最近更新的插件

ID名称产品系列最近更新时间严重程度
63267MediaWiki < 1.18.6 / 1.19.3 / 1.20.1 多种漏洞NessusCGI abuses2025/5/14
medium
63201用于 Joomla! 的 RWCards 组件“mosConfig_absolute_path”参数远程文件包含NessusCGI abuses2025/5/14
critical
63079Piwik core/Loader.php 有特洛伊木马的发行版本NessusCGI abuses2025/5/14
high
63064WordPress 的 Wordfence 插件的“email”参数 XSSNessusCGI abuses : XSS2025/5/14
medium
62939用于 Joomla! 的 Freestyle Testimonials 组件不明 SQLiNessusCGI abuses2025/5/14
high
62938用于 Joomla! 的 Freestyle Support Portal 组件“prodid”参数 SQLiNessusCGI abuses2025/5/14
high
62414WordPress A Page Flip Book Plugin for WordPress“pageflipbook_language”参数本地文件包含NessusCGI abuses2025/5/14
critical
62368MediaWiki index.php“uselang”参数 XSSNessusCGI abuses : XSS2025/5/14
medium
62358MediaWiki < 1.18.5/1.19.2 多种漏洞NessusCGI abuses2025/5/14
high
62314Mac Photo Gallery Plugin for WordPress“macphtajax.php”访问限制绕过NessusCGI abuses2025/5/14
medium
62205Mac Photo Gallery for WordPress“albid”参数遍历任意文件访问NessusCGI abuses2025/5/14
medium
62124LogAnalyzer index.php“highlight”参数 XSSNessusCGI abuses : XSS2025/5/14
medium
62123LogAnalyzer index.php 'filter' 参数 XSSNessusCGI abuses : XSS2025/5/14
medium
62046WordPress < 3.4.2 多个漏洞NessusCGI abuses2025/5/14
medium
62008Cloudsafe365 Plugin for WordPress“file”参数遍历任意文件访问NessusCGI abuses2025/5/14
medium
60140Cisco TelePresence Multipoint Switch XML-RPC DoS (cisco-sa-20110223-telepresence-ctms)NessusCGI abuses2025/5/14
high
60139Cisco TelePresence Multipoint Switch < 1.7.0 多个漏洞 (cisco-sa-20110223-telepresence-ctms)NessusCGI abuses2025/5/14
critical
60100WordPress < 3.4.1 多个漏洞NessusCGI abuses2025/5/14
medium
59836Symantec Message Filter 多个漏洞 (SYM12-010)NessusCGI abuses2025/5/14
medium
59569MailEnable ForgottenPassword.aspx Username 参数 XSSNessusCGI abuses : XSS2025/5/14
medium
59402Cobbler xmlrpc API power_system 方法远程 Shell 命令执行NessusCGI abuses2025/5/14
high
59387WordPress 的 Pretty Link 插件“pretty-bar.php”“url”参数 XSSNessusCGI abuses : XSS2025/5/14
medium
59359Liferay Portal 6.1.0 转发目标处理安全绕过NessusCGI abuses2025/5/14
critical
59329Atlassian JIRA < 5.0.1 XML 解析 DoSNessusCGI abuses2025/5/14
medium
59328Atlassian FishEye 2.5.8 / 2.6.8 / 2.7.12 XML 解析漏洞NessusCGI abuses2025/5/14
high
59311WordPress 的 Sharebar 插件“sharebar-admin.php”“status”参数 XSSNessusCGI abuses : XSS2025/5/14
medium
59232Liferay Portal 6.1.0“addUser()”安全绕过NessusCGI abuses2025/5/14
critical
59048WordPress < 3.3.2 多个漏洞NessusCGI abuses2025/5/14
critical
58965MediaWiki < 1.17.3/1.18.2 多种漏洞NessusCGI abuses2025/5/14
medium
58907Moodle MSA-11-0007“coursetags_more.php”XSSNessusCGI abuses : XSS2025/5/14
medium
58516HP OpenView Network Node Manager 多个代码执行漏洞 (HPSBMU02712 SSRT100649)NessusGain a shell remotely2025/5/14
critical
58385WordPress 的 TheCartPress 插件“tcp_class_path”参数远程文件包含NessusCGI abuses2025/5/14
high
58274WordPress ToolsPack 插件后门NessusCGI abuses2025/5/14
high
58088FreePBX gen_amp_conf.php 信息泄露NessusCGI abuses2025/5/14
high
58010Horde 3.3.12 open_calendar.js 后门NessusCGI abuses2025/5/14
high
57850Apache Struts 2 ParameterInterceptor 类 OGNL 表达式解析远程命令执行NessusCGI abuses2025/5/14
critical
57767Symantec Endpoint Protection Manager TestConnection.jsp“Msg”参数 XSS(SYM11-009 和 SYM12-001)NessusCGI abuses : XSS2025/5/14
medium
57617Cacti < 0.8.7g 多种 XSS 和 HTML 注入漏洞NessusCGI abuses : XSS2025/5/14
medium
57394TYPO3“AbstractController.php”“BACK_PATH”参数远程文件包含NessusCGI abuses2025/5/14
medium
56735TimThumb 缓存目录“src”参数任意 PHP 文件上传NessusCGI abuses2025/5/14
high
56620WordPress < 3.1.4 / 3.2-RC3 Multiple Blind SQL Injection VulnerabilitiesNessusCGI abuses2025/5/14
medium
56512MyBB 1.6.4 后门程序 PHP 远程代码执行NessusCGI abuses2025/5/14
high
56485Cisco Unified Operations Manager < 8.6 多种漏洞NessusCGI abuses2025/5/14
critical
56166HP Client Automation radexecd.exe 远程命令执行NessusWindows2025/5/14
critical
56091Zabbix < 1.8.6 多种漏洞NessusCGI abuses2025/5/14
medium
55975Apache Hadoop Jetty XSSNessusCGI abuses : XSS2025/5/14
medium
55801MS11-061:远程桌面 Web 访问中的漏洞可允许权限提升 (2546250)(无凭据检查)NessusCGI abuses : XSS2025/5/14
medium
55669用于 Joomla! 的 AlphaRegistration 组件“email”参数 SQLiNessusCGI abuses2025/5/14
medium
55623AllVideos Reloaded! Plugin for Joomla! divid 参数 SQL 注入NessusCGI abuses2025/5/14
high
55443适用于 WordPress 的 WPtouch 插件“wptouch_redirect”参数 URL 重定向NessusCGI abuses2025/5/14
medium