(工业ISR)的Cisco IOS软件的图像验证功能中的漏洞可能允许经过身份验证的本地攻击者在受影响的设备上启动恶意软件图像。该漏洞是由于对管理图像验证功能的代码区域的访问限制不足所致。攻击者可以通过首先
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the processing of boot options of specific Cisco IOS XE Software switches could allow an authenticated, local attacker with root shell access to the underlying operating system (OS) to conduct a command injection attack during device boot. This vulnerability is due to insufficient input validation checks while processing boot options. An attacker could exploit this vulnerability by modifying device boot options to execute attacker-provided code. A successful exploit may allow an attacker to bypass the Secure Boot process and execute malicious code on an affected device with root-level privileges.

特定Cisco IOS XE软件交换机的引导选项处理中的漏洞可能允许经过身份验证的本地攻击者使用root shell访问底层操作系统(OS),从而在设备引导期间进行命令注入攻击。此漏洞是由于在处理启动选项时输入验证检查不充分所致。攻击者可以通过修改设备启动选项来执行攻击者提供的代码来利用此漏洞。成功利用此漏洞可能允许攻击者绕过安全启动过程,并以root级特权在受影响的设备上执行恶意代码。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the handling of IEEE 802.11w Protected Management Frames (PMFs) of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device. The vulnerability exists because the affected software does not properly validate 802.11w disassociation and deauthentication PMFs that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PMF from a valid, authenticated client on a network adjacent to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device.

运行Cisco IOS XE软件的Cisco Catalyst 9800系列无线控制器的IEEE 802.11w保护的管理帧(PMF)处理中的漏洞可能允许未经身份验证的相邻攻击者终止与受影响设备的有效用户连接。存在此漏洞是因为受影响的软件无法正确验证其收到的802.11w取消关联和取消身份验证PMF。攻击者可以通过从与受影响的设备相邻的网络上的有效的经过身份验证的客户端发送欺骗的802.11w PMF来利用此漏洞。成功利用此漏洞可能使攻击者终止与受影响设备的单个有效用户连接。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. For more information about this vulnerability, see the Details section of this advisory.

用于Cisco 809和829工业集成多业务路由器
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to cause memory corruption or execute the code with root privileges on the underlying OS of the affected device.

Cisco IOS软件和Cisco IOS XE软件的工具命令语言(Tcl)解释器中的漏洞可能允许具有特权EXEC凭据的经过身份验证的本地攻击者在具有根特权的基础操作系统(OS)上执行任意代码。该漏洞是由于传递给Tcl解释器的数据的输入验证不足所致。攻击者可以通过在受影响的设备上加载恶意的Tcl代码来利用此漏洞。成功的利用可能使攻击者导致内存损坏或在受影响的设备的基础OS上以root特权执行代码。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the locally significant certificate (LSC) provisioning feature of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak that could lead to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain public key infrastructure (PKI) packets. An attacker could exploit this vulnerability by sending crafted Secure Sockets Layer (SSL) packets to an affected device. A successful exploit could cause an affected device to continuously consume memory, which could result in a memory allocation failure that leads to a crash and causes a DoS condition.

运行Cisco IOS XE软件的Cisco Catalyst 9800系列无线控制器的本地重要证书(LSC)设置功能中的漏洞可能允许未经身份验证的远程攻击者导致内存泄漏,从而可能导致拒绝服务(DoS)状态。该漏洞是由于某些公钥基础结构(PKI)数据包的不正确处理引起的。攻击者可以通过将精心制作的安全套接字层(SSL)数据包发送到受影响的设备来利用此漏洞。成功的利用可能导致受影响的设备连续消耗内存,这可能导致内存分配失败,从而导致崩溃并导致DoS条件。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Cisco IOS软件和Cisco IOS XE软件的工具命令语言(Tcl)解释程序中的漏洞可能允许具有特权EXEC凭据的经过身份验证的本地攻击者在受影响的系统上引起拒绝服务(DoS)条件。该漏洞是由于传递给Tcl解释器的数据的输入验证不足所致。攻击者可以通过在受影响的设备上执行精心设计的Tcl参数来利用此漏洞。利用漏洞可以使攻击者重新加载受影响的设备,从而导致DoS状态。
2020年6月4日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
A vulnerability in the Secure Shell (SSH) server code of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. The vulnerability is due to an internal state not being represented correctly in the SSH state machine, which leads to an unexpected behavior. An attacker could exploit this vulnerability by creating an SSH connection to an affected device and using a specific traffic pattern that causes an error condition within that connection. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.

