序號 |
漏洞名 |
公佈時間 |
發現團隊 |
CVE編號 |
參考鏈接 |
致謝截圖 |
272 |
RedHat Open vSwitch |
2022-12-20 |
奇安信代碼安全實驗室 |
CVE-2022-4338 |
https://access.redhat.com/security/cve/CVE-2022-4338 |
 |
271 |
RedHat Open vSwitch |
2022-12-20 |
奇安信代碼安全實驗室 |
CVE-2022-4337 |
https://access.redhat.com/security/cve/CVE-2022-4337 |
 |
270 |
Windows Graphics Component |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-4107 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41074 |
 |
269 |
Windows 打印機 |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44678 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44678 |
 |
268 |
Windows Graphics Component |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44679 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44679 |
 |
267 |
Windows Graphics Component |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44680 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44680 |
 |
266 |
Windows 打印機 |
2022-12-14 |
技術研究院天工實驗室 |
CVE-2022-44681 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44681 |
 |
265 |
Cisco IP 電話7800 和 8800 系列 Cisco Discovery Protocol 棧溢出 |
2022-12-09 |
奇安信代碼安全實驗室 |
CVE-2022-20968 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipp-oobwrite-8cMF5r7U |
 |
264 |
Mikrotik RouterOS 的snmp進程中存在界外讀漏洞 |
2022-12-09 |
奇安信代碼安全實驗室 |
CVE-2022-45315 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45315 |
 |
263 |
Mikrotik RouterOS 的hotspot進程中存在界外讀漏洞 |
2022-12-09 |
奇安信代碼安全實驗室 |
CVE-2022-45313 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45313 |
 |
262 |
紅帽QEMU VNC服務整數下溢 |
2022-09-26 |
奇安信威脅情報中心 |
CVE-2022-3165 |
https://access.redhat.com/security/cve/cve-2022-3165 |
 |
261 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-43749 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_19 |
 |
260 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-43748 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_19 |
 |
259 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-27623 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_18 |
 |
258 |
羣暉 |
2022-10-25 |
奇安信代碼安全實驗室 |
CVE-2022-27622 |
https://www.synology.cn/zh-cn/security/advisory/Synology_SA_22_18 |
 |
257 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20766 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
256 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20691 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
255 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20690 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
254 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20689 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
253 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20688 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
252 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20687 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
251 |
思科 |
2022-10-13 |
奇安信代碼安全實驗室 |
CVE-2022-20686 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs |
 |
250 |
微軟 |
2022-10-12 |
奇安信代碼安全實驗室 |
CVE-2022-33645 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33645 |
 |
249 |
思科 |
2022-09-23 |
奇安信代碼安全實驗室 |
CVE-2022-20846 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr-cdp-wnALzvT2 |
 |
248 |
微軟 |
2022-09-14 |
奇安信代碼安全實驗室 |
CVE-2022-34718 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34718 |
 |
247 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38254 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
246 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38253 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
245 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38252 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
244 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38251 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
243 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38250 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
242 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38249 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
241 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38248 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
240 |
Nagios |
2021-11-02 |
奇安信代碼安全實驗室 |
CVE-2022-38247 |
https://www.nagios.com/downloads/nagios-xi/change-log/#5.8.7 |
 |
239 |
xiunobbs |
2022-07-13 |
奇安信代碼安全實驗室 |
CVE-2020-19914 |
https://kevinoclam.github.io/blog/2019/07/31/xiunobbs-upload/ |
 |
238 |
微軟 |
2022-07-13 |
奇安信代碼安全實驗室 |
CVE-2022-22042 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22042 |
 |
237 |
微軟 |
2022-07-13 |
奇安信代碼安全實驗室 |
CVE-2022-30223 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30223 |
 |
236 |
微軟 |
2022-05-10 |
奇安信代碼安全實驗室 |
CVE-2022-23270 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23270 |
 |
235 |
谷歌Chrome |
2022-04-28 |
奇安信代碼安全實驗室 |
CVE-2022-1496 |
https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html |
 |
234 |
Oracle WebLogic Server |
2022-04-21 |
奇安信代碼安全實驗室 |
CVE-2022-21453 |
https://www.oracle.com/security-alerts/cpuapr2022.html |
 |
233 |
