- 70e571ad63d6c69b81eb3b8b2fe61a27 |
- CVE-2024-47176 |
- 2024-09-26 22:15:04 |
- CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. |
- 详情 |
-
-
-
- fa873eefdfd0796ea7b9759e14514a87 |
- CVE-2024-47076 |
- 2024-09-26 22:15:04 |
- CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system. |
- 详情 |
-
-
- 眈眈探求 | TITLE
URL |
+
+ 4662a1748bfb85feeeddf8e893063653 |
+ CVE-2024-22444 |
+ 2024-09-30 09:25:44 |
+ Hewlett Packard Enterprise EdgeConnect SD-WAN Orchestr跨站脚本漏洞 |
+ 详情 |
+
+
+
+ dc195cc9c4c4e360282a5ed50116a092 |
+ CVE-2024-31971 |
+ 2024-09-30 09:25:44 |
+ Adtran NetVanta 3120跨站脚本漏洞 |
+ 详情 |
+
+
+
+ f36ebcf6f85b724942b36921a80c93f5 |
+ CVE-2024-22443 |
+ 2024-09-30 09:25:44 |
+ Hewlett Packard Enterprise EdgeConnect SD-WAN Orchestr服务器端原型污染漏洞 |
+ 详情 |
+
+
+
+ c8d2b3ed196270e069ecbf90787011d4 |
+ CVE-2024-3454 |
+ 2024-09-30 09:25:44 |
+ Connectivity Standards Alliance Matter实施不当漏洞 |
+ 详情 |
+
+
+
+ 096bc66de86be11d2dccee630f4021e7 |
+ CVE-2024-6755 |
+ 2024-09-30 09:25:44 |
+ WordPress Social Auto Poster Plugin未授权数据修改和丢失漏洞 |
+ 详情 |
+
+
+
+ 01ca13108a9c120c7e760afa311561b7 |
+ CVE-2024-3246 |
+ 2024-09-30 09:25:44 |
+ WordPress LiteSpeed Cache Plugin跨站请求伪造漏洞 |
+ 详情 |
+
+
+
+ 51663aaa468c6e58e13f0f64b5459034 |
+ CVE-2024-7027 |
+ 2024-09-30 09:25:44 |
+ WordPress WooCommerce - PDF Vouchers Plugin身份认证绕过漏洞 |
+ 详情 |
+
+
+
+ 5788760d184ef14482c35dae3d756e56 |
+ CVE-2024-6836 |
+ 2024-09-30 09:25:44 |
+ WordPress Funnel Builder Plugin未授权数据修改漏洞 |
+ 详情 |
+
+
+
+ cd6d40bc3ce86af8ffb5ee561580c06b |
+ CVE-2023-32466 |
+ 2024-09-30 09:25:44 |
+ Dell Edge Gateway BIOS 3200和5200越界写入漏洞 |
+ 详情 |
+
+
+
+ 81058c7f45820b04b6ef6b6d72cfb306 |
+ CVE-2024-3896 |
+ 2024-09-30 09:25:44 |
+ WordPress Photo Gallery, Images, Slider in Rbs Image Galler跨站脚本漏洞 |
+ 详情 |
+
+
+
+ 4f3953e13f56205c65900f7628e162f4 |
+ CVE-2024-6327 |
+ 2024-09-30 09:25:44 |
+ Progress Software Telerik Reporting不受信数据反序列化漏洞 |
+ 详情 |
+
+
+
+ e1dad3811521f73d6a1c6647028a0987 |
+ CVE-2024-39345 |
+ 2024-09-30 09:25:44 |
+ Adtran NetVanta 3120操作系统命令注入漏洞 |
+ 详情 |
+
+
+
+ 6e122ed3c1b85bc4253d7bb1fa25ec8a |
+ CVE-2024-39702 |
+ 2024-09-30 09:25:44 |
+ OpenResty拒绝服务漏洞 |
+ 详情 |
+
+
+
+ 3335bb323287482f3b8d0cf7c8964515 |
+ CVE-2024-6896 |
+ 2024-09-30 09:25:44 |
