Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jun 18, 2024
1 parent d18f169 commit 7f44ace
Show file tree
Hide file tree
Showing 3 changed files with 20 additions and 11 deletions.
9 changes: 9 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -125,3 +125,12 @@ e2c92c9de042d97490c76eb5f11a8370
9b13fa8a9ec1935a32dafe94dbbf540b
a0b64ae641fda184c64f3228fa1ef598
816b4abadfa1f026f7458c1c011567a9
eeed1bbc0219161fb00d032affbfeb91
d0df2fb9032863883750b02bcc57a4f2
bbb0d4288a58f03fcc8dfb0330b3faa8
5f1af806e86d8f37077ef22ae90a0d4d
f2ea90b76212b01ffcc5416e784f4aa1
ecdcee072c6d7370d01c490a7a9db7f8
d27bf71dde72ae076495cd894754c5b1
1a373f3a68527b854aa53f3781b78814
1ec9a5902e2babe3872fcc2e18044bde
Binary file modified data/cves.db
Binary file not shown.
22 changes: 11 additions & 11 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-06-17 21:20:29 -->
<!-- RELEASE TIME : 2024-06-18 01:24:40 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -446,79 +446,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>2022b8875db6ba4b1d40901f13fc0aca</td>
<td>CVE-2024-38468</td>
<td>2024-06-16 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-16 16:15:09</td>
<td>Shenzhen Guoxin Synthesis image system before 8.3.0 allows unauthorized password resets via the resetPassword API.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38468">详情</a></td>
</tr>

<tr>
<td>2109fb9118362c3ae1df7cf1a7050f62</td>
<td>CVE-2024-38467</td>
<td>2024-06-16 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-16 16:15:09</td>
<td>Shenzhen Guoxin Synthesis image system before 8.3.0 allows unauthorized user information retrieval via the queryUser API.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38467">详情</a></td>
</tr>

<tr>
<td>98a368a0b44385920bc42f14229aea6e</td>
<td>CVE-2024-38466</td>
<td>2024-06-16 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-16 16:15:09</td>
<td>Shenzhen Guoxin Synthesis image system before 8.3.0 has a 123456Qw default password.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38466">详情</a></td>
</tr>

<tr>
<td>c820eab806fba442528afe80e103072a</td>
<td>CVE-2024-38465</td>
<td>2024-06-16 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-16 16:15:09</td>
<td>Shenzhen Guoxin Synthesis image system before 8.3.0 allows username enumeration because of the response discrepancy of incorrect versus error.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38465">详情</a></td>
</tr>

<tr>
<td>bd89fad9c1c5bc6087adec157e4eaf78</td>
<td>CVE-2024-38462</td>
<td>2024-06-16 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-16 16:15:09</td>
<td>iRODS before 4.3.2 provides an msiSendMail function with a problematic dependency on the mail binary, such as in the mailMS.cpp#L94-L106 reference.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38462">详情</a></td>
</tr>

<tr>
<td>c28a6537f52ec8f2444dd279383e40ec</td>
<td>CVE-2024-38461</td>
<td>2024-06-16 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-16 16:15:09</td>
<td>irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38461">详情</a></td>
</tr>

<tr>
<td>53434b51f9af6970dd046f063f0e3f3a</td>
<td>CVE-2024-38460</td>
<td>2024-06-16 15:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-16 15:15:51</td>
<td>In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQube Access Logs, Proxy Logs, etc).</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38460">详情</a></td>
</tr>

<tr>
<td>b28c9d35ce5169e5c24fd9c1c40443b7</td>
<td>CVE-2024-38459</td>
<td>2024-06-16 15:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-16 15:15:51</td>
<td>langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides Python REPL access without an opt-in step. NOTE; this issue exists because of an incomplete fix for CVE-2024-27444.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38459">详情</a></td>
</tr>

<tr>
<td>77359cdf07122364a25186684877416d</td>
<td>CVE-2024-38458</td>
<td>2024-06-16 15:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-16 15:15:51</td>
<td>Xenforo before 2.2.16 allows code injection.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38458">详情</a></td>
</tr>

<tr>
<td>31903eec7be53d2678fdb947cf5c363b</td>
<td>CVE-2024-38457</td>
<td>2024-06-16 15:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-16 15:15:51</td>
<td>Xenforo before 2.2.16 allows CSRF.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38457">详情</a></td>
</tr>
Expand Down

0 comments on commit 7f44ace

Please sign in to comment.