Windows iSCSI Target Service信息泄露 |
2022-04-13 |
奇安信代碼安全實驗室 |
CVE-2022-24498 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24498 |
 |
232 |
Windows Network File System遠程代碼執行 |
2022-04-13 |
奇安信代碼安全實驗室 |
CVE-2022-24491 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24491 |
 |
231 |
惠普企業HPE FlexNetwork 5130 EI 交換機系列本地緩衝溢出 |
2022-01-29 |
奇安信代碼安全實驗室 |
CVE-2021-29219 |
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=emr_na-hpesbnw04234en_us |
 |
230 |
ImageMagick 堆緩衝區溢出讀漏洞 |
2022-02-01 |
奇安信代碼安全實驗室 |
CVE-2022-0284 |
https://access.redhat.com/security/cve/CVE-2022-0284 |
 |
229 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39849 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
 |
228 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39850 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
 |
227 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39851 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
 |
226 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39852 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
 |
225 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39853 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
 |
224 |
ADOBE:應用程序拒絕服務 |
2022-01-01 |
技術研究院 |
CVE-2021-39854 |
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
 |
223 |
微軟Microsoft Message Queuing 信息泄露漏洞 |
2021-12-01 |
奇安信代碼安全實驗室 |
CVE-2021-43222 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43222 |
 |
222 |
微軟Microsoft Message Queuing 信息泄露漏洞 |
2021-12-01 |
奇安信代碼安全實驗室 |
CVE-2021-43236 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43236 |
 |
221 |
微軟iSNS 服務器內存損壞漏洞可導致RCE |
2021-12-01 |
奇安信代碼安全實驗室 |
CVE-2021-43215 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-43215 |
 |
220 |
聯想手機:LEN-65134 Legion Phone Pro 和 Legion Phone2 Pro 信息泄露漏洞 |
2021-10-03 |
研究院 |
CVE-2021-3720 |
https://iknow.lenovo.com.cn/detail/dc_199217.html |
 |
219 |
中興通訊一款手機的消息服務應用存在信息泄露漏洞 |
2021-09-24 |
研究院 |
CVE-2021-21742 |
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1019064 |
 |
218 |
天氣模塊中的信息泄露漏洞 |
2021-07-19 |
研究院 |
CVE-2021-26279 |
https://www.vivo.com/en/support/security-advisory-detail?id=10 |
 |
217 |
鬧鐘模塊中的信息泄露 |
2021-07-19 |
研究院 |
CVE-2021-26281 |
https://www.vivo.com/en/support/security-advisory-detail?id=9 |
 |
216 |
華為手機中的非標準化字段名稱 |
2021-09-01 |
研究院 |
CVE-2021-22486 |
https://consumer.huawei.com/gh/support/bulletin/2021/9/ https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 |
 |
215 |
D-Link formWlanSetup 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33274 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33274 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln07 |
 |
214 |
D-Link formSetPortTr 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33271 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33271 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln11 |
 |
213 |
D-Link formAdvFirewall 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33270 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33270 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln06 |
 |
212 |
D-Link formVirtualServ 棧溢出 |
2021-05-20 |
研究院 |
CVE-2021-33269 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33269 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln01 |
 |
211 |
D-Link fromLogin 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33268 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33268 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln03 |
 |
210 |
D-Link formStaticDHCP 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33267 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33267 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln02 |
 |
209 |
D-Link formVirtualApp 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33266 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33266 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln04 |
 |
208 |
D-Link formSetPortTr 棧溢出 |
2021-05-20 |
奇安信技術研究院 |
CVE-2021-33265 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33265 https://github.com/Lnkvct/IoT-poc/tree/master/D-Link-DIR809/vuln05 |
 |
207 |
思科220系列小型交換機LLDP協議拒絕服務 |
2021-10-17 |
奇安信代碼安全實驗室 |
CVE-2021-34780 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
 |
206 |
思科220系列小型交換機LLDP協議拒絕服務 |
2021-10-07 |
奇安信代碼安全實驗室 |
CVE-2021-34779 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
 |
205 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-02 |
奇安信代碼安全實驗室 |
CVE-2021-34778 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
 |
204 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-02 |
奇安信代碼安全實驗室 |
CVE-2021-34777 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
 |
203 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-02 |
奇安信代碼安全實驗室 |
CVE-2021-34776 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
 |
202 |
思科220系列小型交換機LLDP數據庫損壞漏洞 |
2021-10-01 |
奇安信代碼安全實驗室 |
CVE-2021-34775 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb220-lldp-multivuls-mVRUtQ8T |
 |
201 |
谷歌 Chrome Incognito 中的釋放後使用漏洞 |
2021-10-19 |
