序號 |
漏洞名 |
公佈時間 |
發現團隊 |
CVE編號 |
參考鏈接 |
致謝截圖 |
272 |
RedHat Open vSwitch |
2022-12-20 |
奇安信代碼安全實驗室 |
CVE-2022-4338 |
https://access.redhat.com/security/cve/CVE-2022-4338 |
![](https://shs3.b.qianxin.com/qax/285e74122166a5816b3b701c9c3965fb.png) |
271 |
RedHat Open vSwitch |
2022-12-20 |
奇安信代碼安全實驗室 |
CVE-2022-4337 |
https://access.redhat.com/security/cve/CVE-2022-4337 |
![](https://shs3.b.qianxin.com/qax/285e74122166a5816b3b701c9c3965fb.png) |
270 |
Windows Graphics Component |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-4107 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41074 |
![](https://shs3.b.qianxin.com/qax/597fb087eb183d90d05b75f2d6e7bde9.png) |
269 |
Windows 打印機 |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44678 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44678 |
![](https://shs3.b.qianxin.com/qax/ad8b9ed47b099d4007f5aabe8ad6e1f9.png) |
268 |
Windows Graphics Component |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44679 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679 |
![](https://shs3.b.qianxin.com/qax/ddd748546ec5b09a4f2efef1a5a142d2.png) |
267 |
Windows Graphics Component |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44680 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44680 |
![](https://shs3.b.qianxin.com/qax/228d6cc3107cb0686ffffe0335cf2f9b.png) |
266 |
Windows 打印機 |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44681 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681 |
![](https://shs3.b.qianxin.com/qax/e5fe51315565cf93d6caec1e1d10ec4d.png) |
265 |
Cisco IP 電話7800 和 8800 系列 Cisco Discovery Protocol 棧溢出 |
2022-12-09 |
奇安信代碼安全實驗室 |
CVE-2022-20968 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U |
![](https://shs3.b.qianxin.com/qax/492b4bbd10c1845636d4dde80f780f6d.png) |
264 |
Mikrotik RouterOS 的snmp進程中存在界外讀漏洞 |
2022-12-09 |
奇安信代碼安全實驗室 |
CVE-2022-45315 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45315 |
![](https://shs3.b.qianxin.com/qax/d47ba9ed07b167eee8455ec412a116fb.png) |
263 |
Mikrotik RouterOS 的hotspot進程中存在界外讀漏洞 |
2022-12-09 |
奇安信代碼安全實驗室 |
CVE-2022-45313 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45313 |
![](https://shs3.b.qianxin.com/qax/d47ba9ed07b167eee8455ec412a116fb.png) |
262 |
紅帽QEMU VNC服務整數下溢 |
2022-09-26 |
奇安信威脅情報中心 |
CVE-2022-3165 |
https://access.redhat.com/security/cve/cve-2022-3165 |
![](https://shs3.b.qianxin.com/qax/797febcfb173f8dfc745a1296e361340.png) |
261 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-43749 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_19 |
![](https://shs3.b.qianxin.com/qax/7c6068226fdda44dc1be36faf4d69277.png) |
260 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-43748 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_19 |
![](https://shs3.b.qianxin.com/qax/7c6068226fdda44dc1be36faf4d69277.png) |
259 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-27623 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_18 |
![](https://shs3.b.qianxin.com/qax/7c6068226fdda44dc1be36faf4d69277.png) |
258 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-27622 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_18 |
![](https://shs3.b.qianxin.com/qax/7c6068226fdda44dc1be36faf4d69277.png) |
257 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20766 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
256 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20691 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
255 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20690 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
254 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20689 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
253 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20688 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
252 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20687 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
251 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20686 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
250 |
微軟 |
2022-10-12 |
奇安信代碼安全實驗室 |
CVE-2022-33645 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645 |
![](https://shs3.b.qianxin.com/qax/ca1c00bbe55859cf117f54acf7e0eef9.png) |
249 |
思科 |
2022-09-23 |
奇安信代碼安全實驗室 |
CVE-2022-20846 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2 |
![](https://shs3.b.qianxin.com/qax/998ac6a0d5f6d300661157cbea66a63a.png) |
248 |
微軟 |
2022-09-14 |
奇安信代碼安全實驗室 |
CVE-2022-34718 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34718 |
![](https://shs3.b.qianxin.com/qax/65070c5b97239b456977a7e0164cec2c.png) |
247 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38254 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
246 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38253 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
245 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38252 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
244 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38251 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
243 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38250 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
242 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38249 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
241 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38248 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
240 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38247 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
![](https://shs3.b.qianxin.com/qax/94d4182009486b35d62ccd5a6a773458.png) |
239 |
xiunobbs |
2022-07-13 |
奇安信代碼安全實驗室 |
CVE-2020-19914 |
https://kevinoclam.github.io/blog/2019/07/31/xiunobbs-upload/ |
![](https://shs3.b.qianxin.com/qax/117c2467c07a53083b3c50edba0e46e2.jpg) |
238 |
微軟 |
2022-07-13 |
奇安信代碼安全實驗室 |
CVE-2022-22042 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22042 |
![](https://shs3.b.qianxin.com/qax/2d7b30355e7879a2231a3ebfdd6cdc37.png) |
237 |
微軟 |
2022-07-13 |
奇安信代碼安全實驗室 |
CVE-2022-30223 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30223 |
![](https://shs3.b.qianxin.com/qax/2d7b30355e7879a2231a3ebfdd6cdc37.png) |
236 |
微軟 |
2022-05-10 |
奇安信代碼安全實驗室 |
CVE-2022-23270 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23270 |
![](https://shs3.b.qianxin.com/qax/8918ff713a5069ee1c5f76f3a1cb63e7.png) |
235 |
谷歌Chrome |
2022-04-28 |
奇安信代碼安全實驗室 |
CVE-2022-1496 |
https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html |
![](https://shs3.b.qianxin.com/qax/3b898851d2f4a9afe178589150c20105.png) |
234 |
Oracle WebLogic Server |
2022-04-21 |
奇安信代碼安全實驗室 |
CVE-2022-21453 |
https://www.oracle.com/security-alerts/cpuapr2022.html |
![](https://shs3.b.qianxin.com/qax/612d0f4dc8b6dc09fca469ff31425a2e.png) |
233 |
Windows iSCSI Target Service信息泄露 |
2022-04-13 |
奇安信代碼安全實驗室 |
CVE-2022-24498 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24498 |
![](https://shs3.b.qianxin.com/qax/784f575905b28b331268af75d7f7b716.png) |
232 |
Windows Network File System遠程代碼執行 |
2022-04-13 |
奇安信代碼安全實驗室 |
CVE-2022-24491 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24491 |
