🚨 最新安全公告
- GHSA-j3vx-cx2r-pvg8 [high] — Network-AI: Unauthenticated Cross-Origin MCP Tool Invocation via Empty Default Secret
- GHSA-f396-4rp4-7v2j [critical] — Boxlite: Path Traversal Vulnerability Leads to Arbitrary File Write on the Host
- GHSA-g6ww-w5j2-r7x3 [critical] — BoxLite: Permission Bypass Allows Modification of Read-Only Files
- GHSA-qv2q-c278-pch5 [low] — ImageMagick: Information Disclosure in PasskeyEncipherImage via AES-CTR nonce reuse
- GHSA-vf33-6r7x-66xx [low] — ImageMagick: Division by Zero in binomial kernel
📡 数据来源: GitHub Security Advisories · 由 PingSec 安全日报自动生成
💡 点击标题查看详情,返回首页查看更多历史文章