奇安信代碼安全實驗室 |
CVE-2021-37982 |
https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html |
 |
200 |
Foxit PDF Reader Annotation 釋放後使用信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34972 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1203/ |
 |
199 |
Foxit PDF Reader Annotation 釋放後使用信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34969 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1200/ |
 |
198 |
Foxit PDF Reader Annotation 使用未初始化變量信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34953 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1184/ |
 |
197 |
Foxit PDF Reader Annotation 釋放後使用遠程代碼執行漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34952 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1183/ |
 |
196 |
Foxit PDF Reader Annotation 使用未初始化變量信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34951 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1182/ |
 |
195 |
Foxit PDF Reader Square Annotation 界外讀遠程代碼執行漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34950 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1181/ |
 |
194 |
Foxit PDF Reader Annotation界外讀信息泄露漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34949 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1180/ |
 |
193 |
Foxit PDF Reader Square Annotation 釋放後使用遠程代碼執行漏洞 |
2021-10-09 |
奇安信代碼安全實驗室 |
CVE-2021-34948 |
https://www.zerodayinitiative.com/advisories/ZDI-21-1179/ |
 |
192 |
Windows Print Spooler 信息泄露漏洞 |
2021-10-01 |
奇安信代碼安全實驗室 |
CVE-2021-41332 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-41332 |
 |
191 |
谷歌Chrome Safe Browsing 中的釋放後使用漏洞 |
2021-09-01 |
奇安信代碼安全實驗室 |
CVE-2021-37974 |
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html |
 |
190 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 空解指針解引用漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-22792 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
 |
189 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 界外寫漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-22791 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
 |
188 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 界外讀漏洞 |
2021-08-19 |
奇安信代碼安全實驗室 |
CVE-2021-22790 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
 |
187 |
施耐德電氣Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert 內存緩衝區邊界內操作限制不當 |
2021-08-19 |
奇安信代碼安全實驗室 |
CVE-2021-22789 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04 |
 |
186 |
西門子 Siemens JT2Go and Teamcenter Visualization 13.2.0.0及之前版本中存在CGM 文件空指針解引用漏洞 |
2021-08-19 |
奇安信代碼安全實驗室 |
CVE-2021-33717 |
https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf |
 |
185 |
施耐德電氣EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340憑據保護不充分 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-22781 |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01 |
 |
184 |
SAP 3D 可視化企業視圖版本9.1中的輸入驗證不當問題 |
2021-06-30 |
奇安信代碼安全實驗室 |
CVE-2021-33680 |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=451071888 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 |
 |
183 |
SAP 3D 可視化企業視圖版本9.0中的輸入驗證不當問題 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-33681 |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=451071888 |
 |
182 |
思科視頻監控7003系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1598 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
 |
181 |
思科視頻監控7001系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1597 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
 |
180 |
思科視頻監控7001系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1596 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
 |
179 |
思科視頻監控7000系列 IP 攝像頭固件LLDP內存泄露漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-1595 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-mem-wGqundTq |
 |
178 |
思科視頻監控7000系列 IP 攝像頭固件LLDP實現中的雙重釋放拒絕服務漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-34734 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipcamera-lldp-dos-OFP7j9j |
 |
177 |
Aruba Instant 訪問點中的未認證拒絕服務漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-34618 |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt |
 |
176 |
Juniper Networks Junos OS and Junos OS Evolved 的l2cpd中存在界外讀漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-0277 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11181&cat=SIRT_1&actp=LIST |
 |
175 |
SonicWall 交換機中的界外讀漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-20024 |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0011 |
 |
174 |
QNAP某些交換機中存在界外讀漏洞 |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-20024 |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0011 |
 |
173 |
Chrome Permissions 中的使用後釋放漏洞 |
2021-09-19 |
奇安信代碼安全實驗室 |
CVE-2021-30629 |
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html |
 |
172 |
UI 框架中的釋放後使用漏洞 |
2021-05-01 |
奇安信代碼安全實驗室 |
CVE-2021-30579 |
https://chromereleases.googleblog.com/search?updated-max=2021-07-23T18:00:00-07:00&max-results=7&start=21&by-date=false |
 |
171 |
Autofill 中的釋放後使用漏洞 |
2021-05-01 |
奇安信代碼安全實驗室 |
CVE-2021-30572 |