![](https://shs3.b.qianxin.com/qax/784f575905b28b331268af75d7f7b716.png) |
231 |
惠普企業HPE FlexNetwork 5130 EI 交換機系列本地緩衝溢出 |
2022-01-29 |
奇安信代碼安全實驗室 |
CVE-2021-29219 |
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbnw04234en_us |
![](https://shs3.b.qianxin.com/qax/ed6ac2900e0166527dbfff62f1475d74.jpg) |
230 |
ImageMagick 堆緩衝區溢出讀漏洞 |
2022-02-01 |
奇安信代碼安全實驗室 |
CVE-2022-0284 |
https://access.redhat.com/security/cve/CVE-2022-0284 |
![](https://shs3.b.qianxin.com/qax/be5962c27c3b355ae8123efb01944746.png) |
229 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39849 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
![](https://shs3.b.qianxin.com/qax/c0ecd0f61f69054a4b97eedad169045e.png) |
228 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39850 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
![](https://shs3.b.qianxin.com/qax/c0ecd0f61f69054a4b97eedad169045e.png) |
227 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39851 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
![](https://shs3.b.qianxin.com/qax/c0ecd0f61f69054a4b97eedad169045e.png) |
226 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39852 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
![](https://shs3.b.qianxin.com/qax/c0ecd0f61f69054a4b97eedad169045e.png) |
225 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39853 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
![](https://shs3.b.qianxin.com/qax/c0ecd0f61f69054a4b97eedad169045e.png) |
224 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39854 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
![](https://shs3.b.qianxin.com/qax/c0ecd0f61f69054a4b97eedad169045e.png) |
223 |
微軟Microsoft Message Queuing 信息泄露漏洞 |
2021-12-01 |
奇安信代碼安全實驗室 |
CVE-2021-43222 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43222 |
![](https://shs3.b.qianxin.com/qax/d4260eb9792d8714938c5e9043c39cb0.png) |
222 |
微軟Microsoft Message Queuing 信息泄露漏洞 |
2021-12-01 |
奇安信代碼安全實驗室 |
CVE-2021-43236 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43236 |
![](https://shs3.b.qianxin.com/qax/d4260eb9792d8714938c5e9043c39cb0.png) |
221 |
微軟iSNS 服務器內存損壞漏洞可導致RCE |
2021-12-01 |
奇安信代碼安全實驗室 |
CVE-2021-43215 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43215 |
![](https://shs3.b.qianxin.com/qax/d4260eb9792d8714938c5e9043c39cb0.png) |
220 |
聯想手機:LEN-65134 Legion Phone Pro 和 Legion Phone2 Pro 信息泄露漏洞 |
2021-10-03 |
研究院 |
CVE-2021-3720 |
https://iknow.lenovo.com.cn/detail/dc_199217.html |
![](https://shs3.b.qianxin.com/qax/fb3b0fa7b611b071efea2fd8ce333f8b.png) |
219 |
中興通訊一款手機的消息服務應用存在信息泄露漏洞 |
2021-09-24 |
研究院 |
CVE-2021-21742 |
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1019064 |
![](https://shs3.b.qianxin.com/qax/957001bab814169c91e815320e257586.png) |
218 |
天氣模塊中的信息泄露漏洞 |
2021-07-19 |
研究院 |
CVE-2021-26279 |
https://www.vivo.com/en/support/security-advisory-detail?id=10 |
![](https://shs3.b.qianxin.com/qax/45a1d0049f86c628ed83c16e9e913475.png) |
217 |
鬧鐘模塊中的信息泄露 |
2021-07-19 |
研究院 |
CVE-2021-26281 |
https://www.vivo.com/en/support/security-advisory-detail?id=9 |
![](https://shs3.b.qianxin.com/qax/0f00fb63d45281de6e0d206072cba812.png) |
216 |
華為手機中的非標準化字段名稱 |
2021-09-01 |
研究院 |
CVE-2021-22486 |
https://consumer.huawei.com/gh/support/bulletin/2021/9/ https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 |
![](https://shs3.b.qianxin.com/qax/493efd4b2e3fa66506326d23c4bbf464.png) |
215 |
D-Link formWlanSetup 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33274 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33274 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln07 |
![](https://shs3.b.qianxin.com/qax/18ba4f478f687b424d7bb6bcd8d0216f.png) |
214 |
D-Link formSetPortTr 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33271 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33271 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln11 |
![](https://shs3.b.qianxin.com/qax/e60774a4812a19e5738d4dbf2d3f2eb9.png) |
213 |
D-Link formAdvFirewall 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33270 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33270 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln06 |
![](https://shs3.b.qianxin.com/qax/0558425a6bee597f1c7f45e637b260ff.png) |
212 |
D-Link formVirtualServ 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33269 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33269 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln01 |
![](https://shs3.b.qianxin.com/qax/e094c035435c2ee89e6a814cd7c6d3b6.png) |
211 |
D-Link fromLogin 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33268 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33268 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln03 |
![](https://shs3.b.qianxin.com/qax/ae0442684d9dee76a7bd12db93bdc202.png) |
210 |
D-Link formStaticDHCP 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33267 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33267 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln02 |
![](https://shs3.b.qianxin.com/qax/f2555b21b142316986cac6192289c7c8.png) |
209 |
D-Link formVirtualApp 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33266 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33266 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln04 |
![](https://shs3.b.qianxin.com/qax/b2f4ef0b6aa0b6729388a5b8c81b7ddb.png) |
208 |
D-Link formSetPortTr 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33265 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33265 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln05 |
![](https://shs3.b.qianxin.com/qax/8e6e5a69ff2601b8833481ddc1e44527.png) |
207 |
思科220系列小型交換機LLDP協議拒絕服務 |
2021-10-17 |
奇安信代碼安全實驗室 |
CVE-2021-34780 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
![](https://shs3.b.qianxin.com/qax/2f06bbbb04620f967381bc7b7d8dcc1e.png) |
206 |
思科220系列小型交換機LLDP協議拒絕服務 |
2021-10-07 |
奇安信代碼安全實驗室 |
CVE-2021-34779 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
![](https://shs3.b.qianxin.com/qax/2f06bbbb04620f967381bc7b7d8dcc1e.png) |
205 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-02 |
奇安信代碼安全實驗室 |
CVE-2021-34778 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
![](https://shs3.b.qianxin.com/qax/2f06bbbb04620f967381bc7b7d8dcc1e.png) |
204 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-02 |
奇安信代碼安全實驗室 |
CVE-2021-34777 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
![](https://shs3.b.qianxin.com/qax/2f06bbbb04620f967381bc7b7d8dcc1e.png) |
203 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-02 |
奇安信代碼安全實驗室 |
CVE-2021-34776 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
![](https://shs3.b.qianxin.com/qax/2f06bbbb04620f967381bc7b7d8dcc1e.png) |
202 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-01 |
奇安信代碼安全實驗室 |
CVE-2021-34775 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
![](https://shs3.b.qianxin.com/qax/2f06bbbb04620f967381bc7b7d8dcc1e.png) |
201 |
谷歌 Chrome Incognito 中的釋放後使用漏洞 |
2021-10-19 |
奇安信代碼安全實驗室 |
CVE-2021-37982 |
https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html |
