From 5180736c6835939b8a06b7da3fb20bff5810cc7d Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sat, 15 Jun 2024 15:21:46 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 47984640 -> 48001024 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index e5161eb9282..72e23c65cad 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -117,3 +117,13 @@ a93dcb8a0cf18d818c4aa0a9e6e0a0ff 11454e8ccc3789541af99de589b7a557 93b30d718aee6197297c7e82548c10c8 13b1586065447e11e057703aa57db529 +23893de5688cb99fbac4ed6eca1cc11e +a1cbb77115f361438e8be3b2ef46320e +935295b1cab401bcf2795cee08780174 +c59ba42b84db9618e92c3ee415827b80 +49acaabcbb06b7002cbb863255fd28d6 +b0131b32bf24059fe84061c3cf81b5c4 +439e0113cc64901bd2c697d816ba0142 +8d7864e14005c6bd354c49d177c844c1 +bf24e1ea9138d4ab8b4c3d0fa18c1bb9 +5af9de2d37d0e8d18e88aa90f96c2897 diff --git a/data/cves.db b/data/cves.db index efd0ca559e257c30b4491a15a1809beedf0905c9..2547525ed29fb1b1ea1347c06c9d027e0989f53d 100644 GIT binary patch delta 5771 zcmdVcd2|$2z6WsnW+5zr1T+#rC6Fo?O~LWC$}mA0HN<3N5=<#fsZ421=}c{zGML&i zwP)(U)R8HZsS{IYrYxpxrY=lfnJ#0xoGFLt3Z`yMxlG-edNB25x{|3EQ*S1PsSndt zOnsU9FSK_OcR(UGTp#5iD@#^jZ7s>Q@8`BJ?+nHuE-NEExLVippFO!eS&tx$Lm}W7RF$J0KWSY$sVw%HL z&J<>24-wTEVoE zsg|jZX%*8wO!qRaX1b5*ex@}{YndKkdXQ-y(|V>2O!Z6;F>PdenCTIwO-!4awlGPi zN13)VJ;wAn(>A6jn6@)L$@CP{(@f7WJ2B({ZLZm`*Ug$#jzG6w_NwrlddYkDTrgxc|n3|d1V>-ulp6LS9`%E7&{etP2Odm2`WV*!k5!0`je$Dh7rr$Ds z%=9~^Pndqs^eNM4OrJA-!Sp3l3)5Fje_;9})1R2WX8JSJH%#9$eaG|{roS@%jp^@9 z|6uyQj%=&R1_Dwb71AIb+Cm1jgZ9t?IzlFNg3gcy+0X^L!ewwd*cpg_`!kz%z`oq!ksW1LNEu)Aq*8T7a|aa7*xVMm=6n}3Kqg5SPV;GDJ+9( zsDZm+Iou5lD_|wmLLIDvd*EJJ4fnzQum;w`1MncMgY~ch>fs^S2oJ*}un9K97Lf2L zY=y_*ao7e=z;<{No`R?08F&_+gB`FFcEN7g1JA&;3yn}4Q9aY zFca91-oGnJP$9xi?A2=!G1UZFTp{08D4=y z@G8Wi0bYZ{@H!lUqi_t4!y9k{-h`8I3f_X#a0bqbL)0j?Ez7t&&EF>RRJp5Tb)!hB zFNqAxhm0ATznU8bnzs|pJBjAqMAMXLniI`? ziRN6QIiF}QhFRGu(%*0?RBE3zAlJw`r{_NeKeP=7E%R|rYCl%z?YI?2aaqAAd z+u_xGrq@t4uPFgEfa*TedZ{u!i>b`SmiOL)RJp2sJ3g;TfdWiGJ1-9S#q$4n4jWw zIniy<)?d=3qr&XyEYKW^rViE|gEiThHqO>dp22vT|N8OP1ow+-)v2nEx?GMgN@k<4 zUfb7WYCf;Gs7TWs0o|z?y32BTE!}Ik0)|tUEqhLgo+aR1z_T+qD zI{$*WL!RAyP^ABJzV*a>JL)e5zV9v7{s(M5etO3>U5x?+SClOKlyz-7e2}prWq)>q zZ@Jj74mVR#{7bO95@FZ1)$7`NysD;aUfu2u*bUX;4p=Tjb!tA{7jS7_hs<8^j_5Jk za5%K7WtK86=(obkSThu|B2~&q)ekDShAXF5dM%|SWLAZO(bzy`WSLoBZiW8)DsL4o zid9Z8k&T}>39rmbn1Gea<~#f6pvTNmj}YLB4$Nd&?moK za!3r8Et?9(u-GvEK zL*$x87et;6J1>ZIx#WSjMSHCx9E~Z-KSvAgs@*71|5qA+-aAN5+<`oOz0)>8Z;iUP zH^-MGvb8c_UzzXmIow{;uzOvG-|Kd2F3WBA>6T?^4wt>iTVFi+Sgvf?{Ju!-qa_Qn zG=>aR&PkTy=#Z7zZ^IE~deA@1l5_P++jyDPlwxb!DP(%Bkf+KrBhinlH_EK9&xxFN zBg2*DF@Jb|`4*!|6v|TrHi<=B(s6za{NXnI^Nb_O|DM>@*{Nx*E7fSzVO-np@vN*f zwtgvVOHv1{G;tOt60>5qzGAi~u{}Wj zW|7)0Vnt(-pf46IpOswSl~Hq+rGx|ZYg3!MX2!xwS#VaF60+u5A-VRc5u%$spK?LW zkTSkUWXS51_lmAk{qTTDpY+4xOwPi8cwA0dl6Oj^4pJSp`P^VjR=uvT)IBbLk;{qc zHEPYKQ8z zLp_G>wp2~ieLkn*#&eY4?sK|}{4UMuHC3%XyUUu~G^4< zYQ++z7L^qfE{IX_GmD+#O52qGYis+L9bP{^dUu=5{kTb7ory?YiN$T}u)R%(cy>!C z+xpbFQn5qal3tIacy~eV&D@ZZtOAd|(&KTM0k_|>`}HEfYPtN_{9G>6bgKck(`R?d z*CyaG^m4niwF*kh%t$a0P^ROk!1*}tyqK1e7j69#k7iQXQ;b5V+_S1l43iBw6?*np zqLscf#f&O>-f#pPK*aP1E2ICcoLF!U)~z|GLe}g*gGZN^hmMI2y?