From 0548e0bceccd513f1aec63f51e043097db097e4b Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Mon, 1 Jul 2024 03:24:51 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ cache/RedQueen.dat | 1 + data/cves.db | Bin 48259072 -> 48263168 bytes docs/index.html | 268 ++++++++++++++++++++++----------------------- 4 files changed, 150 insertions(+), 134 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 5b1bb390bfd..d9f1df716ad 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -106,3 +106,18 @@ c34ee79416e2a5e45fb69e6a6dfee07f 5e6f254d7ff9295c39279069f836f399 73a15316a6b63bc0735ec631675552f9 4e4b3a9ac9630bea5e40f6d632db9503 +4bb76a1296dea4e465acc062f0821950 +d13744edd9c0452fdcc9ec531d87e0c6 +cfc5a5a834967df85b0f692874b11462 +c447197002cf1244153c04cdbadc4d22 +678134b43cde61c522c55f12ffc9ea87 +9445d699a960a4b6a213abb24f2cc9c4 +1fc79b35bf36bc86a9138eed2f1d6787 +80e63d3264bc0cdee717e374e03315c3 +b15558613599f7c866105a44b616cd69 +9a923c10e45ce58be73110531ed3636f +b0f50f034a487846cc1844246eae021b +664b353411d1a53e1ebc332c9b484865 +df8409a2e6d922fcbf5dcf2de32d95ec +3dc3f16dd54980ae90d2deca4e64b19d +034aeeef1c6d888a8b6c792399848584 diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index c55cb58c946..b8107de8cf7 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -130,3 +130,4 @@ a6b7b824d6123cfa75914e031e944238 c1fe7f3e46a1c66b0e6d5771c7869abc dc9876527fe075dd7677445a163340cc a812d210a8db76f687358e95da599ead +80fc809d49a22b6a80f96c9cdcb523a3 diff --git a/data/cves.db b/data/cves.db index 225caf66bf6f63d27e820c9976daf0179bae9f2c..e4e62bdcc728dde1bfd713e1657ce066712b8298 100644 GIT binary patch delta 4635 zcmaLZXLuCl76)*$0YVE!N~p4QK?2ivMpT-pARtmjRL<!l8kDlA zAiXJqQj7v?!A2At2x3XV-n&=tf8y2W0^a-Kcb+F-_LTR$?_}E3$((7&lQ|2TRN7FX zLZ_^S(XJUAk^;$qL?D@vijYc>%8)Eb6-ZS`HAr z14s^}A*2zcF{BBkDWnuBmvJ|omvK*3vtbjZSc?j|_WF=%3#y0p(CbYDA5x2{ol= zbT&1oD7B!L)QVbD8){4K=p1TK9q3%@NV(LBI+H>wX{3`uCRr3Cn;bfiy3qM_0bNL4 zsT*~t9@LXAqF!_{T|$>qZ|XyrQD5pu{poTVKv&Q}8bpI>2o0rSbR`X^t7rsWP1n%1 zG?K#kyA&snd!^?>(j=Np*V7GjBi%$d(=Bu>-9}Sr zDovv#O{W<&lR&fRcA8Cd=nlG*?xMLgkLJ??T1a=(J+z4KrTeIe7SsLo04<@Vw2YQh zidN8r^bkEvD`^!yLaS*Ft)+Feo;J`%+C-aa3vH!G=`q?ykJEPAK~K<=w3BwxZrVdn zQ87JD&(L1lNBb#F&(d@BJiR~%=tX*oUZz**RXRu|^cuZRhv*G@lis4Y=^Z*uN9bKT zO2_CuI!^D?2lOF*M5R@HD8Dx@0F|x^_^Qa4* zPZ!XI)RnqXcj`es=_2Yy7tY4WvOdn1;|$8b(*raJq^{ z(A9JeT}vY=oWDzP^2n!v5;TfN(-;~{<0y~DQ$7{Y1iFq2X(COc$#gy4KsVA&bTi#T zx6*Aig{IOpO44+iK{E+7i*BdcG>7h>JLxW(OY>+xEue*TH{C;v=w7;yifA$2PY=)% zT1v}kIi+X?JxCAH!?coC(Id2)*3ep7N9$<=ZKO@KnYPeYdXyfcZS**8rycYJJxM!h z7wx7!^b{4-)AS7OrG2!Y()27nN6*s>bbwx@m*{1Bg+sX!hb4@ zYfLMN%*xEjEUL3$RNYFQDkI%|{`wgu5r)^o@Ol^yh2f1bycveK!tiz&-U-9uFdPZP zyJ0vQhGUW9^)ud!41cLn^$JTWRC_+_tI8cK&8)b+V(rXPk!2a*Wc002)MCrpDczDC znXziWM(vUrdiEe&2`t^$HOq*5isuJGOpOJ4%m@@+S4~epv8(vRl2p&3y>c~0GjdhO zOl|$>Xryk@7ZX0JoHb~)TR0|vR4RGoy-1VPmIiwxm9t{GiW*h)qGXq5tu-fRIZm<# z(q~uc*QotCCR7t%%!%t}JfT~0&$e7g)$JhgwS?+hF*}xOQS)G=ZiZc?9+1W@%a*Py zn>V{`*^IJzt4n8ZFWWu8Y}@kkN|e*`#1tjj7U^bTp2^JP7>4OHx$9VpYs4*AQ*}2U z*NlYbd5&kK7S`Jvshf%#yCZFzmhRqKx_Q=#70LgVKzCv>MNRfXx+zDOo$SX9tX9>H zxS?