Cisco IOS软件和Cisco IOS XE软件的Secure Shell(SSH)服务器代码中的漏洞可能允许经过身份验证的远程攻击者重新加载受影响的设备。该漏洞是由于内部状态未在SSH状态机中正确表示而导致的,从而导致意外行为。攻击者可以通过建立到受影响设备的SSH连接并使用导致该连接内出现错误情况的特定流量模式来利用此漏洞。成功利用该漏洞可能使攻击者重新加载设备,从而导致拒绝服务(DoS)状态。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) that are running Cisco IOS Software could allow an attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

运行Cisco IOS软件的Cisco 809和829工业集成多业务路由器(工业ISR)和Cisco 1000系列互联网格路由器(CGR1000)的Cisco IOx应用环境中的多个漏洞可能允许攻击者造成拒绝服务(DoS)条件或在受影响的设备上以提升的特权执行任意代码。有关这些漏洞的更多信息,请参见本通报的“详细信息”部分。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Cisco IOS
Multiple vulnerabilities in Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, remote attacker or an authenticated, local attacker to execute arbitrary code on an affected system or cause an affected system to crash and reload. For more information about these vulnerabilities, see the Details section of this advisory.

针对Cisco 809和829工业集成多业务路由器(工业ISR)和Cisco 1000系列互联网格路由器(CGR1000)的Cisco IOS软件中的多个漏洞可能允许未经身份验证的远程攻击者或经过身份验证的本地攻击者在受影响的系统上执行任意代码或导致受影响的系统崩溃并重新加载。有关这些漏洞的更多信息,请参见本通报的“详细信息”部分。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Play Framework Plugin 1.0.2 and earlier lets users specify the path to the `play` command on the Jenkins master for a form validation endpoint, resulting in an OS command injection vulnerability exploitable by users able to store such a file on the Jenkins master.

Jenkins Play Framework Plugin 1.0.2和更早版本允许用户在Jenkins master上为表单验证端点指定“ play”命令的路径,从而导致OS命令注入漏洞,用户可以利用该命令将漏洞存储在Jenkins master上。 。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation, resulting in a reflected cross-site scripting vulnerability.

Jenkins Subversion部分发布管理器插件1.0.1和更早版本无法转义存储库URL字段表单验证的错误消息,从而导致反映出跨站点脚本漏洞。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not redact encrypted secrets in the 'getConfigAsXML' API URL when transmitting job config.xml data to users without Job/Configure.

当将Job config.xml数据传输给没有Job / Configure的用户时,Jenkins Project继承插件19.08.02及更早版本不会在'getConfigAsXML'API URL中编辑加密的机密。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Project Inheritance Plugin 19.08.02 and earlier does not require users to have Job/ExtendedRead permission to access Inheritance Project job configurations in XML format.

Jenkins项目继承插件19.08.02及更早版本不需要用户具有Job / ExtendedRead权限来访问XML格式的继承项目任务配置。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints, allowing attackers to perform all administrative actions provided by the plugin.

Jenkins Selenium插件3.141.59及其更早版本对其HTTP端点没有CSRF保护,从而使攻击者能够执行该插件提供的所有管理操作。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Compact Columns Plugin 1.11 and earlier displays the unprocessed job description in tooltips, resulting in a stored cross-site scripting vulnerability that can be exploited by users with Job/Configure permission.

Jenkins Compact Columns插件1.11和更早版本在工具提示中显示未处理的作业描述,从而导致存储的跨站点脚本漏洞,具有作业/配置权限的用户可以利用此漏洞。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the display name of the builds in the trend chart, resulting in a stored cross-site scripting vulnerability.

Jenkins ECharts API插件4.7.0-3和更早的版本无法在趋势图中转义版本的显示名称,从而导致存储跨站点脚本漏洞。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins ECharts API Plugin 4.7.0-3 and earlier does not escape the parser identifier when rendering charts, resulting in a stored cross-site scripting vulnerability.

呈现图表时,Jenkins ECharts API插件4.7.0-3及更早版本不会逃逸解析器标识符,从而导致存储跨站点脚本漏洞。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
A cross-site request forgery vulnerability in Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier allows attackers to add or remove agent labels.

Jenkins自组织群集插件模块插件3.20和更早版本中的跨站点请求伪造漏洞允许攻击者添加或删除代理标签。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Self-Organizing Swarm Plug-in Modules Plugin 3.20 and earlier does not check permissions on API endpoints that allow adding and removing agent labels.