https://chromereleases.googleblog.com/search?updated-max=2021-07-23T18:00:00-07:00&max-results=7&start=21&by-date=false |
 |
170 |
Chrome Permissions 中的使用後釋放漏洞 |
2021-09-01 |
奇安信代碼安全實驗室 |
CVE-2021-30607 |
https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop_31.html |
 |
169 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19619 |
https://github.com/langhsu/mblog/issues/27 |
 |
168 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19618 |
https://github.com/langhsu/mblog/issues/27 |
 |
167 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19617 |
https://github.com/langhsu/mblog/issues/27 |
 |
166 |
XSS in mblog |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19616 |
https://github.com/langhsu/mblog/issues/27 |
 |
165 |
SSRF in FlyCMS |
2021-04-15 |
奇安信技術研究院 |
CVE-2020-19613 |
https://github.com/sunkaifei/FlyCms/issues/1 |
 |
164 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31458 |
https://www.foxitsoftware.com/support/security-bulletins.html |
 |
163 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31457 |
https://www.foxitsoftware.com/support/security-bulletins.html |
 |
162 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31451 |
https://www.foxitsoftware.com/support/security-bulletins.html |
 |
161 |
Foxit Reader and Foxit PhantomPDF |
2021-04-15 |
奇安信技術研究院 |
CVE-2021-31456 |
https://www.foxitsoftware.com/support/security-bulletins.html |
 |
160 |
Foxit Reader and Foxit PhantomPDF |
2021-11-15 |
奇安信技術研究院 |
CVE-2021-31441 |
https://www.foxitsoftware.com/support/security-bulletins.html |
 |
159 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21021 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
 |
158 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21028 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
 |
157 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21033 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
 |
156 |
Adobe Acrobat and Reader |
2021-03-10 |
奇安信技術研究院 |
CVE-2021-21035 |
https://helpx.adobe.com/security/products/acrobat/apsb21-09.html |
 |
155 |
Windows TCP/IP 遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-26424 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424 |
 |
154 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-36926 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36926 |
 |
153 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-26433 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26433 |
 |
152 |
Windows Services for NFS ONCRPC XDR Drive 遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-26432 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26432 |
 |
151 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-36933 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36933 |
 |
150 |
Windows Services for NFS ONCRPC XDR Drive 信息泄露漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-36932 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36932 |
 |
149 |
Foxit PDF Reader Annotation 釋放後使用遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-34847 |
https://www.zerodayinitiative.com/advisories/ZDI-21-929/ |
 |
148 |
Foxit PDF Reader Annotation 釋放後使用遠程代碼執行漏洞 |
2021-08-01 |
奇安信代碼安全實驗室 |
CVE-2021-34846 |
https://www.zerodayinitiative.com/advisories/ZDI-21-928/ |
 |
147 |
Windows DNS 服務器拒絕服務漏洞 (RCE) |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-34444 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34444 |
 |
146 |
Windows DNS 服務器拒絕服務漏洞 (RCE) |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-34442 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34442 |
 |
145 |
Windows DNS 服務器拒絕服務漏洞 (RCE) |
2021-07-01 |
奇安信代碼安全實驗室 |
CVE-2021-33745 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33745 |
 |
144 |
VMware Tools for Windows 的VM3DMP中存在拒絕服務漏洞 |
2021-06-01 |
奇安信代碼安全實驗室 |
CVE-2021-21997 |
https://www.vmware.com/security/advisories/VMSA-2021-0011.html |
 |
143 |
RedHat coders/tiff.c 中ReadTIFFImage()中的ImageMagick存在堆緩衝區溢出漏洞 |
2021-06-01 |
奇安信代碼安全實驗室 |
CVE-2021-3610 |
https://bugzilla.redhat.com/show_bug.cgi?id=1973689 |
 |
142 |
谷歌Chrome Aura 組件中的競爭條件漏洞 |
2021-05-02 |
奇安信代碼安全實驗室 |
CVE-2021-30510 |
https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop.html |
 |
141 |
Tenda eCos遠程代碼執行漏洞4 |
2021-05-03 |
技術研究院天工實驗室 |
CVE-2021-31758 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31758 |
 |
140 |
Tenda eCos遠程代碼執行漏洞3 |
2021-05-03 |
技術研究院天工實驗室 |
CVE-2021-31755 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31755 |
 |
139 |
Tenda eCos遠程代碼執行漏洞2 |
2021-05-02 |
技術研究院天工實驗室 |
CVE-2021-31757 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31757 |
 |
138 |
Tenda eCos遠程代碼執行漏洞1 |
2021-05-02 |
技術研究院天工實驗室 |
CVE-2021-31756 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31756 |
 |
137 |
Apache Solr服務器端請求偽造漏洞 |
2021-04-20 |
奇安信CERT |
CVE-2021-27905 |
https://solr.apache.org/security.html#cve-2021-27905-ssrf-vulnerability-with-the-replication-handler |
 |
136 |
Windows DNS 信息泄露漏洞 |
2021-04-14 |
奇安信代碼安全實驗室 |
CVE-2021-28323 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28323 |