}wmgYOH*=MJ3~^H>qaio-)Yt1bTR2jsH3@FX5T4>Ds#C zSTR3gn{g#!Ihq|a;;L#`rzSAMH8HiKI^T8ADeBdKSi@AequWkfitL+$SRJvf^f3BULt2>6e zY}0|r*r^F8=4pPy%5@z*k!v^!C)d#oJJ*UEzNsbxS2g`)SESpP-|%)EhoT#95CjR; zvwYjOT{~{^25P$F*oJM|#wp|A4L7aWu!2H=Kw&U(Vst{@b^OyR2{+03zne5Q%%LZ3q+6G_+bG!0NVhC6DT^iXCYwqk zToA*K*@oqLs%;pWVFhlWXlnfQl47cr%AZ+1qd|>uAkl%r_=4+$!etM>9cgh&u3q7} zSjjd>x8T{gD}Rn%uAHYTfnj=qX~%<@uBr+zc;M@nZY9o0Wjd)9CGSM)XZ9U4E;WsF zZu$>%E>9FoHby!cCK?&`q?)E_TdHn4P9nw+jKwsr!7qSndHf)pk;sYtSE4$9?2qJ} L(hKjp<=FoQ>IaE8 delta 2780 zcmWmG4oYotkVn*|u%l?#{M7Q{B~MbFyt?vTfJeyRE(L^?vwWf53gtbIud- zE;4PzxyZB&!sA58id8slVb&@k(UG!3tbi42#kS&DVOCr#o)zCpU?sE?S&6MAR#GdO zmE1~UrLSW%aiDSbeR2R)1@NHP9Ml4Yr0@L#<)faBGA$(i&xrw#Havt#Q_PYl1b=nq*D3 zBCJSjiZ#`mX4#r<&9G)#QPwPLwl&9^Yt6IfTMMj()*@@MwZvL#Ewh$eE3B2)Dr>bB zZLP7^TI;O!)&^^%waMCSZLzjm+pO)@4r`~i%i3-2vG!W~to_yj>!5YWI&2-Wj#|g8 z%4Wrx@cXpE?ZZutJXE^x^=_4Y2C7JTX(Fx);;UK^}u>) zJ+dBKPpqfbGwZqa!g^`FvR+$nthd%X>m%!9>l5o!>oekI2k>nrPP>l^D^>pSav z>j&$-^`rHZ^|SSh^{e%p^}F?l^{4fh^|$qp^{@4x^&v_ja}|OBLJ=Er5QeyjhxkZ< zgh+(MNP?tDhU7?rlt_itNQ1OUhxEvRaAZU#WJVTbMK)wd4&+2GOR7Mq4MKx4M4b(&})J7fDMLpC<12jY1WMLV=d2XsUybVe5h_wR~s=#C!fiC*Z9KIn^n=#K#yh(Q>PAsC8b z7>*GbiBTAhF&K++7>@~6n3;h{7z)#vIJWJj}-eEW{!##u6;W zGAzdmti&p;Ml{x7E!JT@Hee$*VKcU1E4E=fc3>xVVK??*FZN+S4&WdT;V_QiD30Mc zPT(X?;WW+B~TKjP#R@W7UfVL6;KhCP#INF z71dB3HBb|^P#bkn7xhpd4bTvc&=^h76wS~aEzlCJ&>C&f7VXd;9ncY-&>3A2+`lWj zp*wn@Cwieb`k*iRp+5#-AO>MDhF~a$VK_!$Bt~I0#$YVQVLT>aA|_!nA`pown2KpI zreg+XA_}uG8*?xh^DrL^un>!|7)!7e%di|PuoA1V8qrvTwOEJs*no}Lgw5E3t=NX` z*nyqch27YLz1WBSIDmsVgu^(3qd11+IDwNmh0{2LvxvbtoW})R#3fwD6|;f<4vZa$ MDcJg5;8Fbl0e3tqAOHXW diff --git a/docs/index.html b/docs/index.html index 89ecf9e72fe..cbd2c2b4629 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-06-29 22:15:02 Internet2 Grouper before 5.6 allows authentication bypass when LDAP authentication is used in certain ways. This is related to internet2.middleware.grouper.ws.security.WsGrouperLdapAuthentication and the use of the UyY29r password for the M3vwHr account. This also affects "Grouper for Web Services" before 4.13.1. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-06-29 21:15:09 NewPass before 1.2.0 stores passwords (rather than password hashes) directly, which makes it easier to obtain unauthorized access to sensitive information. NOTE: in each case, data at rest is encrypted, but is decrypted within process memory during use. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-06-29 17:15:09 Factorio before 1.1.101 allows a crafted server to execute arbitrary code on clients via a custom map that leverages the ability of certain Lua base module functions to execute bytecode and generate fake objects. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-06-29 13:15:10 iDRAC9, versions prior to 7.00.00.172 for 14th Generation and 7.10.50.00 for 15th and 16th Generations, contains a session hijacking vulnerability in IPMI. A remote attacker could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable application. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-06-29 13:15:10 The WordPress Plugin for Google Maps – WP MAPS plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the 'put_wpgm' shortcode in all versions up to, and including, 4.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-06-29 12:15:09 The Goya theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attra-color’, 'attra-size', and 'product-cata' parameters in versions up to, and including, 1.0.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-06-29 10:15:02 The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to DOM-based Stored Cross-Site Scripting via HTML data attributes in all versions up to, and including, 3.2.45 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-06-29 07:15:03 The Stock Ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's stock_ticker shortcode in all versions up to, and including, 3.24.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-06-29 07:15:03 The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ attribute within the plugin's Gradient Heading widget in all versions up to, and including, 3.11.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-06-29 07:15:02 The Extensions for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the EE Button widget in all versions up to, and including, 2.0.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -446,7 +446,7 @@

眈眈探求 | + 2024-06-29 05:15:03 The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘uwp_sort_by’ parameter in all versions up to, and including, 1.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. 详情 @@ -454,7 +454,7 @@

眈眈探求 | + 2024-06-29 05:15:03 The Page and Post Clone plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.0 via the 'content_clone' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to clone and read private posts. 详情 @@ -462,7 +462,7 @@

眈眈探求 | + 2024-06-29 05:15:03 The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘country’ parameter in all versions up to, and including, 6.4.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -1979,6 +1979,126 @@

眈眈探求 | TITLE URL + + 4bb76a1296dea4e465acc062f0821950 + CVE-2023-47700 + 2024-07-01 03:22:38 + IBM SAN Volume Controller信任管理问题漏洞 + 详情 + + + + d13744edd9c0452fdcc9ec531d87e0c6 + + 2024-07-01 03:22:38 + WordPress plugin Shortcodes and extra features for Phlox theme存储型跨站脚本漏洞(CVE-2024 + 详情 + + + + cfc5a5a834967df85b0f692874b11462 + CVE-2024-20252 + 2024-07-01 03:22:38 + Cisco Expressway Series跨站请求伪造漏洞 + 详情 + + + + c447197002cf1244153c04cdbadc4d22 + CVE-2023-43017 + 2024-07-01 03:22:38 + IBM Security Verify Access信任管理问题漏洞 + 详情 + + + + 678134b43cde61c522c55f12ffc9ea87 + + 2024-07-01 03:22:38 + WordPress plugin Responsive Contact Form Builder & Lead Generation未授权功能访问(CV + 详情 + + + + 9445d699a960a4b6a213abb24f2cc9c4 + CVE-2023-38369 + 2024-07-01 03:22:38 + IBM Security Access Manager Container弱密码漏洞 + 详情 + + + + 1fc79b35bf36bc86a9138eed2f1d6787 + CVE-2023-32328 + 2024-07-01 03:22:38 + IBM Security Verify Access未授权控制漏洞 + 详情 + + + + 80e63d3264bc0cdee717e374e03315c3 + CVE-2024-1959 + 2024-07-01 03:22:38 + WordPress plugin Social Sharing存储型跨站脚本漏洞 + 详情 + + + + b15558613599f7c866105a44b616cd69 + CVE-2024-1797 + 2024-07-01 03:22:38 + WordPress plugin WP ULike SQL注入漏洞 + 详情 + + + + 9a923c10e45ce58be73110531ed3636f + CVE-2024-1759 + 2024-07-01 03:22:38 + WordPress plugin WP ULike存储型跨站脚本漏洞 + 详情 + + + + b0f50f034a487846cc1844246eae021b + CVE-2024-1716 + 2024-07-01 03:22:38 + WordPress plugin Admin Bar Remover未授权数据修改漏洞 + 详情 + + + + 664b353411d1a53e1ebc332c9b484865 + CVE-2024-1688 + 2024-07-01 03:22:38 + WordPress plugin Woo Total Sales未授权数据访问漏洞 + 详情 + + + + df8409a2e6d922fcbf5dcf2de32d95ec + CVE-2024-1679 + 2024-07-01 03:22:38 + WordPress plugin Print Labels with Barcodes存储型跨站脚本漏洞 + 详情 + + + + 3dc3f16dd54980ae90d2deca4e64b19d + CVE-2024-20254 + 2024-07-01 03:22:38 + Cisco Expressway Series跨站请求伪造漏洞 + 详情 + + + + 034aeeef1c6d888a8b6c792399848584 + CVE-2024-1567 + 2024-07-01 03:22:38 + WordPress plugin Royal Elementor Addons and Templates任意文件上传漏洞 + 详情 + + 3ec6544d8ce4cdbdaacee55b7a6a9f40 CVE-2024-31860 @@ -2099,126 +2219,6 @@

眈眈探求 | 详情 - - fbbcd28fc349cba29a12d49061832b2c - CVE-2024-24131 - 2024-06-28 06:26:45 - Superwebmailer跨站脚本漏洞 - 详情 - - - - d2ba6c11d297af2c6f7b8af19a1358be - CVE-2024-24019 - 2024-06-28 06:26:45 - Novel-Plus SQL注入漏洞 - 详情 - - - - 1808a9f8149bb1a9261e46ddc8fd80ec - CVE-2024-0710 - 2024-06-28 06:26:45 - WordPress Plugin GP Unique ID输入验证错误漏洞 - 详情 - - - - e0ca39c91ccc76b4b58075f5a4a2976d - CVE-2024-0848 - 2024-06-28 06:26:45 - WordPress plugin AA Cash Calculator反射型跨站脚本漏洞 - 详情 - - - - 0f66e9396665a6f4e098d77833db9be1 - CVE-2024-25200 - 2024-06-28 06:26:45 - Espruino缓冲区溢出漏洞 - 详情 - - - - fb2934d1da1d19dc89199c37dc6cf13a - CVE-2024-0613 - 2024-06-28 06:26:45 - WordPress plugin Delete Custom Fields跨站请求伪造漏洞 - 详情 - - - - 5cd6db88170aa1b245f64cf19b73a19c - CVE-2024-1079 - 2024-06-28 06:26:45 - WordPress Plugin Quiz Maker未授权数据访问漏洞 - 详情 - - - - d0045130906e7e8c0f27defc221649d4 - CVE-2024-24304 - 2024-06-28 06:26:45 - PrestaShop未授权访问漏洞 - 详情 - - - - 6ba09a046799195b5fc217fccbb7ab2f - - 2024-06-28 06:26:45 - WordPress plugin Shortcodes and extra features for Phlox theme PHP对象注入漏洞(CVE-202 - 详情 - - - - 7e2e6aba7753d61a75ef34fdc6ba6286 - CVE-2023-7164 - 2024-06-27 09:20:09 - WordPress BackWPup Plugin信息泄露漏洞 - 详情 - - - - 1e285275ba77d8c28cc3933f40ca9676 - CVE-2024-0083 - 2024-06-27 09:20:09 - NVIDIA ChatRTX跨站脚本漏洞 - 详情 - - - - 895894dda5c583a05eebb8596b211abe - CVE-2023-52544 - 2024-06-27 09:20:09 - Huawei HarmonyOS路径遍历漏洞 - 详情 - - - - 7e4e749c08596bb1fb0f4dca1c12c671 - CVE-2024-28167 - 2024-06-27 09:20:09 - SAP Group Reporting Data Collection授权错误漏洞 - 详情 - - - - d23db2d29ec1bbb5a2b3533b2328c3fd - CVE-2023-52546 - 2024-06-27 09:20:09 - Huawei HarmonyOS路径遍历漏洞 - 详情 - - - - 96e2dff3e907b0e42a2fcb6334b6f2b4 - CVE-2023-52551 - 2024-06-27 09:20:09 - Huawei HarmonyOS缓冲区溢出漏洞 - 详情 - -