$6Nt^455JnZm+ Qo5UK~dB}0mKLwHg7wm~Rc>n+a delta 2732 zcmWmG4nBvpu;c+qP}HxwCCgQ+GAlwr$(iWY^lewXWT*z1|PM>kqikdCqyl z-@FS6fAcnEZo1fEAEQMpaA96(#X#7{iL#^D}j~JN@OLr zl2}QtWL9!3g_Y7uWrbL&tu$6zE1i|z%3x)*GFh3eP%Dd-)yigNw{loHtz1@aE02}e z%4g-b3RnfLLRMj`h*i`oW)-(eSS77eR%xq@Rn{tJmA5Kb6|G8EWvhx+)v9Jyw`y25 zty)%XtBzIIs%O==8dwdjMpk31iPh9S6V?dRe`#K2~3=pVi+QU=6eeS%a-1)=+DhHQX9ujkHEtqpdO4SZka$ z-kM;ATNAAaYmznDvNgq;YE82ut?AYbYo;~Jnr+Ro=34Wt`PKq!p|!|bY%Q^tTFb2E z)(UH-waQv;t+Ccx>#X(G25Y0W$=Ymfv9?;$zow3eZ=dAPA1?!@9$+~P^v94Oztn1bd>!x+fx^3OD?pjgS zJ?p;pz$&y9dTG6~UR!Uh&#cd_FRU-EudJ`FZ>(>v@2u~wAFLm( zpRAv)U#z#*JL^~LH|uxn59?3sFY9mXz4gKR$NJa$&-!S6id6JjijDwcASPlVHsT;I z;vqf~AR!VVF_IuDk|8-#ASF^E1gVh*X^{@;kpUTz37HX!EXay%$c`MyiCoByJjjcD z$d3Xjh(aigA}EStD2@^+iBc$yGAN63D31!Lh)Sr8DyWKTsE!(_iCU6PCTNOgXpRXpau)h%f~A?}X0ig0AR>?&yJ@=!M?sgTCm8{uqFP z7=*zXf}t3O;TVCD7=_UogRvNg@tA;cOhg1GVKR&!*QIzNu0uIoWWU~!+Bi5MO?yVT)|ab!*$%iP29q5+`(N$;U4be0UqKJ9^(m~ z;u)Uf1zzG6UgHfu!{_({U*ao#jc@QRzQgzU0YBm={ET1l7Vq#Ye#7th1ApQ#{Ehec zfPe5W{=-LniXN!|=Z^qlASPlVHsT;I;vqf~AR!VVF_IuDk|8-#ASF^E1gVh*X^{@; zkpUTz37HX!EXay%$c`MyiCoByJjjcD$d3Xjh(aigA}EStD2@^+iBc$yGAN63D31!L zh)Sr8DyWKTsE!(_iCU6PCTNOgXpRXpau)h%f~A z?}X0ig0AR>?&yJ@=!M?sgTCm8{uqFP7=*zXf}t3O;TVCD7=_UogRvNg@tA;cOhg1G zVKR&!*QIzNu0uIoWWU~!+Bi5MO?yVT)|ab z!*$%iP29q5+`-+zDMbY~PKX;GD?D28tK5??JSq_5Nb=C`!vk|792LyHVD1O=Aee{2 XJPPJ + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 23893de5688cb99fbac4ed6eca1cc11e + CVE-2024-6007 + 2024-06-15 13:15:51 + A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /protocol/iscgwtunnel/deleteiscgwrouteconf.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268695. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + 详情 + + + + a1cbb77115f361438e8be3b2ef46320e + CVE-2024-6006 + 2024-06-15 12:15:49 + A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Summer Schedule Handler. The manipulation of the argument Schedule Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268694 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + 详情 + + + + 935295b1cab401bcf2795cee08780174 + CVE-2024-6005 + 2024-06-15 10:15:11 + A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Department Section. The manipulation of the argument Department Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268693 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. + 详情 + + + + c59ba42b84db9618e92c3ee415827b80 + CVE-2024-5611 + 2024-06-15 10:15:11 + The Stratum – Elementor Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘label_years’ attribute within the Countdown widget in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + 详情 + + + + 49acaabcbb06b7002cbb863255fd28d6 + CVE-2024-5858 + 2024-06-15 09:15:12 + The AI Infographic Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the qcld_openai_title_generate_desc AJAX action in all versions up to, and including, 4.7.