Jenkins自组织Swarm插件模块插件3.20和更早版本不检查允许添加和删除代理标签的API端点的权限。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jenkins
Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.

Jenkins脚本安全插件1.72和更早版本无法在进程内脚本批准页面上正确转义未决或已批准的类路径条目,从而导致存储的跨站点脚本漏洞。
2020年6月4日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache
Apache Ignite uses H2 database to build SQL distributed execution engine. H2 provides SQL functions which could be used by attacker to access to a filesystem.

Apache Ignite使用H2数据库来构建SQL分布式执行引擎。 H2提供了SQL函数,攻击者可以使用这些SQL函数来访问文件系统。
2020年6月4日 17:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Django
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.

在Django 2.2之前的2.2.13和3.0之前的3.0中发现了一个问题。 Django管理员ForeignKeyRawIdWidget生成的查询参数未正确进行URL编码,从而可能导致XSS攻击。
2020年6月4日 17:05知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Django
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.

在Django 2.2之前的2.2.13和3.0之前的3.0中发现了一个问题。如果Memcached后端不执行密钥验证,则传递格式错误的缓存密钥可能会导致密钥冲突以及潜在的数据泄漏。
2020年6月3日 17:17知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Docker
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.

在19.03.11之前的Docker Engine中发现了一个问题。具有CAP_NET_RAW功能的容器中的攻击者可以制作IPv6路由器通告,从而欺骗外部IPv6主机,获取敏感信息或导致拒绝服务。
2020年6月3日 17:16知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.

在5.0.6之前的Linux内核中发现了一个问题。在net / core / net-sysfs.c中的rx_queue_add_kobject()和netdev_queue_add_kobject()中,引用计数处理不正确,也就是CID-a3e23f719f5c。
2020年6月3日 17:16知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:F5
go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.

5.6之前的Linux内核中drivers / media / usb / go7007 / snd-go7007.c中的go7007_snd_init不会为故障路径调用snd_card_free,这会导致内存泄漏,也称为CID-9453264ef586。
2020年6月2日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:SVN
Lexiglot through 2014-11-20 allows SSRF via the admin.php?page=projects svn_url parameter.

Lexiglot在2014年11月20日之前允许通过admin.php?page = projects svn_url参数进行SSRF。
2020年6月2日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:SVN
Lexiglot through 2014-11-20 allows denial of service because api/update.php launches svn update operations that use a great deal of resources.

Lexiglot直到2014-11-20都允许拒绝服务,因为api / update.php启动了使用大量资源的svn更新操作。
2020年6月1日 17:22知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jira
有新的漏洞组件被发现啦,组件ID:Atlassian Jira
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.

受影响的版本包括:Atlassian Jira Server and Data Center的8.5.5之前和8.8.1之前的8.6.0允许远程攻击者通过XML导出视图中的跨站点脚本(XSS)漏洞注入任意HTML或JavaScript。
2020年6月1日 17:21知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jira
The /rest/jira-ril/1.0/jira-rest/applinks resource in the crucible-jira-ril plugin in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to get information about any configured Jira application links via an information disclosure vulnerability.

Atlassian Fisheye and Crucible中的crucible-jira-ril插件中的/rest/jira-ril/1.0/jira-rest/applinks资源在4.8.1版之前允许远程攻击者通过信息泄漏获取有关任何已配置的Jira应用程序链接的信息脆弱性。
2020年6月1日 17:21知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Jira
The /plugins/servlet/jira-blockers/ resource in the crucible-jira-ril plugin in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to get the ID of configured Jira application links via an information disclosure vulnerability.

版本4.8.1之前的Atlassian Fisheye and Crucible中crucible-jira-ril插件中的/ plugins / servlet / jira-blockers /资源允许远程攻击者通过信息泄露漏洞获取已配置的Jira应用程序链接的ID。
2020年5月29日 17:03知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Drupal
An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.

启用Drupal 8核心中的实验性Workspaces模块时,存在一个访问绕过漏洞。可以通过禁用工作区模块来缓解这种情况。它不影响Drupal 8.7.4以外的任何版本。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1104, CVE-2020-1105.

如果Microsoft SharePoint Server无法正确清除对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft SharePoint Spoofing漏洞”),则存在一个欺骗漏洞。此CVE ID在CVE-2020-1104,CVE-2020-1105中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1099, CVE-2020-1100, CVE-2020-1101.

