Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jun 30, 2024
1 parent f5ae344 commit 5c42cfc
Show file tree
Hide file tree
Showing 3 changed files with 64 additions and 57 deletions.
7 changes: 7 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -132,3 +132,10 @@ ed8e3d082bba0507118f33253565ef17
1fda643624d3c091d8d867024ced12aa
803351db6e5b5e13559c67afdc334331
e228ab0cad3d8607093fa072e3a61ff0
c471d502cd5db88f83ff496bcdb81aa0
aa6fd912d0b542a61e5b23af4cbd64b3
dd1f83522d698106b8be438344986dd4
522a2dcf88ece5c4b7d33e18a7d25bb3
a211a848e7c4095555a40dd5bab41c3f
720c71976c910f1ec5725f83d56bfb71
f766b54ca0a64748f3d409a56387b138
Binary file modified data/cves.db
Binary file not shown.
114 changes: 57 additions & 57 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-06-30 18:27:37 -->
<!-- RELEASE TIME : 2024-06-30 21:21:36 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,62 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>c471d502cd5db88f83ff496bcdb81aa0</td>
<td>CVE-2024-35119</td>
<td>2024-06-30 17:15:03 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system. IBM X-Force ID: 290342.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-35119">详情</a></td>
</tr>

<tr>
<td>aa6fd912d0b542a61e5b23af4cbd64b3</td>
<td>CVE-2024-31902</td>
<td>2024-06-30 17:15:02 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 289234.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31902">详情</a></td>
</tr>

<tr>
<td>dd1f83522d698106b8be438344986dd4</td>
<td>CVE-2024-28798</td>
<td>2024-06-30 17:15:02 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 287172.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28798">详情</a></td>
</tr>

<tr>
<td>522a2dcf88ece5c4b7d33e18a7d25bb3</td>
<td>CVE-2023-50954</td>
<td>2024-06-30 17:15:02 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server 11.7 returns sensitive information in URL information that could be used in further attacks against the system. IBM X-Force ID: 275776.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-50954">详情</a></td>
</tr>

<tr>
<td>a211a848e7c4095555a40dd5bab41c3f</td>
<td>CVE-2024-5062</td>
<td>2024-06-30 16:15:03 <img src="imgs/new.gif" /></td>
<td>A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user's browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5062">详情</a></td>
</tr>

<tr>
<td>720c71976c910f1ec5725f83d56bfb71</td>
<td>CVE-2024-28795</td>
<td>2024-06-30 16:15:02 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286832.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28795">详情</a></td>
</tr>

<tr>
<td>f766b54ca0a64748f3d409a56387b138</td>
<td>CVE-2023-35022</td>
<td>2024-06-30 16:15:02 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server 11.7 could allow a local user to update projects that they do not have the authorization to access. IBM X-Force ID: 258254.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-35022">详情</a></td>
</tr>

<tr>
<td>04948b47c2c5cf6ca5b263a13d52b8fb</td>
<td>CVE-2024-6415</td>
Expand Down Expand Up @@ -467,62 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5642">详情</a></td>
</tr>

<tr>
<td>dafb147056acdb7907846e3877546cbd</td>
<td>CVE-2024-39209</td>
<td>2024-06-27 21:15:15</td>
<td>luci-app-sms-tool v1.9-6 was discovered to contain a command injection vulnerability via the score parameter.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-39209">详情</a></td>
</tr>

<tr>
<td>82c07e3d80afdf4d1216562365a53309</td>
<td>CVE-2024-39134</td>
<td>2024-06-27 21:15:15</td>
<td>A Stack Buffer Overflow vulnerability in zziplibv 0.13.77 allows attackers to cause a denial of service via the __zzip_fetch_disk_trailer() function at /zzip/zip.c.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-39134">详情</a></td>
</tr>

<tr>
<td>5f890c739b8718dd54674ed014876ee1</td>
<td>CVE-2024-39132</td>
<td>2024-06-27 21:15:15</td>
<td>A NULL Pointer Dereference vulnerability in DumpTS v0.1.0-nightly allows attackers to cause a denial of service via the function VerifyCommandLine() at /src/DumpTS.cpp.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-39132">详情</a></td>
</tr>

<tr>
<td>e4577f8d7c4d4648ec18dfdb49019814</td>
<td>CVE-2024-6374</td>
<td>2024-06-27 14:15:17</td>
<td>A vulnerability was found in lahirudanushka School Management System 1.0.0/1.0.1 and classified as problematic. This issue affects some unknown processing of the file /subject.php of the component Subject Page. The manipulation of the argument Subject Title/Sybillus Details leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269807.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-6374">详情</a></td>
</tr>

<tr>
<td>864faf359211c3e2cff22b2e4fa592f6</td>
<td>CVE-2024-39158</td>
<td>2024-06-27 14:15:16</td>
<td>idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/userSys_deal.php?mudi=infoSet.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-39158">详情</a></td>
</tr>

<tr>
<td>f7cd31be716429709333cbf98645b11d</td>
<td>CVE-2024-39157</td>
<td>2024-06-27 14:15:16</td>
<td>idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/ipRecord_deal.php?mudi=del&dataType=&dataID=1.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-39157">详情</a></td>
</tr>

<tr>
<td>a325556ff3f3e3b8af5ff2681c70dedb</td>
<td>CVE-2024-39156</td>
<td>2024-06-27 14:15:16</td>
<td>idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/keyWord_deal.php?mudi=add.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-39156">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 5c42cfc

Please sign in to comment.