 |
135 |
Windows DNS 信息泄露漏洞 |
2021-04-14 |
奇安信代碼安全實驗室 |
CVE-2021-28328 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28328 |
 |
134 |
Windows Network File System 遠程代碼執行漏洞 |
2021-04-14 |
奇安信代碼安全實驗室 |
CVE-2021-28445 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28445 |
 |
133 |
Adobe Acrobat 和 Reader 的 Windows 和 macOS 版任意代碼執行漏洞 |
2021-02-09 |
奇安信代碼安全實驗室 |
CVE-2021-21036 |
https://helpx.adobe.com/cn/security/products/acrobat/apsb21-09.html |
 |
132 |
谷歌 Chrome Aura 組件中的釋放後使用漏洞 |
2021-03-31 |
奇安信代碼安全實驗室 |
CVE-2021-21199 |
https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_30.html |
 |
131 |
微軟DNS服務器遠程代碼執行漏洞 |
2021-02-10 |
奇安信代碼安全實驗室 |
CVE-2021-24078 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24078 |
 |
130 |
微軟Windows WLAN 服務提權漏洞 |
2021-01-13 |
奇安信代碼安全實驗室 |
CVE-2021-1646 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1646 |
 |
129 |
微軟Windows Win32k 提權漏洞 |
2021-01-13 |
奇安信代碼安全實驗室 |
CVE-2021-1709 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1709 |
 |
128 |
谷歌 Chrome自動填充組件中的沙箱外使用後釋放漏洞 |
2021-01-07 |
奇安信代碼安全實驗室 |
CVE-2020-21106 |
https://chromereleases.googleblog.com/ |
 |
127 |
Microsoft Exchange遠程代碼執行漏洞 |
2020-12-09 |
奇安信A-TEAM |
CVE-2020-17144 |
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17144 |
 |
126 |
TP-Link 16款VxWorks路由器設備緩衝區溢出漏洞 |
2020-11-16 |
奇安信技術研究院 |
CVE-2020-28877 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28877 |
 |
125 |
中興通訊E8810/E8820/E8822系列路由器存在信息泄露漏洞 |
2020-12-17 |
清華-奇安信聯合研究中心 |
CVE-2020-6882 |
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014182 |
 |
124 |
中興通訊E8810/E8820/E8822系列路由器存在MQTT拒絕服務漏洞 |
2020-12-17 |
清華-奇安信聯合研究中心 |
CVE-2020-6881 |
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1014182 |
 |
123 |
Windows MSCTF Server信息泄漏漏洞 |
2020-11-11 |
奇安信代碼安全實驗室 |
CVE-2020-17030 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17030 |
 |
122 |
Win32k 提權漏洞 |
2020-11-11 |
奇安信代碼安全實驗室 |
CVE-2020-17038 |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17038 |
 |
121 |
Oracle WebLogic Server遠程代碼執行漏洞 |
2020-11-01 |
奇安信A-TEAM |
cve-2020-14750 |
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html |
 |
120 |
Oracle WebLogic Server 遠程代碼執行漏洞 |
2020-10-20 |
奇安信A-TEAM |
cve-2020-14841 |
https://www.oracle.com/security-alerts/cpuoct2020.html |
 |
119 |
Oracle CVE-2020-14882 (WebLogic Server) 漏洞繞過 |
2020-11-02 |
奇安信代碼安全實驗室 |
CVE-2020-14750 |
https://www.oracle.com/security-alerts/alert-cve-2020-14750.html |
 |
118 |
谷歌 PDFium 釋放後使用高危漏洞 |
2020-10-21 |
奇安信代碼安全實驗室 |
CVE-2020-16002 |
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html |
 |
117 |
Windows Spoofing Vulnerability |
2020-10-14 |
奇安信威脅情報中心 |
CVE-2020-16922 |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16922 |
 |
116 |
Windows Text Services Framework信息泄漏漏洞 |
2020-10-14 |
奇安信代碼安全實驗室 |
CVE-2020-16921 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16921 |
 |
115 |
Windows Application Compatibility Client Library 提權漏洞 |
2020-10-14 |
奇安信代碼安全實驗室 |
CVE-2020-16920 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-16920 |
 |
114 |
RedHat oVirt URL 重定向漏洞 |
2020-09-25 |
奇安信代碼安全實驗室 |
CVE-2020-10775 |
https://access.redhat.com/security/cve/CVE-2020-10775 https://gerrit.ovirt.org/#/c/111277/ https://github.com/oVirt/ovirt-engine/commit/362a2a8f8eca542b48a1bba7f9c827fbc44bc955 https://bugzilla.redhat.com/show_bug.cgi?id=1858184 https://bugzilla.redhat.com/show_bug.cgi?id=1866688 |
 |
113 |
RedHat oVirt XSS 漏洞 |
2020-09-25 |
奇安信代碼安全實驗室 |
CVE-2020-14333 |
https://access.redhat.com/security/cve/CVE-2020-14333 https://gerrit.ovirt.org/#/c/111277/ https://github.com/oVirt/ovirt-engine/commit/362a2a8f8eca542b48a1bba7f9c827fbc44bc955 https://bugzilla.redhat.com/show_bug.cgi?id=1858184 https://bugzilla.redhat.com/show_bug.cgi?id=1866688 |
 |
112 |
Win32k 信息泄露漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1250 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1250 |
 |
111 |
Windows 提權漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1052 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1052 |
 |
110 |
Windows DHCP 服務器信息泄露漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1031 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1031 |
 |
109 |
Windows 內核信息泄露漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-0928 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0928 |
 |
108 |
Windows DNS 拒絕服務漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-1228 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1228 |
 |
107 |
Windows DNS 拒絕服務漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-0836 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0836 |
 |
106 |
Windows Cryptographic Catalog Services 提權漏洞 |
2020-09-09 |
奇安信代碼安全實驗室 |
CVE-2020-0782 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0782 |
 |
105 |
紅帽QEMU 界外訪問 |
2020-04-06 |
奇安信代碼安全實驗室 |
CVE-2020-11102 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102 |
 |
104 |
Juniper Networks Junos 15.1-19.2版本JDHCP 服務 |
2020-01-01 |
奇安信代碼安全實驗室 |