如果Microsoft SharePoint Server无法正确清理对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft Office SharePoint XSS漏洞”),则存在跨站点脚本(XSS)漏洞。此CVE ID在CVE-2020-1099,CVE-2020-1100,CVE-2020-1101中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1104, CVE-2020-1107.

如果Microsoft SharePoint Server无法正确清除对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft SharePoint Spoofing漏洞”),则存在一个欺骗漏洞。此CVE ID在CVE-2020-1104,CVE-2020-1107中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Spoofing Vulnerability'. This CVE ID is unique from CVE-2020-1105, CVE-2020-1107.

如果Microsoft SharePoint Server无法正确清除对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft SharePoint Spoofing漏洞”),则存在一个欺骗漏洞。此CVE ID在CVE-2020-1105,CVE-2020-1107中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).When users are simultaneously logged in to Microsoft SharePoint Server and visit a malicious web page, the attacker can, through standard browser functionality, induce the browser to invoke search queries as the logged in user, aka 'Microsoft SharePoint Information Disclosure Vulnerability'.

当用户同时登录Microsoft SharePoint Server并访问Microsoft SharePoint Server中的某些功能时,Microsoft SharePoint Server中的某些搜索功能模式容易受到跨站点搜索攻击(跨站点请求伪造的一种形式,CSRF)时,存在一个信息泄露漏洞。恶意网页,攻击者可以通过标准浏览器功能,诱使浏览器以登录用户的身份(即“ Microsoft SharePoint信息泄露漏洞”)来调用搜索查询。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1024.

当软件无法检查应用程序包的源标记,即“ Microsoft SharePoint远程执行代码漏洞”时,Microsoft SharePoint中存在一个远程执行代码漏洞。此CVE ID在CVE-2020-1023,CVE-2020-1024中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1099, CVE-2020-1100, CVE-2020-1106.

如果Microsoft SharePoint Server无法正确清理对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft Office SharePoint XSS漏洞”),则存在跨站点脚本(XSS)漏洞。此CVE ID在CVE-2020-1099,CVE-2020-1100,CVE-2020-1106中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1099, CVE-2020-1101, CVE-2020-1106.

如果Microsoft SharePoint Server无法正确清理对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft Office SharePoint XSS漏洞”),则存在跨站点脚本(XSS)漏洞。此CVE ID在CVE-2020-1099,CVE-2020-1101,CVE-2020-1106中是唯一的。
2020年5月22日 17:09知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1100, CVE-2020-1101, CVE-2020-1106.

如果Microsoft SharePoint Server无法正确清理对受影响的SharePoint服务器的特制Web请求(也称为“ Microsoft Office SharePoint XSS漏洞”),则存在跨站点脚本(XSS)漏洞。此CVE ID在CVE-2020-1100,CVE-2020-1101,CVE-2020-1106中是唯一的。
2020年5月22日 17:07知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls, aka 'Microsoft SharePoint Server Remote Code Execution Vulnerability'.

当Microsoft SharePoint Server无法正确识别和过滤不安全的ASP.Net Web控件(也称为“ Microsoft SharePoint Server远程执行代码漏洞”)时,存在一个远程执行代码漏洞。
2020年5月22日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1102.

当软件无法检查应用程序包的源标记,即“ Microsoft SharePoint远程执行代码漏洞”时,Microsoft SharePoint中存在一个远程执行代码漏洞。此CVE ID在CVE-2020-1023,CVE-2020-1102中是唯一的。
2020年5月22日 17:06知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Microsoft SharePoint
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1024, CVE-2020-1102.

当软件无法检查应用程序包的源标记,即“ Microsoft SharePoint远程执行代码漏洞”时,Microsoft SharePoint中存在一个远程执行代码漏洞。此CVE ID在CVE-2020-1024,CVE-2020-1102中是唯一的。
2020年5月21日 17:13知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:Apache Tomcat
有新的漏洞组件被发现啦,组件ID:Apache
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.

如果使用Apache Tomcat版本10.0.0-M1至10.0.0-M4、9.0.0.0.M1至9.0.34、8.5.0至8.5.54和7.0.0至7.0.103(a)攻击者能够控制
2020年5月15日 17:17知名组件CVE监控
有新的漏洞组件被发现啦,组件ID:IBM WebSphere
IBM WebSphere Application Server 8.5 is vulnerable to server-side request forgery. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive data. IBM X-Force ID: 178964.

IBM WebSphere Application Server 8.5容易受到服务器端请求伪造的攻击。通过发送特制请求,经过身份验证的远程攻击者可以利用此漏洞来获取敏感数据。 IBM X-Force ID:178964。