![](https://shs3.b.qianxin.com/qax/5d22b37e5ebe754a9f04f8d0136b4302.png) |
200 |
Foxit PDF Reader Annotation 釋放後使用信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34972 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1203/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
199 |
Foxit PDF Reader Annotation 釋放後使用信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34969 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1200/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
198 |
Foxit PDF Reader Annotation 使用未初始化變量信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34953 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1184/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
197 |
Foxit PDF Reader Annotation 釋放後使用遠程代碼執行漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34952 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1183/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
196 |
Foxit PDF Reader Annotation 使用未初始化變量信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34951 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1182/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
195 |
Foxit PDF Reader Square Annotation 界外讀遠程代碼執行漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34950 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1181/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
194 |
Foxit PDF Reader Annotation界外讀信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34949 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1180/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
193 |
Foxit PDF Reader Square Annotation 釋放後使用遠程代碼執行漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34948 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1179/ |
![](https://shs3.b.qianxin.com/qax/ecdaed669f3aeb70c61b009b5e5e37ab.png) |
192 |
Windows Print Spooler 信息泄露漏洞 |
2021-10-01 |
奇安信代碼安全實驗室 |
CVE-2021-41332 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41332 |
![](https://shs3.b.qianxin.com/qax/d055d8afec6435dc207a5ae65cd72458.png) |
191 |
谷歌Chrome Safe Browsing 中的釋放後使用漏洞 |
2021-09-01 |
奇安信代碼安全實驗室 |
CVE-2021-37974 |
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html |
![](https://shs3.b.qianxin.com/qax/403e89405868966c583341d3fe9a4129.png) |
190 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 空解指針解引用漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-22792 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
![](https://shs3.b.qianxin.com/qax/ff14a0e62818dfd42703bdd4f902d30a.png) |
189 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 界外寫漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-22791 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
![](https://shs3.b.qianxin.com/qax/ff14a0e62818dfd42703bdd4f902d30a.png) |
188 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 界外讀漏洞 |
2021-08-19 |
奇安信代碼安全實驗室 |
CVE-2021-22790 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
![](https://shs3.b.qianxin.com/qax/ff14a0e62818dfd42703bdd4f902d30a.png) |
187 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 內存緩衝區邊界內操作限制不當 |
2021-08-19 |
奇安信代碼安全實驗室 |
CVE-2021-22789 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
![](https://shs3.b.qianxin.com/qax/ff14a0e62818dfd42703bdd4f902d30a.png) |
186 |
西門子 Siemens JT2Go and Teamcenter Visualization 13.2.0.0及之前版本中存在CGM 文件空指針解引用漏洞 |
2021-08-19 |
奇安信代碼安全實驗室 |
CVE-2021-33717 |
https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf |
![](https://shs3.b.qianxin.com/qax/acb45ac1610d6f7d63b6a970028de16f.png) |
185 |
施耐德電氣EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340憑據保護不充分 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-22781 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01 |
![](https://shs3.b.qianxin.com/qax/d9141ca37214383dc988f8bc18f28ae5.png) |
184 |
SAP 3D 可視化企業視圖版本9.1中的輸入驗證不當問題 |
2021-06-30 |
奇安信代碼安全實驗室 |
CVE-2021-33680 |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=451071888 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 |
![](https://shs3.b.qianxin.com/qax/5f25e9b1ea011cf9f9e7f5e6929034dd.png) |
183 |
SAP 3D 可視化企業視圖版本9.0中的輸入驗證不當問題 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-33681 |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=451071888 |
![](https://shs3.b.qianxin.com/qax/5f25e9b1ea011cf9f9e7f5e6929034dd.png) |
182 |
思科視頻監控7003系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1598 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
![](https://shs3.b.qianxin.com/qax/3a88eed9b1312e3c064a2ffaeb64b1b4.png) |
181 |
思科視頻監控7001系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1597 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
![](https://shs3.b.qianxin.com/qax/3a88eed9b1312e3c064a2ffaeb64b1b4.png) |
180 |
思科視頻監控7001系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1596 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
![](https://shs3.b.qianxin.com/qax/3a88eed9b1312e3c064a2ffaeb64b1b4.png) |
179 |
思科視頻監控7000系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1595 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
![](https://shs3.b.qianxin.com/qax/3a88eed9b1312e3c064a2ffaeb64b1b4.png) |
178 |
思科視頻監控7000系列 IP 攝像頭固件LLDP實現中的雙重釋放拒絕服務漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-34734 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-dos-OFP7j9j |
![](https://shs3.b.qianxin.com/qax/7168e743216d7fd510aa4b60d80d6f7d.png) |
177 |
Aruba Instant 訪問點中的未認證拒絕服務漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-34618 |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt |
![](https://shs3.b.qianxin.com/qax/0c6217158f10b1196d484ed70a5a42ee.png) |
176 |
Juniper Networks Junos OS and Junos OS Evolved 的l2cpd中存在界外讀漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-0277 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11181&cat=SIRT_1&actp=LIST |
![](https://shs3.b.qianxin.com/qax/f410526e7bc83a6a4ca650363071eaae.png) |
175 |
SonicWall 交換機中的界外讀漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-20024 |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0011 |
![](https://shs3.b.qianxin.com/qax/836b05e1782561e739c6ee4b7ad19ae0.png) |
174 |
QNAP某些交換機中存在界外讀漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-20024 |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0011 |
![](https://shs3.b.qianxin.com/qax/c5c16dad0e606c62ce6551195e63d9f4.png) |
173 |
Chrome Permissions 中的使用後釋放漏洞 |
2021-09-19 |
奇安信代碼安全實驗室 |
CVE-2021-30629 |
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html |
![](https://shs3.b.qianxin.com/qax/b2ebec38596d8e1b9a51d1c347786825.png) |
172 |
UI 框架中的釋放後使用漏洞 |
2021-05-01 |
奇安信代碼安全實驗室 |
CVE-2021-30579 |
https://chromereleases.googleblog.com/search?updated-max=2021-07-23T18:00:00-07:00&max-results=7&start=21&by-date=false |
![](https://shs3.b.qianxin.com/qax/e23a12439c67d4861c8499f71fe42f57.png) |
171 |
Autofill 中的釋放後使用漏洞 |
2021-05-01 |
奇安信代碼安全實驗室 |
CVE-2021-30572 |
https://chromereleases.googleblog.com/search?updated-max=2021-07-23T18:00:00-07:00&max-results=7&start=21&by-date=false |
![](https://shs3.b.qianxin.com/qax/e23a12439c67d4861c8499f71fe42f57.png) |
170 |
Chrome Permissions 中的使用後釋放漏洞 |
2021-09-01 |
奇安信代碼安全實驗室 |
CVE-2021-30607 |