CVE-2020-1609 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981 |
 |
103 |
Juniper Networks Junos 15.1-19.2版本JDHCP 服務 |
2020-01-01 |
奇安信代碼安全實驗室 |
CVE-2020-1605 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981 |
 |
102 |
Juniper Networks Junos 15.1-19.2版本JDHCP 服務 |
2020-01-01 |
奇安信代碼安全實驗室 |
CVE-2020-1602 |
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10981 |
 |
101 |
Linux 內核4.14.x 和4.19.x 穩定版內核中的釋放後使用漏洞 |
2020-01-14 |
奇安信代碼安全實驗室 |
CVE-2020-7053 |
https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks@canonical.com/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053 |
 |
100 |
紅帽QEMU 仿真器 XGMAC 以太網控制器中的緩衝溢出 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-15863 |
https://access.redhat.com/security/cve/CVE-2020-15863 |
 |
99 |
紅帽網絡數據包處理組件中QEMU斷言失敗 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-16092 |
https://access.redhat.com/security/cve/CVE-2020-16092 |
 |
98 |
紅帽QEMU拒絕服務 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-14415 |
https://access.redhat.com/security/cve/CVE-2020-14415 |
 |
97 |
紅帽QEMU 仿真器的 SM501 顯示驅動實現中存在一個整數溢出漏洞 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-12829 |
https://access.redhat.com/security/cve/CVE-2020-12829 |
 |
96 |
紅帽QEMU 的 USB 仿真器中存在越界讀/寫訪問問題 |
2020-08-25 |
奇安信代碼安全實驗室 |
CVE-2020-14364 |
https://access.redhat.com/security/cve/CVE-2020-14364 |
 |
95 |
華為 Switch 系列設備漏洞 |
2019-05-22 |
奇安信代碼安全實驗室 |
CVE-2019-5285 |
https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190522-01-switch-cn |
 |
94 |
Oracle VM VirtualBox 拒絕服務漏洞 |
2020-05-22 |
奇安信代碼安全實驗室 |
CVE-2020-14715 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
 |
93 |
Oracle VM VirtualBox 拒絕服務漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14714 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
 |
92 |
Oracle VM VirtualBox 拒絕服務漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14707 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
 |
91 |
Oracle VM VirtualBox 整數溢出和越界讀取漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14700 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
 |
90 |
Oracle VM VirtualBox 整數溢出和越界讀取漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14699 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
 |
89 |
Oracle VM VirtualBox 整數溢出和越界讀取漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-14698 |
https://www.oracle.com/security-alerts/cpujul2020verbose.html#OVIR |
 |
88 |
“重要”級別的微軟Windows 內核信息泄露漏洞 |
2020-07-15 |
奇安信代碼安全實驗室 |
CVE-2020-1426 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1426 |
 |
87 |
微軟 Graphics Components 遠程代碼執行漏洞 |
2020-05-13 |
奇安信代碼安全實驗室 |
CVE-2020-1153 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1153 |
 |
86 |
Oracle Virtualbox 拒絕服務漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-2959 |
https://www.oracle.com/security-alerts/cpuapr2020verbose.html#OVIR |
 |
85 |
微軟Microsoft Graphics Component信息泄露漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-1005 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1005 |
 |
84 |
微軟Windows DNS 拒絕服務漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0993 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0993 |
 |
83 |
微軟Win32k 提權漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0958 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0958 |
 |
82 |
微軟Win32k 提權漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0957 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0957 |
 |
81 |
微軟Adobe Font Manager Library 遠程代碼執行漏洞 |
2020-04-15 |
奇安信代碼安全實驗室 |
CVE-2020-0938 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0938 |
 |
80 |
微軟Win32k 提權漏洞 |
2020-03-11 |
奇安信代碼安全實驗室 |
CVE-2020-0762 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0762 |
 |
79 |
微軟WindowsDefender Security Center提權漏洞 |
2020-03-11 |
奇安信代碼安全實驗室 |
CVE-2020-0877 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0877 |
 |
78 |
微軟ChakraCore 腳本引擎內存損壞漏洞 |
2020-03-11 |
奇安信代碼安全實驗室 |
CVE-2020-0848 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0848 |
 |
77 |
Oracle Fusion Middleware WebCenter Sites 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14652 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
76 |
Oracle Fusion Middleware WebLogic Server Core組件安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14645 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
75 |
Oracle Fusion Middleware WebLogic Server 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14640 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
74 |
Oracle Fusion Middleware WebLogic Server 信息泄露漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14639 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
73 |
Oracle Fusion Middleware WebLogic Server 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14638 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
72 |
Oracle Fusion Middleware WebLogic Server 安全漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14637 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
71 |
Oracle Fusion Middleware WebLogic Server 信息泄露漏洞 |
2020-07-01 |
奇安信A-TEAM |
