AI 创业公司零一万物 CEO 李开复表示,在 AI 的部分领域中美之间的差距仅为三个月。他说,“以前我认为差距是六到九个月,而且是全方面落后。现在我认为,在部分核心技术上可能落后三个月,在某些特定领域实际上处于领先位置。”李开复称 DeepSeek 的成功表明中国在基础设施软件工程等领域领先。李开复还认为,美国限制向中国出口先进 AI 芯片是一把双刃剑,促使中国公司进行创新。
A vulnerability was found in GetShop ecommerce Plugin up to 1.3 on WordPress and classified as critical. This issue affects some unknown processing. The manipulation leads to file inclusion.
The identification of this vulnerability is CVE-2024-54362. The attack may be initiated remotely. There is no exploit available.
A vulnerability has been found in Rizzi Guestbook Plugin up to 4.0.1 on WordPress and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-26573. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Super Responsive Slider Plugin up to 1.4 on WordPress. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-22575. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in RDP Linkedin Login Plugin up to 1.7.0 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-23542. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Google Plus Plugin up to 1.0.2 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-23964. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in GlobalPayments WooCommerce Plugin up to 1.12.1 on WordPress. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting.
This vulnerability was named CVE-2025-22767. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in Custom Field List Widget Plugin up to 1.5.1 on WordPress. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to file inclusion.
The identification of this vulnerability is CVE-2025-23952. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Já-Já Pagamentos for WooCommerce Plugin up to 1.3.0 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2024-51624. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Site Editor Google Map Plugin up to 1.0.1 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-23466. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in Schedule Plugin up to 1.0.0 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection.
This vulnerability is known as CVE-2025-22523. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in LinkedIn Lite Plugin up to 1.0 on WordPress. Affected is an unknown function. The manipulation leads to file inclusion.
This vulnerability is traded as CVE-2025-23937. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Formality Plugin up to 1.5.7 on WordPress. This vulnerability affects unknown code. The manipulation leads to file inclusion.
This vulnerability was named CVE-2025-24690. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in User Registration & Membership Plugin up to 4.1.1 on WordPress. This issue affects the function prepare_members_data. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2025-2563. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in Hostiko Plugin up to 30.0 on WordPress. This affects an unknown part. The manipulation leads to file inclusion.
This vulnerability is uniquely identified as CVE-2025-27015. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GhozyLab Gallery for Social Photo Plugin up to 1.0.0.35 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2025-26742. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Frappe up to 14.88.x/15.50.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Requests Handler. The manipulation leads to information disclosure.
This vulnerability is known as CVE-2025-30214. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Frappe up to 14.90.x/15.51.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2025-30213. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Convivance StandVoice up to 6.2 and classified as critical. This issue affects some unknown processing of the component Authentication Module. The manipulation of the argument GEST_LOGIN leads to sql injection.
The identification of this vulnerability is CVE-2024-42533. The attack may be initiated remotely. There is no exploit available.