+ WordPress AMP for WP – Accelerated Mobile Pages Plugin跨站脚本漏洞 |
+ 详情 |
+
+
+
+ b0b258ce5b2ba52b1010c482bbed5e66 |
+ CVE-2023-45249 |
+ 2024-09-30 09:25:44 |
+ Acronis Cyber Infrastructure远程命令执行漏洞 |
+ 详情 |
+
+
4966eb50a7c846062b18eb1e4877f31d |
CVE-2024-40502 |
@@ -2099,126 +2219,6 @@
-
- b296d3fd2d93724e0d5a88f3c8e5776e |
- CVE-2024-34919 |
- 2024-09-29 03:30:28 |
- SourceCodester Pisay Online E-Learning System任意文件上传漏洞 |
- 详情 |
-
-
-
- b58ee10aa79ef9629bffa6e75b87a87b |
- CVE-2024-34982 |
- 2024-09-29 03:30:28 |
- LyLme Spage任意文件上传漏洞 |
- 详情 |
-
-
-
- cad12feee1b60ee530ed7bf3fd3a24c3 |
- CVE-2024-5042 |
- 2024-09-29 03:30:28 |
- Submariner Operator访问控制权限错误漏洞 |
- 详情 |
-
-
-
- b32ca4bb12d1ff7277420b429175653f |
- CVE-2024-5051 |
- 2024-09-29 03:30:28 |
- Mayuri K. Gas Agency Management System SQL注入漏洞 |
- 详情 |
-
-
-
- fda7506156aa9b46ef8c95063389ba2c |
- CVE-2024-22429 |
- 2024-09-29 03:30:28 |
- Dell BIOS输入验证错误漏洞 |
- 详情 |
-
-
-
- 3c4de0a749f035e28b352cf1befa6073 |
- CVE-2024-31974 |
- 2024-09-29 03:30:28 |
- Solarized FireDown Browser & Downloader任意代码执行漏洞 |
- 详情 |
-
-
-
- c15fc945e35579b80b95f28647877c53 |
- CVE-2024-34241 |
- 2024-09-29 03:30:28 |
- Rocketsoft Rocket LMS跨站脚本漏洞 |
- 详情 |
-
-
-
- 3397959ab19a17d6b37905df64d1f95f |
- CVE-2024-5072 |
- 2024-09-29 03:30:28 |
- Devolutions Server输入验证错误漏洞 |
- 详情 |
-
-
-
- 60e1dd7b22402bef5d04b51673a2a3eb |
- CVE-2023-5597 |
- 2024-09-29 03:30:28 |
- Dassault Systèmes 3DEXPERIENCE存储型跨站脚本漏洞 |
- 详情 |
-
-
-
- 0d55339e9187a3af3b107e5b41d43773 |
- CVE-2024-3291 |
- 2024-09-29 03:30:28 |
- Tenable Network Security Nessus Agent权限升级漏洞 |
- 详情 |
-
-
-
- 7a824b23cfdc66097432207d11081bab |
- CVE-2024-3292 |
- 2024-09-29 03:30:28 |
- Tenable Network Security Nessus Agent竞争条件漏洞 |
- 详情 |
-
-
-
- 045727b827309669c4496dfbf96228b6 |
- CVE-2021-22508 |
- 2024-09-29 03:30:28 |
- OpenText Operations Bridge Reporter SQL注入漏洞 |
- 详情 |
-
-
-
- dd3dbb4b0dc5711d9f37791bf906db50 |
- CVE-2024-34997 |
- 2024-09-29 03:30:28 |
- joblib反序列化漏洞 |
- 详情 |
-
-
-
- 1e2aad5e80ce9133a3c2b3ecb132c912 |
- CVE-2024-5064 |
- 2024-09-29 03:30:28 |
- PHPGurukul Online Course Registration System SQL注入漏洞 |
- 详情 |
-
-
-
- 862a89742d6954387d39cbbc0081ea23 |
- CVE-2024-34959 |
- 2024-09-29 03:30:28 |
- Desdev DedeCMS跨站脚本漏洞 |
- 详情 |
-
-