CVE-2020-14636 |
https://www.oracle.com/security-alerts/cpujul2020.html |
 |
70 |
FasterXML jackson-databind 代碼問題漏洞 |
2020-04-01 |
奇安信 A-TEAM |
CVE-2020-11620 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
 |
69 |
Oracle Virtualization VM VirtualBox 安全漏洞 |
2020-04-01 |
奇安信 A-TEAM |
CVE-2020-2908 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
 |
68 |
Oracle Weblogic Server遠程信息泄露漏洞 |
2020-04-01 |
奇安信A-TEAM |
CVE-2020-2829 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
 |
67 |
Weblogic 遠程代碼執行漏洞 |
2020-04-01 |
奇安信 A-TEAM |
CVE-2020-2798 |
https://www.oracle.com/security-alerts/cpuapr2020.html |
 |
66 |
Weblogic遠程代碼執行漏洞 |
2018-11-07 |
奇安信 A-TEAM |
CVE-2018-3245 |
https://www.oracle.com/security-alerts/cpuoct2018.html |
 |
65 |
微軟“重要”的WindowsGraphics 組件提權漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0745 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0745 |
 |
64 |
微軟“重要”的Win32k 信息泄露漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0717 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0717 |
 |
63 |
微軟“重要”的Win32k 信息泄露漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0716 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0716 |
 |
62 |
微軟“重要”的WindowsGraphics 組件提權漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0715 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0715 |
 |
61 |
微軟“嚴重”的腳本引擎內存損壞漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0712 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0712 |
 |
60 |
微軟“嚴重”的腳本引擎內存損壞漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0710 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0710 |
 |
59 |
微軟“嚴重”的遠程任意代碼可執行漏洞 |
2020-02-12 |
奇安信代碼安全實驗室 |
CVE-2020-0662 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0662 |
 |
58 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1434 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1434 |
 |
57 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1435 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1435 |
 |
56 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1433 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1433 |
 |
55 |
微軟提權漏洞 |
|
奇安信代碼安全實驗室 |
CVE-2019-1407 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1407 |
 |
54 |
微軟Win32k 信息泄露漏洞 |
2020-01-15 |
奇安信代碼安全實驗室 |
CVE-2020-0608 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0608 |
 |
53 |
VMware 聲卡設備的uaf漏洞 |
2019-09-19 |
奇安信代碼安全實驗室 |
CVE-2019-5527 |
https://www.vmware.com/security/advisories/VMSA-2019-0014.html |
 |
52 |
微軟Windows 內核信息泄漏漏洞 |
2019-08-13 |
奇安信代碼安全實驗室 |
CVE-2020-1228 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1228 |
 |
51 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9704 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
50 |
Stack exhaustion |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9703 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
49 |
Stack exhaustion |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9702 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
48 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9701 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
47 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9700 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
46 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9699 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
45 |
Buffer error |
2020-08-11 |
奇安信技術研究院 |
CVE-2020-9698 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-48.html |
 |
44 |
Stack-based buffer overflow |
2020-03-17 |
奇安信技術研究院 |
CVE-2020-3799 |
https://helpx.adobe.com/si/security/products/acrobat/apsb20-13.html |
 |
43 |
Exim 遠程堆溢出漏洞 |
|
|
CVE-2019-16928 |
https://seclists.org/oss-sec/2019/q3/256 |
 |
42 |
Windows內核高危漏洞 |
|
|
CVE-2019-1285 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1285 |
 |
41 |
Edge瀏覽器高危漏洞 |
|
|
CVE-2019-1217 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1217 |
 |
40 |
Chrome瀏覽器中的UAF漏洞 |
|
|
CVE-2019-5866 |
https://chromereleases.googleblog.com/2019/07/stable-channel--for-desktop.html |
 |
39 |
Vmware 溢出漏洞 |
|
|
CVE-2019-5527 |
https://www.vmware.com/security/advisories/VMSA-2019-0014.html |
 |
38 |
Acrobat Reader DC中的uaf漏洞 |
|
|
CVE-2019-8031 |
https://helpx.adobe.com/security/products/acrobat/apsb19-41.html |
 |
37 |
Acrobat Reader DC中的uaf漏洞 |
|
|
CVE-2019-8030 |
https://helpx.adobe.com/security/products/acrobat/apsb19-41.html |
 |
36 |
Acrobat Reader DC中的uaf漏洞 |
|
|
CVE-2019-8029 |
https://helpx.adobe.com/security/products/acrobat/apsb19-41.html |
 |
35 |
越權啓用WiFi DIR-823G SetWLanRadioSettings Guest-WiFi Enable |
|
|
CVE-2019-8392 |
https://github.com/leonW7/D-Link/blob/master/Vul_6.md |
 |
34 |
局域網DNS劫持 DIR-823G SetWanSettings DNS Hijack |
|
|
CVE-2019-7390 |
http://www.securityfocus.com/bid/106855 https://github.com/leonW7/D-Link/blob/master/Vul_5.md |
 |
33 |
遠程拒絕服務 DIR-823G SetFactoryDefault DoS |
|
|
CVE-2019-7389 |
http://www.securityfocus.com/bid/106853 https://github.com/leonW7/D-Link/blob/master/Vul_4.md |
 |
32 |