https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop_31.html |
![](https://shs3.b.qianxin.com/qax/910d6cb64ac9684efdd7b46fd96a3ae8.png) |
169 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19619 |
https://github.com/langhsu/mblog/issues/27 |
![](https://shs3.b.qianxin.com/qax/1b8aec212687760e386a09919f400eb5.png) |
168 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19618 |
https://github.com/langhsu/mblog/issues/27 |
![](https://shs3.b.qianxin.com/qax/1b8aec212687760e386a09919f400eb5.png) |
167 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19617 |
https://github.com/langhsu/mblog/issues/27 |
![](https://shs3.b.qianxin.com/qax/1b8aec212687760e386a09919f400eb5.png) |
166 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19616 |
https://github.com/langhsu/mblog/issues/27 |
![](https://shs3.b.qianxin.com/qax/1b8aec212687760e386a09919f400eb5.png) |
165 |
SSRF in FlyCMS |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19613 |
https://github.com/sunkaifei/FlyCms/issues/1 |
![](https://shs3.b.qianxin.com/qax/1b8aec212687760e386a09919f400eb5.png) |
164 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31458 |
https://www.foxitsoftware.com/support/security-bulletins.html |
![](https://shs3.b.qianxin.com/qax/4fec7e430bbc3e4e1927f2a7552de1a2.png) |
163 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31457 |
https://www.foxitsoftware.com/support/security-bulletins.html |
![](https://shs3.b.qianxin.com/qax/4fec7e430bbc3e4e1927f2a7552de1a2.png) |
162 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31451 |
https://www.foxitsoftware.com/support/security-bulletins.html |
![](https://shs3.b.qianxin.com/qax/4fec7e430bbc3e4e1927f2a7552de1a2.png) |
161 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31456 |
https://www.foxitsoftware.com/support/security-bulletins.html |
![](https://shs3.b.qianxin.com/qax/4fec7e430bbc3e4e1927f2a7552de1a2.png) |
160 |
Foxit Reader and Foxit PhantomPDF |
2021-11-15 |
奇安信技術研究院 |
CVE-2021-31441 |
https://www.foxitsoftware.com/support/security-bulletins.html |
![](https://shs3.b.qianxin.com/qax/4fec7e430bbc3e4e1927f2a7552de1a2.png) |
159 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21021 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
![](https://shs3.b.qianxin.com/qax/5194b5a24861746ab50853b2e1a3c309.png) |
158 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21028 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
![](https://shs3.b.qianxin.com/qax/5194b5a24861746ab50853b2e1a3c309.png) |
157 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21033 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
![](https://shs3.b.qianxin.com/qax/5194b5a24861746ab50853b2e1a3c309.png) |
156 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21035 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
![](https://shs3.b.qianxin.com/qax/5194b5a24861746ab50853b2e1a3c309.png) |
155 |
Windows TCP/IP 遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-26424 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424 |
![](https://shs3.b.qianxin.com/qax/cdc91fa636b87cc77cf824b6e557bf7c.png) |
154 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-36926 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36926 |
![](https://shs3.b.qianxin.com/qax/cdc91fa636b87cc77cf824b6e557bf7c.png) |
153 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-26433 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26433 |
![](https://shs3.b.qianxin.com/qax/cdc91fa636b87cc77cf824b6e557bf7c.png) |
152 |
Windows Services for NFS ONCRPC XDR Drive 遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-26432 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26432 |
![](https://shs3.b.qianxin.com/qax/cdc91fa636b87cc77cf824b6e557bf7c.png) |
151 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-36933 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36933 |
![](https://shs3.b.qianxin.com/qax/cdc91fa636b87cc77cf824b6e557bf7c.png) |
150 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-36932 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36932 |
![](https://shs3.b.qianxin.com/qax/cdc91fa636b87cc77cf824b6e557bf7c.png) |
149 |
Foxit PDF Reader Annotation 釋放後使用遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-34847 |
https://www.zerodayinitiative.com/advisories/ZDI-21-929/ |
![](https://shs3.b.qianxin.com/qax/90a526b09ec19ac98856bfa2bed2a915.png) |
148 |
Foxit PDF Reader Annotation 釋放後使用遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-34846 |
https://www.zerodayinitiative.com/advisories/ZDI-21-928/ |
![](https://shs3.b.qianxin.com/qax/41a234977eec6a5151ef2242faf63a84.png) |
147 |
Windows DNS 服務器拒絕服務漏洞 (RCE) |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-34444 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34444 |
![](https://shs3.b.qianxin.com/qax/96dfa370e8b51fda4c1fddf01a3fb8a4.png) |
146 |
Windows DNS 服務器拒絕服務漏洞 (RCE) |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-34442 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34442 |
![](https://shs3.b.qianxin.com/qax/96dfa370e8b51fda4c1fddf01a3fb8a4.png) |
145 |
Windows DNS 服務器拒絕服務漏洞 (RCE) |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-33745 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33745 |
![](https://shs3.b.qianxin.com/qax/96dfa370e8b51fda4c1fddf01a3fb8a4.png) |
144 |
VMware Tools for Windows 的VM3DMP中存在拒絕服務漏洞 |
2021-06-01 |
奇安信代碼安全實驗室 |
CVE-2021-21997 |
https://www.vmware.com/security/advisories/VMSA-2021-0011.html |
![](https://shs3.b.qianxin.com/qax/f572b2078f1deda4814c52318d2d87f1.png) |
143 |
RedHat coders/tiff.c 中ReadTIFFImage()中的ImageMagick存在堆緩衝區溢出漏洞 |
2021-06-01 |
奇安信代碼安全實驗室 |
CVE-2021-3610 |
https://bugzilla.redhat.com/show_bug.cgi?id=1973689 |
![](https://shs3.b.qianxin.com/qax/eb1793494e56363f42d68eb69919fce9.png) |
142 |
谷歌Chrome Aura 組件中的競爭條件漏洞 |
2021-05-02 |
奇安信代碼安全實驗室 |
CVE-2021-30510 |
https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop.html |
![](https://shs3.b.qianxin.com/qax/0c7956330c313906f651bdcc0113b907.png) |
141 |
Tenda eCos遠程代碼執行漏洞4 |
2021-05-03 |
技術研究院天工實驗室 |
CVE-2021-31758 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31758 |
![](https://shs3.b.qianxin.com/qax/eb0976fc191dcc8d93e96e3085b0c9ef.png) |
140 |
Tenda eCos遠程代碼執行漏洞3 |
2021-05-03 |
技術研究院天工實驗室 |
CVE-2021-31755 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31755 |
![](https://shs3.b.qianxin.com/qax/6000ee1c6d328a25dc2fa935691661b4.png) |
139 |
Tenda eCos遠程代碼執行漏洞2 |
2021-05-02 |
技術研究院天工實驗室 |
CVE-2021-31757 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31757 |
![](https://shs3.b.qianxin.com/qax/eb07faa6297ac554cda37eac35d7f0a2.png) |
138 |
Tenda eCos遠程代碼執行漏洞1 |
2021-05-02 |
技術研究院天工實驗室 |
CVE-2021-31756 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31756 |
![](https://shs3.b.qianxin.com/qax/b8dd23b4b9a510c6d57319bf66abd5d9.png) |
137 |
Apache Solr服務器端請求偽造漏洞 |
2021-04-20 |
奇安信CERT |
CVE-2021-27905 |
https://solr.apache.org/security.html#cve-2021-27905-ssrf-vulnerability-with-the-replication-handler |
![](https://shs3.b.qianxin.com/qax/11877f386b5b60630797f36ebef3363b.png) |
136 |
Windows DNS 信息泄露漏洞 |
2021-04-14 |