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary post titles. + 详情 + + + + b0131b32bf24059fe84061c3cf81b5c4 + CVE-2024-4551 + 2024-06-15 09:15:12 + The Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the display function. This makes it possible for authenticated attackers, with contributor access and higher, to include and execute arbitrary php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. + 详情 + + + + 439e0113cc64901bd2c697d816ba0142 + CVE-2024-4258 + 2024-06-15 09:15:12 + The Video Gallery – YouTube Playlist, Channel Gallery by YotuWP plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.13 via the settings parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. + 详情 + + + + 8d7864e14005c6bd354c49d177c844c1 + CVE-2024-4095 + 2024-06-15 09:15:12 + The Collapse-O-Matic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'expand' and 'expandsub' shortcode in all versions up to, and including, 1.8.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + 详情 + + + + bf24e1ea9138d4ab8b4c3d0fa18c1bb9 + CVE-2024-3105 + 2024-06-15 09:15:11 + The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the 'insert_php' shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. + 详情 + + + + 5af9de2d37d0e8d18e88aa90f96c2897 + CVE-2024-2695 + 2024-06-15 09:15:11 + The Shariff Wrapper plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'shariff' shortcode in all versions up to, and including, 4.6.13 due to insufficient input sanitization and output escaping on user supplied attributes such as 'borderradius' and 'timestamp'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + 详情 + + 43c333e3eedbed06e2905ee40ccd43e5 CVE-2024-2024 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - 50962c6423c92d79bf3eb91d622eef4d - CVE-2024-5702 - 2024-06-11 13:15:51 - Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12. - 详情 - - - - 15c7dd82cba467fcb1f0e9ab76220e7d - CVE-2024-5701 - 2024-06-11 13:15:51 - Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127. - 详情 - - - - b474ad87d2a1c8b10f9a1328b81972cf - CVE-2024-5700 - 2024-06-11 13:15:51 - Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. - 详情 - - - - 08a289b0f9252f3445659e081a6bc76c - CVE-2024-5699 - 2024-06-11 13:15:51 - In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix. This vulnerability affects Firefox < 127. - 详情 - - - - 8096e402c0b5868a1de8a0c06a68cf49 - CVE-2024-5698 - 2024-06-11 13:15:51 - By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127. - 详情 - - - - 57d6749782d9051bff0310e5357b9c6e - CVE-2024-5697 - 2024-06-11 13:15:51 - A website was able to detect when a user took a screenshot of a page using the built-in Screenshot functionality in Firefox. This vulnerability affects Firefox < 127. - 详情 - - - - 2c7dbb56713db3fd0fbf4cb514840637 - CVE-2024-5696 - 2024-06-11 13:15:51 - By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. - 详情 - - - - 88af31d92ceac08939afd9155664db84 - CVE-2024-5695 - 2024-06-11 13:15:51 - If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127. - 详情 - - - - 954e493bb68a7c450adeafb91fc39bf0 - CVE-2024-5694 - 2024-06-11 13:15:50 - An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127. - 详情 - - - - 2baae96bfaca3dfcc04d0652cd7e3891 - CVE-2024-5693 - 2024-06-11 13:15:50 - Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. - 详情 - -