遠程信息泄露 DIR-823G GetClientInfo InfoLeak |
|
|
CVE-2019-7388 |
http://www.securityfocus.com/bid/106852 https://github.com/leonW7/D-Link/blob/master/Vul_3.md |
 |
31 |
遠程命令注入 DIR-823G HNAP_Entry_Func CMD Injection |
|
|
CVE-2019-7298 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7298 http://www.securityfocus.com/bid/106814 |
 |
30 |
遠程命令注入 DIR-823G GetNetwork TomographyResult CMD Injection |
|
|
CVE-2019-7297 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7297 http://www.securityfocus.com/bid/106815 |
 |
29 |
Win32k Elevation of Privilege Vulnerability |
|
|
CVE-2019-0960 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0960 |
 |
28 |
Windows NTLM Tampering Vulnerability |
|
|
CVE-2019-1040 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1040 |
 |
27 |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
|
|
CVE-2019-0724 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0724 |
 |
26 |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
|
|
CVE-2019-0686 |
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0686 |
 |
25 |
Motorola SetSmartQoSSettings CMD Injection |
|
|
CVE-2019-9121 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9121 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetSmartQoSSettings.md |
 |
24 |
Motorola SetWLanACLSettings CMD Injection |
|
|
CVE-2019-9120 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9120 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetWLanACLSettings.md |
 |
23 |
Motorola SetStaticRouteSettings CMD Injection |
|
|
CVE-2019-9119 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9119 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetStaticRouteSettings.md |
 |
22 |
Motorola SetStaticRouteSettings CMD Injection |
|
|
CVE-2019-9118 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9118 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetNTPServerSettings.md |
 |
21 |
Motorola SetStaticRouteSettings CMD Injection |
|
|
CVE-2019-9117 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9117 https://github.com/lieanu/vuls/blob/master/motorola/M2_C1/SetNetworkTomographySettings.md |
 |
20 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7461 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7461 |
 |
19 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7460 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7460 |
 |
18 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7459 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7459 |
 |
17 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7458 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7458 |
 |
16 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7457 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7457 |
 |
15 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7456 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7456 |
 |
14 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7455 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7455 |
 |
13 |
內存溢出 Mikrotik RouteOS smb remote DOS |
|
|
CVE-2019-7454 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7454 |
 |
12 |
libsass內存溢出漏洞 |
|
|
CVE-2019-6286 |
https://github.com/sass/libsass/issues/2815 |
 |
11 |
yaml-cpp內存溢出漏洞 |
|
|
CVE-2019-6285 |
https://github.com/jbeder/yaml-cpp/issues/660 |
 |
10 |
libsass內存溢出漏洞 |
|
|
CVE-2019-6284 |
https://github.com/sass/libsass/issues/2816 |
 |
9 |
libsass內存溢出漏洞 |
|
|
CVE-2019-6283 |
https://github.com/sass/libsass/issues/2814 |
 |
8 |
D-Link SetStaticRoute CMD Injection |
|
|
CVE-2019-8319 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8319 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/staticrouterv4.md |
 |
7 |
D-Link SetSysEmailSettings CMD Injection |
|
|
CVE-2019-8318 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8318 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/mail.md |
 |
6 |
D-Link SetStaticRoute CMD Injection |
|
|
CVE-2019-8317 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8317 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/staticrouterv6.md |
 |
5 |
D-Link SetWebFilterSettings CMD Injection |
|
|
CVE-2019-8316 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8316 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/webfilter.md |
 |
4 |
D-Link SetStaticRoute CMD Injection |
|
|
CVE-2019-8315 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8315 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/firewallv4.md |
 |
3 |
D-Link SetQoSSettings CMD Injection |
|
|
CVE-2019-8314 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8314 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/qos.md |
 |
2 |
D-Link SetIPv6FirewallSettings CMD Injection |
|
|
CVE-2019-8313 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8313 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/firewallv6.md |
 |
1 |
D-linkSetSysLogSettingsCMD Injection |
|
|
CVE-2019-8312 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8312 https://github.com/lieanu/vuls/blob/master/dlink/DIR-878/syslog.md |
 |