奇安信代碼安全實驗室 |
CVE-2021-28323 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28323 |
![](https://shs3.b.qianxin.com/qax/20e608df0694947fc2552b607458c66e.png) |
135 |
Windows DNS 信息泄露漏洞 |
2021-04-14 |
奇安信代碼安全實驗室 |
CVE-2021-28328 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28328 |
![](https://shs3.b.qianxin.com/qax/20e608df0694947fc2552b607458c66e.png) |
134 |
Windows Network File System 遠程代碼執行漏洞 |
2021-04-14 |
奇安信代碼安全實驗室 |
CVE-2021-28445 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28445 |
![](https://shs3.b.qianxin.com/qax/20e608df0694947fc2552b607458c66e.png) |
133 |
Adobe Acrobat 和 Reader 的 Windows 和 macOS 版任意代碼執行漏洞 |
2021-02-09 |
奇安信代碼安全實驗室 |
CVE-2021-21036 |
https://helpx.adobe.com/cn/security/products/acrobat/apsb21-09.html |
![](https://shs3.b.qianxin.com/qax/f6aa0b4e2470fa915b47de2a04d297e7.png) |
132 |
谷歌 Chrome Aura 組件中的釋放後使用漏洞 |
2021-03-31 |
奇安信代碼安全實驗室 |
CVE-2021-21199 |
https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_30.html |
![](https://shs3.b.qianxin.com/qax/a667d16151f724a040c2fb64be219eea.png) |
131 |
微軟DNS服務器遠程代碼執行漏洞 |
2021-02-10 |
奇安信代碼安全實驗室 |
CVE-2021-24078 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24078 |
![](https://shs3.b.qianxin.com/qax/d8ee6ab4384f88c37c355637401b8584.png) |
130 |
微軟Windows WLAN 服務提權漏洞 |
2021-01-13 |
奇安信代碼安全實驗室 |
CVE-2021-1646 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1646 |
![](https://shs3.b.qianxin.com/qax/c0abb927eac515c3f8adb9d2e3235ddc.png) |
129 |
微軟Windows Win32k 提權漏洞 |
2021-01-13 |
奇安信代碼安全實驗室 |
CVE-2021-1709 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1709 |
![](https://shs3.b.qianxin.com/qax/c0abb927eac515c3f8adb9d2e3235ddc.png) |
128 |
谷歌 Chrome自動填充組件中的沙箱外使用後釋放漏洞 |
2021-01-07 |
奇安信代碼安全實驗室 |
CVE-2020-21106 |
https://chromereleases.googleblog.com/ |
![](https://shs3.b.qianxin.com/qax/4bad0e11bd05191a85d1375cc04b645a.png) |
127 |
Microsoft Exchange遠程代碼執行漏洞 |
2020-12-09 |
奇安信A-TEAM |
CVE-2020-17144 |
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144 |
![](https://shs3.b.qianxin.com/qax/7fe9faef5c06e25e307de8620bf7c71b.png) |
126 |
TP-Link 16款VxWorks路由器設備緩衝區溢出漏洞 |
2020-11-16 |
奇安信技術研究院 |
CVE-2020-28877 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28877 |
![](https://shs3.b.qianxin.com/qax/83ac2859ba253f66f2617fb08bd70c76.png) |
125 |
中興通訊E8810/E8820/E8822系列路由器存在信息泄露漏洞 |
2020-12-17 |
清華-奇安信聯合研究中心 |
CVE-2020-6882 |
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014182 |
![](https://shs3.b.qianxin.com/qax/47039ae6e801e4f4ebf8db0d330a7208.png) |
124 |
中興通訊E8810/E8820/E8822系列路由器存在MQTT拒絕服務漏洞 |
2020-12-17 |
清華-奇安信聯合研究中心 |
CVE-2020-6881 |
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014182 |
![](https://shs3.b.qianxin.com/qax/47039ae6e801e4f4ebf8db0d330a7208.png) |
123 |
Windows MSCTF Server信息泄漏漏洞 |
2020-11-11 |
奇安信代碼安全實驗室 |
CVE-2020-17030 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17030 |
![](https://shs3.b.qianxin.com/qax/df5bf4899ac6a095421f1c29ce6afa44.png) |
122 |
Win32k 提權漏洞 |
2020-11-11 |
奇安信代碼安全實驗室 |
CVE-2020-17038 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17038 |
![](https://shs3.b.qianxin.com/qax/df5bf4899ac6a095421f1c29ce6afa44.png) |
121 |
Oracle WebLogic Server遠程代碼執行漏洞 |
2020-11-01 |
奇安信A-TEAM |
cve-2020-14750 |
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html |
![](https://shs3.b.qianxin.com/qax/0ada5bdd132cfe5b55b939e8956d5f4a.png) |
120 |
Oracle WebLogic Server 遠程代碼執行漏洞 |
2020-10-20 |
奇安信A-TEAM |
cve-2020-14841 |
https://www.oracle.com/security-alerts/cpuoct2020.html |
![](https://shs3.b.qianxin.com/qax/cac0aea4964720a6c9dda2a4893843f0.png) |
119 |
Oracle CVE-2020-14882 (WebLogic Server) 漏洞繞過 |
2020-11-02 |
奇安信代碼安全實驗室 |
CVE-2020-14750 |
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html |
![](https://shs3.b.qianxin.com/qax/4bd31e6be9154472bcf3221f3becf05a.png) |
118 |
谷歌 PDFium 釋放後使用高危漏洞 |
2020-10-21 |
奇安信代碼安全實驗室 |
CVE-2020-16002 |
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html |
![](https://shs3.b.qianxin.com/qax/fbbaf1be85b68d16b57d053aab1836b6.png) |
117 |
Windows Spoofing Vulnerability |
2020-10-14 |
奇安信威脅情報中心 |
CVE-2020-16922 |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16922 |
![](https://shs3.b.qianxin.com/qax/83de1ef958cf8628e22317bc56ef6dcd.png) |
116 |
Windows Text Services Framework信息泄漏漏洞 |
2020-10-14 |
奇安信代碼安全實驗室 |
CVE-2020-16921 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16921 |
![](https://shs3.b.qianxin.com/qax/0c49b37b626d0262d2024dbff8062050.png) |
115 |
Windows Application Compatibility Client Library 提權漏洞 |
2020-10-14 |
奇安信代碼安全實驗室 |
CVE-2020-16920 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16920 |
![](https://shs3.b.qianxin.com/qax/0c49b37b626d0262d2024dbff8062050.png) |
114 |
RedHat oVirt URL 重定向漏洞 |
2020-09-25 |
奇安信代碼安全實驗室 |
CVE-2020-10775 |
https://access.redhat.com/security/cve/CVE-2020-10775 https://gerrit.ovirt.org/#/c/111277/ https://github.com/oVirt/ovirt-engine/commit/362a2a8f8eca542b48a1bba7f9c827fbc44bc955 https://bugzilla.redhat.com/show_bug.cgi?id=1858184 https://bugzilla.redhat.com/show_bug.cgi?id=1866688 |
![](https://shs3.b.qianxin.com/qax/3b99059563a3edfdec7fd8d6b58223a3.jpg) |
113 |
RedHat oVirt XSS 漏洞 |
2020-09-25 |
奇安信代碼安全實驗室 |
CVE-2020-14333 |
https://access.redhat.com/security/cve/CVE-2020-14333 https://gerrit.ovirt.org/#/c/111277/ https://github.com/oVirt/ovirt-engine/commit/362a2a8f8eca542b48a1bba7f9c827fbc44bc955 https://bugzilla.redhat.com/show_bug.cgi?id=1858184 https://bugzilla.redhat.com/show_bug.cgi?id=1866688 |
![](https://shs3.b.qianxin.com/qax/3b99059563a3edfdec7fd8d6b58223a3.jpg) |
112 |
Win32k 信息泄露漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1250 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1250 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
111 |
Windows 提權漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1052 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1052 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
110 |
Windows DHCP 服務器信息泄露漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1031 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1031 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
109 |
Windows 內核信息泄露漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-0928 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0928 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
108 |
Windows DNS 拒絕服務漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1228 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1228 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
107 |
Windows DNS 拒絕服務漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-0836 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0836 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
106 |
Windows Cryptographic Catalog Services 提權漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-0782 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0782 |
![](https://shs3.b.qianxin.com/qax/7bd9d6880ee77c21326281b190c94327.png) |
105 |
紅帽QEMU 界外訪問 |
2020-04-06 |
奇安信代碼安全實驗室 |
CVE-2020-11102 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102 |
![](https://shs3.b.qianxin.com/qax/6d25277c1c5e23b1f89332ab16626388.png) |
