Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jun 8, 2024
1 parent b59b6c8 commit 4909bf7
Show file tree
Hide file tree
Showing 3 changed files with 36 additions and 26 deletions.
10 changes: 10 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -167,3 +167,13 @@ b52e1f39f2864cae21dfa5a289693760
5e36713bf3cb29484a92dcf3ce2a25db
127b5cf58a6909d85fa87ff941db997d
afde7bddcc0b5b596ab83c4fad57f485
96235a5370e3947c1ef81c2f95f02f8d
f1c7bb45161c38412c0ec04359cbc478
d27d9219a4b5dd882b0f3f3198313e63
0413ed67c8b42641406b9f8fa450383a
eae654ac0d1eac421925f53448eb25a4
de815955cff7b620dd2d8a6923b39c44
93830154240919f2fe670812e9c9662c
0b8c5754d9c94e89db55f2d86e4b16b1
57516c6d750bbe5c38bec7e2152f9c48
9a513fc4697320c6ca78f7af2230aa97
Binary file modified data/cves.db
Binary file not shown.
52 changes: 26 additions & 26 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-06-07 15:23:28 -->
<!-- RELEASE TIME : 2024-06-08 01:22:54 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>1fae18530bfa7173a3372b2121831106</td>
<td>CVE-2024-3049</td>
<td>2024-06-06 06:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-06 06:15:09</td>
<td>A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3049">详情</a></td>
</tr>

<tr>
<td>767ade92e15fc2a4a66277362c1c1fb0</td>
<td>CVE-2024-5656</td>
<td>2024-06-06 05:15:49 <img src="imgs/new.gif" /></td>
<td>2024-06-06 05:15:49</td>
<td>The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5656">详情</a></td>
</tr>

<tr>
<td>aee88a4c382c0663997eb2c809715237</td>
<td>CVE-2024-5615</td>
<td>2024-06-06 04:15:15 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:15</td>
<td>The Open Graph plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.11.2 via the 'opengraph_default_description' function. This makes it possible for unauthenticated attackers to extract sensitive data including partial content of password-protected blog posts.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5615">详情</a></td>
</tr>

<tr>
<td>ce0cc8495ac7e129d5b61e7ebb124db8</td>
<td>CVE-2024-5449</td>
<td>2024-06-06 04:15:14 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:14</td>
<td>The WP Dark Mode – WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpdm_social_share_save_options function in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5449">详情</a></td>
</tr>

<tr>
<td>0d57ba0c1b0b9d259ad634e2b25c8cb8</td>
<td>CVE-2024-5162</td>
<td>2024-06-06 04:15:14 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:14</td>
<td>The WordPress prettyPhoto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5162">详情</a></td>
</tr>

<tr>
<td>57f1179f4048ba0cf84ce20cc6d88a19</td>
<td>CVE-2024-5161</td>
<td>2024-06-06 04:15:14 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:14</td>
<td>The Magical Addons For Elementor ( Header Footer Builder, Free Elementor Widgets, Elementor Templates Library ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_id’ parameter in all versions up to, and including, 1.1.39 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5161">详情</a></td>
</tr>

<tr>
<td>f92a1bce2013b117a793d1a9e30b9022</td>
<td>CVE-2024-5153</td>
<td>2024-06-06 04:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:13</td>
<td>The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5153">详情</a></td>
</tr>

<tr>
<td>f544a2c5a3182035eb03470a001d5dba</td>
<td>CVE-2024-5152</td>
<td>2024-06-06 04:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:13</td>
<td>The ElementsReady Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_id’ parameter in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5152">详情</a></td>
</tr>

<tr>
<td>510ddc91bac9737c5521782561940b4b</td>
<td>CVE-2024-5141</td>
<td>2024-06-06 04:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:13</td>
<td>The Rotating Tweets (Twitter widget and shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's' 'rotatingtweets' in all versions up to, and including, 1.9.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5141">详情</a></td>
</tr>

<tr>
<td>2902f3c3123a15a9f607451dfc05b2d1</td>
<td>CVE-2024-4707</td>
<td>2024-06-06 04:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-06 04:15:13</td>
<td>The Materialis Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's materialis_contact_form shortcode in all versions up to, and including, 1.3.41 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4707">详情</a></td>
</tr>
Expand Down Expand Up @@ -2102,119 +2102,119 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>814729af9fcdd6393150e70714eb296b</td>
<td>CVE-2023-46351</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>PrestaShop SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96068">详情</a></td>
</tr>

<tr>
<td>251f34bb91404406d16404f564ec2cfc</td>
<td>CVE-2023-49351</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>Edimax BR6478AC堆栈缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96067">详情</a></td>
</tr>

<tr>
<td>a46a6d69391a55d5f0f5a400a6322fdb</td>
<td>CVE-2023-31003</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>IBM Security Access Manager Appliance访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96066">详情</a></td>
</tr>

<tr>
<td>d642b553fe240bcebf4217e0a20aca39</td>
<td>CVE-2023-4757</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>WordPress Staff / Employee Business Directory跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96065">详情</a></td>
</tr>

<tr>
<td>70726e32062f84c111beef169a3e5806</td>
<td>CVE-2023-48506</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>Adobe Experience Manager跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96064">详情</a></td>
</tr>

<tr>
<td>39e90c75a0b725b8986325c472d48464</td>
<td>CVE-2023-48508</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>Adobe Experience Manager跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96063">详情</a></td>
</tr>

<tr>
<td>7fd6756dd40ede2b307a045aafa4db3e</td>
<td>CVE-2024-27337</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>Kofax Power PDF堆栈缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96062">详情</a></td>
</tr>

<tr>
<td>e612cbe3e94a94672a6e51bb8187564a</td>
<td>CVE-2024-0736</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>EFS Software EFS Easy File Sharing FTP拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96061">详情</a></td>
</tr>

<tr>
<td>3adf3a66a70af0884aaf04d0f46601e9</td>
<td>CVE-2024-0733</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>Smsot SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96060">详情</a></td>
</tr>

<tr>
<td>f70919d4b3afb169c1c0146aa49a9444</td>
<td>CVE-2021-31314</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>ejinshan危险类型文件不受限上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96059">详情</a></td>
</tr>

<tr>
<td>0d982abd89db2875f79130a6e74fd4a8</td>
<td>CVE-2024-1180</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>TP-LINK Omada ER605操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96058">详情</a></td>
</tr>

<tr>
<td>a479987c18cff318da482325d6aeab6a</td>
<td>CVE-2024-0737</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>Xlight FTP拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96057">详情</a></td>
</tr>

<tr>
<td>c69528fe2c702647335de0b89362bf2e</td>
<td>CVE-2023-44039</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>VeridiumID访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96056">详情</a></td>
</tr>

<tr>
<td>c0a61b1cf31930b751c4ad6a2afb46ac</td>
<td>CVE-2024-23689</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>ClickHouse信息暴露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96055">详情</a></td>
</tr>

<tr>
<td>4b00f5cc10a10052b78d5f808527921b</td>
<td>CVE-2023-51926</td>
<td>2024-06-06 09:21:17 <img src="imgs/new.gif" /></td>
<td>2024-06-06 09:21:17</td>
<td>yonyou YonBIP信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96054">详情</a></td>
</tr>
Expand Down

0 comments on commit 4909bf7

Please sign in to comment.