Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jul 2, 2024
1 parent f830758 commit 8d2ee9d
Show file tree
Hide file tree
Showing 3 changed files with 12 additions and 11 deletions.
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -131,3 +131,4 @@ c1fe7f3e46a1c66b0e6d5771c7869abc
dc9876527fe075dd7677445a163340cc
a812d210a8db76f687358e95da599ead
80fc809d49a22b6a80f96c9cdcb523a3
5f4129010b81c4c38cbb02e50e9523e3
Binary file modified data/cves.db
Binary file not shown.
22 changes: 11 additions & 11 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-07-01 15:22:24 -->
<!-- RELEASE TIME : 2024-07-02 01:25:07 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>c471d502cd5db88f83ff496bcdb81aa0</td>
<td>CVE-2024-35119</td>
<td>2024-06-30 17:15:03 <img src="imgs/new.gif" /></td>
<td>2024-06-30 17:15:03</td>
<td>IBM InfoSphere Information Server 11.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system. IBM X-Force ID: 290342.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-35119">详情</a></td>
</tr>

<tr>
<td>aa6fd912d0b542a61e5b23af4cbd64b3</td>
<td>CVE-2024-31902</td>
<td>2024-06-30 17:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 17:15:02</td>
<td>IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 289234.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31902">详情</a></td>
</tr>

<tr>
<td>dd1f83522d698106b8be438344986dd4</td>
<td>CVE-2024-28798</td>
<td>2024-06-30 17:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 17:15:02</td>
<td>IBM InfoSphere Information Server 11.7 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 287172.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28798">详情</a></td>
</tr>

<tr>
<td>522a2dcf88ece5c4b7d33e18a7d25bb3</td>
<td>CVE-2023-50954</td>
<td>2024-06-30 17:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 17:15:02</td>
<td>IBM InfoSphere Information Server 11.7 returns sensitive information in URL information that could be used in further attacks against the system. IBM X-Force ID: 275776.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-50954">详情</a></td>
</tr>

<tr>
<td>a211a848e7c4095555a40dd5bab41c3f</td>
<td>CVE-2024-5062</td>
<td>2024-06-30 16:15:03 <img src="imgs/new.gif" /></td>
<td>2024-06-30 16:15:03</td>
<td>A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user's browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5062">详情</a></td>
</tr>

<tr>
<td>720c71976c910f1ec5725f83d56bfb71</td>
<td>CVE-2024-28795</td>
<td>2024-06-30 16:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 16:15:02</td>
<td>IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286832.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28795">详情</a></td>
</tr>

<tr>
<td>f766b54ca0a64748f3d409a56387b138</td>
<td>CVE-2023-35022</td>
<td>2024-06-30 16:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 16:15:02</td>
<td>IBM InfoSphere Information Server 11.7 could allow a local user to update projects that they do not have the authorization to access. IBM X-Force ID: 258254.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-35022">详情</a></td>
</tr>

<tr>
<td>04948b47c2c5cf6ca5b263a13d52b8fb</td>
<td>CVE-2024-6415</td>
<td>2024-06-30 04:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 04:15:02</td>
<td>A vulnerability classified as problematic was found in Ingenico Estate Manager 2023. Affected by this vulnerability is an unknown functionality of the file /emgui/rest/preferences/PREF_HOME_PAGE/sponsor/3/ of the component New Widget Handler. The manipulation of the argument URL leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-270001 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-6415">详情</a></td>
</tr>

<tr>
<td>4e58b2192572fe324d1e65ccec8b8b18</td>
<td>CVE-2024-6414</td>
<td>2024-06-30 03:15:02 <img src="imgs/new.gif" /></td>
<td>2024-06-30 03:15:02</td>
<td>A vulnerability classified as problematic has been found in Parsec Automation TrakSYS 11.x.x. Affected is an unknown function of the file TS/export/contentpage of the component Export Page. The manipulation of the argument ID leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270000. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-6414">详情</a></td>
</tr>

<tr>
<td>9b10a66072ccf63d5e2b7b6cf97db3bf</td>
<td>CVE-2024-5926</td>
<td>2024-06-30 01:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-30 01:15:09</td>
<td>Path Traversal: '\..\filename' in GitHub repository stitionai/devika prior to -.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5926">详情</a></td>
</tr>
Expand Down

0 comments on commit 8d2ee9d

Please sign in to comment.