104 |
Juniper Networks Junos 15.1-19.2版本JDHCP 服務 |
2020-01-01 |
奇安信代碼安全實驗室 |
CVE-2020-1609 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981 |
![](https://shs3.b.qianxin.com/qax/647f2b8450aa63624a94baba09e98027.png) |
103 |
Juniper Networks Junos 15.1-19.2版本JDHCP 服務 |
2020-01-01 |
奇安信代碼安全實驗室 |
CVE-2020-1605 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981 |
![](https://shs3.b.qianxin.com/qax/647f2b8450aa63624a94baba09e98027.png) |
102 |
Juniper Networks Junos 15.1-19.2版本JDHCP 服務 |
2020-01-01 |
奇安信代碼安全實驗室 |
CVE-2020-1602 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981 |
![](https://shs3.b.qianxin.com/qax/647f2b8450aa63624a94baba09e98027.png) |
101 |
Linux 內核4.14.x 和4.19.x 穩定版內核中的釋放後使用漏洞 |
2020-01-14 |
奇安信代碼安全實驗室 |
CVE-2020-7053 |
https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks@canonical.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053 |
![](https://shs3.b.qianxin.com/qax/82ef972d302a4da359b3626180571291.png) |
100 |
紅帽QEMU 仿真器 XGMAC 以太網控制器中的緩衝溢出 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-15863 |
https://access.redhat.com/security/cve/CVE-2020-15863 |
![](https://shs3.b.qianxin.com/qax/4bfbfb085d93efc71bc3a7463cb4218d.jpg) |
99 |
紅帽網絡數據包處理組件中QEMU斷言失敗 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-16092 |
https://access.redhat.com/security/cve/CVE-2020-16092 |
![](https://shs3.b.qianxin.com/qax/4bfbfb085d93efc71bc3a7463cb4218d.jpg) |
98 |
紅帽QEMU拒絕服務 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-14415 |
https://access.redhat.com/security/cve/CVE-2020-14415 |
![](https://shs3.b.qianxin.com/qax/4bfbfb085d93efc71bc3a7463cb4218d.jpg) |
97 |
紅帽QEMU 仿真器的 SM501 顯示驅動實現中存在一個整數溢出漏洞 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-12829 |
https://access.redhat.com/security/cve/CVE-2020-12829 |
![](https://shs3.b.qianxin.com/qax/4bfbfb085d93efc71bc3a7463cb4218d.jpg) |
96 |
紅帽QEMU 的 USB 仿真器中存在越界讀/寫訪問問題 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-14364 |
https://access.redhat.com/security/cve/CVE-2020-14364 |
![](https://shs3.b.qianxin.com/qax/4bfbfb085d93efc71bc3a7463cb4218d.jpg) |
95 |
華為 Switch 系列設備漏洞 |
2019-05-22 |
奇安信代碼安全實驗室 |
CVE-2019-5285 |
https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn |
![](https://shs3.b.qianxin.com/qax/5ce418ae2c0c92c917abc08b91d443dc.jpg) |
94 |
Oracle VM VirtualBox 拒絕服務漏洞 |
2020-05-22 |
奇安信代碼安全實驗室 |
CVE-2020-14715 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/bd3db15db67b8a1b557f6618ed20a0a0.jpg) |
93 |
Oracle VM VirtualBox 拒絕服務漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14714 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/bd3db15db67b8a1b557f6618ed20a0a0.jpg) |
92 |
Oracle VM VirtualBox 拒絕服務漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14707 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/bd3db15db67b8a1b557f6618ed20a0a0.jpg) |
91 |
Oracle VM VirtualBox 整數溢出和越界讀取漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14700 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/bd3db15db67b8a1b557f6618ed20a0a0.jpg) |
90 |
Oracle VM VirtualBox 整數溢出和越界讀取漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14699 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/bd3db15db67b8a1b557f6618ed20a0a0.jpg) |
89 |
Oracle VM VirtualBox 整數溢出和越界讀取漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14698 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/bd3db15db67b8a1b557f6618ed20a0a0.jpg) |
88 |
“重要”級別的微軟Windows 內核信息泄露漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-1426 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1426 |
![](https://shs3.b.qianxin.com/qax/82d3851567d1dfa320aa0e1ea19f484e.jpg) |
87 |
微軟 Graphics Components 遠程代碼執行漏洞 |
2020-05-13 |
奇安信代碼安全實驗室 |
CVE-2020-1153 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1153 |
![](https://shs3.b.qianxin.com/qax/2736e79c881a01d8feac3ecfccc2d020.jpg) |
86 |
Oracle Virtualbox 拒絕服務漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-2959 |
https://www.oracle.com/security-alerts/cpuapr2020verbose.html#OVIR |
![](https://shs3.b.qianxin.com/qax/cb4df44647f14f08ccc8dbcf398361a0.jpg) |
85 |
微軟Microsoft Graphics Component信息泄露漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-1005 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1005 |
![](https://shs3.b.qianxin.com/qax/266535e98498aa4f064abe270afd83c0.jpg) |
84 |
微軟Windows DNS 拒絕服務漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0993 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0993 |
![](https://shs3.b.qianxin.com/qax/266535e98498aa4f064abe270afd83c0.jpg) |
83 |
微軟Win32k 提權漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0958 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0958 |
![](https://shs3.b.qianxin.com/qax/266535e98498aa4f064abe270afd83c0.jpg) |
82 |
微軟Win32k 提權漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0957 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0957 |
![](https://shs3.b.qianxin.com/qax/266535e98498aa4f064abe270afd83c0.jpg) |
81 |
微軟Adobe Font Manager Library 遠程代碼執行漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0938 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0938 |
![](https://shs3.b.qianxin.com/qax/266535e98498aa4f064abe270afd83c0.jpg) |
80 |
微軟Win32k 提權漏洞 |
2020-03-11 |
奇安信代碼安全實驗室 |
CVE-2020-0762 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0762 |
![](https://shs3.b.qianxin.com/qax/9dd807429d4f48ee0789923aecca1d9c.jpg) |
79 |
微軟WindowsDefender Security Center提權漏洞 |
2020-03-11 |
奇安信代碼安全實驗室 |
CVE-2020-0877 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0877 |
![](https://shs3.b.qianxin.com/qax/9dd807429d4f48ee0789923aecca1d9c.jpg) |
78 |
微軟ChakraCore 腳本引擎內存損壞漏洞 |
2020-03-11 |
奇安信代碼安全實驗室 |
CVE-2020-0848 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0848 |
![](https://shs3.b.qianxin.com/qax/9dd807429d4f48ee0789923aecca1d9c.jpg) |
77 |
Oracle Fusion Middleware WebCenter Sites 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14652 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
76 |
Oracle Fusion Middleware WebLogic Server Core組件安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14645 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
75 |
Oracle Fusion Middleware WebLogic Server 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14640 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
74 |
Oracle Fusion Middleware WebLogic Server 信息泄露漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14639 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
73 |
Oracle Fusion Middleware WebLogic Server 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14638 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
72 |
Oracle Fusion Middleware WebLogic Server 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14637 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
71 |
Oracle Fusion Middleware WebLogic Server 信息泄露漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14636 |
https://www.oracle.com/security-alerts/cpujul2020.html |
![](https://shs3.b.qianxin.com/qax/62146617b06fcffbd1d71f8907bc7552.png) |
70 |
FasterXML jackson-databind 代碼問題漏洞 |
2020-04-01 |
奇安信 A-TEAM |
CVE-2020-11620 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
![](https://shs3.b.qianxin.com/qax/d2e1327aaa8b7e0e4ebaf3eba71c4742.png) |
69 |
Oracle Virtualization VM VirtualBox 安全漏洞 |
2020-04-01 |
奇安信 A-TEAM |
CVE-2020-2908 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
![](https://shs3.b.qianxin.com/qax/22c88687f14874842990f7971ef44f37.png) |
68 |
Oracle Weblogic Server遠程信息泄露漏洞 |
2020-04-01 |
奇安信A-TEAM |
CVE-2020-2829 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
![](https://shs3.b.qianxin.com/qax/22c88687f14874842990f7971ef44f37.png) |
67 |
Weblogic 遠程代碼執行漏洞 |
2020-04-01 |
奇安信 A-TEAM |
CVE-2020-2798 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
![](https://shs3.b.qianxin.com/qax/22c88687f14874842990f7971ef44f37.png) |
66 |
Weblogic遠程代碼執行漏洞 |
2018-11-07 |
奇安信 A-TEAM |
CVE-2018-3245 |
https://www.oracle.com/security-alerts/cpuoct2018.html |
![](https://shs3.b.qianxin.com/qax/ec8e0780022f6f6054c575d2a9012cb4.png) |
65 |
微軟“重要”的WindowsGraphics 組件提權漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0745 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0745 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
64 |
微軟“重要”的Win32k 信息泄露漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0717 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0717 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
63 |
微軟“重要”的Win32k 信息泄露漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0716 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0716 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
62 |
微軟“重要”的WindowsGraphics 組件提權漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0715 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0715 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
61 |
微軟“嚴重”的腳本引擎內存損壞漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0712 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0712 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
60 |
微軟“嚴重”的腳本引擎內存損壞漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0710 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0710 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
59 |
微軟“嚴重”的遠程任意代碼可執行漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0662 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0662 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
58 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1434 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1434 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
57 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1435 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1435 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
56 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1433 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1433 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
55 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1407 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1407 |
![](https://shs3.b.qianxin.com/qax/886981b824dd1b8a02ac9d3c58d4ff3a.jpg) |
54 |
微軟Win32k 信息泄露漏洞 |
2020-01-15 |
奇安信代碼安全實驗室 |
CVE-2020-0608 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0608 |
![](https://shs3.b.qianxin.com/qax/ce4afe56a35626b80cf59ea42ba8e95e.jpg) |
53 |
VMware 聲卡設備的uaf漏洞 |
2019-09-19 |
奇安信代碼安全實驗室 |
CVE-2019-5527 |
https://www.vmware.com/security/advisories/VMSA-2019-0014.html |
![](https://shs3.b.qianxin.com/qax/36cb13380774e22ac92f6e704ed01b44.jpg) |
52 |
微軟Windows 內核信息泄漏漏洞 |
2019-08-13 |
奇安信代碼安全實驗室 |
CVE-2020-1228 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1228 |
![](https://shs3.b.qianxin.com/qax/3b94c2845bc5f4fdd3617888a0b7ec48.jpg) |
51 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9704 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
50 |
Stack exhaustion |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9703 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
49 |
Stack exhaustion |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9702 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
48 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9701 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
47 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9700 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
46 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9699 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
45 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9698 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
![](https://shs3.b.qianxin.com/qax/fee168d2f72e83e41891a1b35859c28d.png) |
44 |
Stack-based buffer overflow |
2020-03-17 |
奇安信技術研究院 |
CVE-2020-3799 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-13.html |
![](https://shs3.b.qianxin.com/qax/05d4411b635e3f8eaeeb1020643c0317.png) |
43 |
Exim 遠程堆溢出漏洞 |
|
|
CVE-2019-16928 |
https://seclists.org/oss-sec/2019/q3/256 |
![](https://shs3.b.qianxin.com/qax/9d76942395627c20c84daa0fda32845f.png) |
42 |
Windows內核高危漏洞 |
|
|
CVE-2019-1285 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1285 |
![](https://shs3.b.qianxin.com/qax/7dbd9b04e6500af33f204248c9445758.png) |
41 |
Edge瀏覽器高危漏洞 |
|
|
CVE-2019-1217 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1217 |
![](https://shs3.b.qianxin.com/qax/7dbd9b04e6500af33f204248c9445758.png) |
40 |
Chrome瀏覽器中的UAF漏洞 |
|
|
CVE-2019-5866 |
https://chromereleases.googleblog.com/2019/07/stable-channel--for-desktop.html |
![](https://shs3.b.qianxin.com/qax/88a180fbaf0bf7eb758569f99e2f0292.png) |
39 |
Vmware 溢出漏洞 |
|
|
CVE-2019-5527 |
https://www.vmware.com/security/advisories/VMSA-2019-0014.html |
![](https://shs3.b.qianxin.com/qax/7f80dedd2575011b9ff31ed2f4ee2c61.png) |
38 |
Acrobat Reader DC中的uaf漏洞 |
|
|
CVE-2019-8031 |
https://helpx.adobe.com/security/products/acrobat/apsb19-41.html |
![](https://shs3.b.qianxin.com/qax/c57f14f9e966f5aa55e5011601208b4f.PNG) |
37 |
Acrobat Reader DC中的uaf漏洞 |
|
|
CVE-2019-8030 |
https://helpx.adobe.com/security/products/acrobat/apsb19-41.html |
![](https://shs3.b.qianxin.com/qax/c57f14f9e966f5aa55e5011601208b4f.PNG) |
36 |
Acrobat Reader DC中的uaf漏洞 |
|
|
CVE-2019-8029 |
https://helpx.adobe.com/security/products/acrobat/apsb19-41.html |
![](https://shs3.b.qianxin.com/qax/c57f14f9e966f5aa55e5011601208b4f.PNG) |
35 |
越權啓用WiFi DIR-823G SetWLanRadioSettings Guest-WiFi Enable |
|
|
CVE-2019-8392 |
https://github.com/leonW7/D-Link/blob/master/Vul_6.md |
![](https://shs3.b.qianxin.com/qax/bfdf1a2644bbb8bc3c2ad946852e015f.png) |
34 |
局域網DNS劫持 DIR-823G SetWanSettings DNS Hijack |
|
|
CVE-2019-7390 |
http://www.securityfocus.com/bid/106855 https://github.com/leonW7/D-Link/blob/master/Vul_5.md |
![](https://shs3.b.qianxin.com/qax/a7803ab28c270aa1f756f088b54b97ed.png) |
33 |
遠程拒絕服務 DIR-823G SetFactoryDefault DoS |
|
|
CVE-2019-7389 |
http://www.securityfocus.com/bid/106853 https://github.com/leonW7/D-Link/blob/master/Vul_4.md |
![](https://shs3.b.qianxin.com/qax/92d601d1e60b4b3709518dcbb94d84c1.png) |
32 |
遠程信息泄露 DIR-823G GetClientInfo InfoLeak |
|
|
CVE-2019-7388 |
http://www.securityfocus.com/bid/106852 https://github.com/leonW7/D-Link/blob/master/Vul_3.md |
![](https://shs3.b.qianxin.com/qax/c04fd6221969d734a7dcabe6096f2d7f.png) |
31 |
遠程命令注入 DIR-823G HNAP_Entry_Func CMD Injection |
|
|
CVE-2019-7298 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7298 http://www.securityfocus.com/bid/106814 |
![](https://shs3.b.qianxin.com/qax/8531b12a0aceb2a56f7ebcc5c16d3230.png) |
30 |
遠程命令注入 DIR-823G GetNetwork TomographyResult CMD Injection |
|
|
CVE-2019-7297 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7297 http://www.securityfocus.com/bid/106815 |
![](https://shs3.b.qianxin.com/qax/ef6c53765d73846b02b010947cf788b2.png) |
29 |
Win32k Elevation of Privilege Vulnerability |
|
|
CVE-2019-0960 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0960 |
![](https://shs3.b.qianxin.com/qax/6bf6f96be7d7d9fb17727b9a8f48b5a2.png) |
28 |
Windows NTLM Tampering Vulnerability |
|
|
CVE-2019-1040 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1040 |
![](https://shs3.b.qianxin.com/qax/d3a2172b86a4b6d384086b5d230822bd.png) |
27 |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
|
|
CVE-2019-0724 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0724 |
![](https://shs3.b.qianxin.com/qax/e4b319a5a478f94342b9cedf53191e90.png) |
26 |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
|
|
CVE-2019-0686 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0686 |
![](https://shs3.b.qianxin.com/qax/e4b319a5a478f94342b9cedf53191e90.png) |
25 |
Motorola SetSmartQoSSettings CMD Injection |
|
|
CVE-2019-9121 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9121 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetSmartQoSSettings.md |
![](https://shs3.b.qianxin.com/qax/8e75471430846b220c2c3da9ee1fbc14.png) |
24 |
Motorola SetWLanACLSettings CMD Injection |
|
|
CVE-2019-9120 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9120 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetWLanACLSettings.md |
![](https://shs3.b.qianxin.com/qax/b1a2b00d74828643642aa5265b38bccc.png) |
23 |
Motorola SetStaticRouteSettings CMD Injection |
|
|
CVE-2019-9119 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9119 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetStaticRouteSettings.md |
![](https://shs3.b.qianxin.com/qax/b3808aa865bc6f9c44fec18d155c2c7a.png) |
22 |
Motorola SetStaticRouteSettings CMD Injection |
|
|
CVE-2019-9118 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9118 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetNTPServerSettings.md |
![](https://shs3.b.qianxin.com/qax/5ce9ce4e7551a298b61d349859fc521d.png) |
21 |
Motorola SetStaticRouteSettings CMD Injection |
|
|
CVE-2019-9117 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9117 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetNetworkTomographySettings.md |
![](https://shs3.b.qianxin.com/qax/6d65911d59c2ef04b7f09594c6cba98b.png) |
20 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7461 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7461 |
![](https://shs3.b.qianxin.com/qax/d9556a20f8720fde976f201ce856512b.jpg) |
19 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7460 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7460 |
![](https://shs3.b.qianxin.com/qax/c9a3adf26860ff0e777e19ae6368a3a4.jpg) |
18 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7459 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7459 |
![](https://shs3.b.qianxin.com/qax/94b97d0dc6e7274f84869bc626f72f4a.jpg) |
17 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7458 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7458 |
![](https://shs3.b.qianxin.com/qax/29a21e3ea535cd7e93d0b220b6ed0e1d.jpg) |
16 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7457 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7457 |
![](https://shs3.b.qianxin.com/qax/457742ba344e07a4a2266254ed45e6e9.jpg) |
15 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7456 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7456 |
![](https://shs3.b.qianxin.com/qax/2724f356e67f3a50505bfa9539883ca1.jpg) |
14 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7455 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7455 |
![](https://shs3.b.qianxin.com/qax/17c01ded7057f2fc4552bf596ff80dc8.jpg) |
13 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7454 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7454 |
![](https://shs3.b.qianxin.com/qax/457742ba344e07a4a2266254ed45e6e9.jpg) |
12 |
libsass內存溢出漏洞 |
|
|
CVE-2019-6286 |
https://github.com/sass/libsass/issues/2815 |
![](https://shs3.b.qianxin.com/qax/d6ec8e7a850512662735a20cff5a8726.jpg) |
11 |
yaml-cpp內存溢出漏洞 |
|
|
CVE-2019-6285 |
https://github.com/jbeder/yaml-cpp/issues/660 |
![](https://shs3.b.qianxin.com/qax/79dad6d109c839a1fb53b230dc869216.jpg) |
10 |
libsass內存溢出漏洞 |
|
|
CVE-2019-6284 |
https://github.com/sass/libsass/issues/2816 |
![](https://shs3.b.qianxin.com/qax/fb9b2ca111906a060a8ce4f0476baf71.jpg) |
9 |
libsass內存溢出漏洞 |
|
|
CVE-2019-6283 |
https://github.com/sass/libsass/issues/2814 |
![](https://shs3.b.qianxin.com/qax/5a215ed6134791d530fb47e957f57aee.jpg) |
8 |
D-Link SetStaticRoute CMD Injection |
|
|
CVE-2019-8319 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8319 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/staticrouterv4.md |
![](https://shs3.b.qianxin.com/qax/31bfd7baf15664f293c16585dfde9cac.png) |
7 |
D-Link SetSysEmailSettings CMD Injection |
|
|
CVE-2019-8318 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8318 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/mail.md |
![](https://shs3.b.qianxin.com/qax/821de374134cd8e46590150124c3810b.png) |
6 |
D-Link SetStaticRoute CMD Injection |
|
|
CVE-2019-8317 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8317 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/staticrouterv6.md |
![](https://shs3.b.qianxin.com/qax/d5ac39f0eac8cbeba5f6f49dd5b9851d.png) |
5 |
D-Link SetWebFilterSettings CMD Injection |
|
|
CVE-2019-8316 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8316 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/webfilter.md |
![](https://shs3.b.qianxin.com/qax/32dcba3cc995c7a99604e5b48ab08ddb.png) |
4 |
D-Link SetStaticRoute CMD Injection |
|
|
CVE-2019-8315 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8315 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/firewallv4.md |
![](https://shs3.b.qianxin.com/qax/f6fca1c1de214993705dbf57642ed729.png) |
3 |
D-Link SetQoSSettings CMD Injection |
|
|
CVE-2019-8314 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8314 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/qos.md |
![](https://shs3.b.qianxin.com/qax/82fb45a590d6a3337a60010c174dc0de.png) |
2 |
D-Link SetIPv6FirewallSettings CMD Injection |
|
|
CVE-2019-8313 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8313 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/firewallv6.md |
![](https://shs3.b.qianxin.com/qax/7eb62d154c32eede83c510764b1ae629.png) |
1 |
D-linkSetSysLogSettingsCMD Injection |
|
|
CVE-2019-8312 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8312 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/syslog.md |
![](https://shs3.b.qianxin.com/qax/38a17264cbac6c14e621989a1c5cb85f.png) |