Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jun 15, 2024
1 parent 47d1726 commit bdc4eca
Show file tree
Hide file tree
Showing 3 changed files with 31 additions and 26 deletions.
5 changes: 5 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -115,3 +115,8 @@ b8457168af4d949e7336edf049aad644
ae1b2e2912ace41f968533d024ac150b
d4811d28056614f9454fae338deca17b
a6a2bc20ab3f7f9335f2dc243c524575
7984689d7bfaac304fb645f9f227da84
00a672d9a5e93d23f9a19bf5e0bfa221
cb9cf0febd9afc733d096bef34e50483
05744b9b8ba19d9ee06a5450aad8b5db
e931320dc7e9495c3de6fe2b53cdeabf
Binary file modified data/cves.db
Binary file not shown.
52 changes: 26 additions & 26 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-06-14 18:28:11 -->
<!-- RELEASE TIME : 2024-06-15 01:23:43 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>cd6930e6f700fc8b8012b8d3d6690d24</td>
<td>CVE-2024-5927</td>
<td>2024-06-13 11:15:48 <img src="imgs/new.gif" /></td>
<td>2024-06-13 11:15:48</td>
<td>Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5927">详情</a></td>
</tr>

<tr>
<td>2d950af35e8bb328d80e6d5a21296d5e</td>
<td>CVE-2024-30278</td>
<td>2024-06-13 10:15:09 <img src="imgs/new.gif" /></td>
<td>2024-06-13 10:15:09</td>
<td>Media Encoder versions 23.6.5, 24.3 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30278">详情</a></td>
</tr>

<tr>
<td>069e51d3a383085df005d23892a2944a</td>
<td>CVE-2024-4371</td>
<td>2024-06-13 09:15:14 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:14</td>
<td>The CoDesigner WooCommerce Builder for Elementor – Customize Checkout, Shop, Email, Products & More plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.4.1 via deserialization of untrusted input from the recently_viewed_products cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4371">详情</a></td>
</tr>

<tr>
<td>f7d86955a8ecdbf7ae245210f7331a85</td>
<td>CVE-2024-4176</td>
<td>2024-06-13 09:15:14 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:14</td>
<td>An Cross site scripting vulnerability in the EDR XConsole before this release allowed an attacker to potentially leverage an XSS/HTML-Injection using command line variables. A malicious threat actor could execute commands on the victim's browser for sending carefully crafted malicious links to the EDR XConsole end user.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4176">详情</a></td>
</tr>

<tr>
<td>ae694e8b0ad2e65b4727865d6bceb56e</td>
<td>CVE-2024-34111</td>
<td>2024-06-13 09:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:13</td>
<td>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted request to the server, which could then cause the server to execute arbitrary code. Exploitation of this issue does not require user interaction.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34111">详情</a></td>
</tr>

<tr>
<td>8ba11a1af8ce27476fb9d6fb7d752498</td>
<td>CVE-2024-34110</td>
<td>2024-06-13 09:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:13</td>
<td>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could result in arbitrary code execution. A high-privilege attacker could exploit this vulnerability by uploading a malicious file to the system, which could then be executed. Exploitation of this issue does not require user interaction.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34110">详情</a></td>
</tr>

<tr>
<td>3d9cc1a0bb02e4e3e7d23082f73cc0e2</td>
<td>CVE-2024-3073</td>
<td>2024-06-13 09:15:13 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:13</td>
<td>The Easy WP SMTP by SendLayer – WordPress SMTP and Email Log Plugin plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.3.0. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for authenticated attackers, with administrative-level access and above, to view the SMTP password for the supplied server. Although this would not be useful for attackers in most cases, if an administrator account becomes compromised this could be useful information to an attacker in a limited environment.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3073">详情</a></td>
</tr>

<tr>
<td>7db35c93454dc37cd636e67d435717cb</td>
<td>CVE-2024-34109</td>
<td>2024-06-13 09:15:12 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:12</td>
<td>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but admin privileges are required.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34109">详情</a></td>
</tr>

<tr>
<td>a4b41a23c3ad59eedcf5f68bad616c7d</td>
<td>CVE-2024-34108</td>
<td>2024-06-13 09:15:12 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:12</td>
<td>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but admin privileges are required</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34108">详情</a></td>
</tr>

<tr>
<td>7bc4e0d9638a94ae1839d5ac7086b08f</td>
<td>CVE-2024-34107</td>
<td>2024-06-13 09:15:12 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:15:12</td>
<td>Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34107">详情</a></td>
</tr>
Expand Down Expand Up @@ -2102,119 +2102,119 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>e68516c315da773f9af21c725110dcee</td>
<td>CVE-2024-23851</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Linux Kernel拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96435">详情</a></td>
</tr>

<tr>
<td>d828a77aa3c273c87c4ef6e0a75213ac</td>
<td>CVE-2023-45889</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>ClassLink OneClick Extension跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96434">详情</a></td>
</tr>

<tr>
<td>428507c4f2e73bd73683a9942ee4860f</td>
<td>CVE-2024-0744</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla Firefox拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96433">详情</a></td>
</tr>

<tr>
<td>d770a4bd193f587eb8d29d37b296fa26</td>
<td>CVE-2024-22204</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Whoogle Search文件写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96432">详情</a></td>
</tr>

<tr>
<td>4e516677c0afd5ff7be074eb52608807</td>
<td>CVE-2024-0755</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla多款产品内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96431">详情</a></td>
</tr>

<tr>
<td>11078c31b3eb3ffb0bc9138cae64a799</td>
<td>CVE-2024-0743</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla多款产品未检查返回值漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96430">详情</a></td>
</tr>

<tr>
<td>14bc6fed5205dfd0ef1db6d9edd81a4a</td>
<td>CVE-2024-0745</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla Firefox堆栈缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96429">详情</a></td>
</tr>

<tr>
<td>7fcf3ce73db82ff238e4caefad67788b</td>
<td>CVE-2024-0752</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla Firefox内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96428">详情</a></td>
</tr>

<tr>
<td>03a0805ba3778d38ca74ee0af9994294</td>
<td>CVE-2024-0746</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla多款产品拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96427">详情</a></td>
</tr>

<tr>
<td>ed88ef1b5948418947899da8bfc082e7</td>
<td>CVE-2024-0751</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>Mozilla多款产品权限管理错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96426">详情</a></td>
</tr>

<tr>
<td>5c4f4f600e2477e2caebc1e127842716</td>
<td>CVE-2024-22497</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>JFinalcms跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96425">详情</a></td>
</tr>

<tr>
<td>4b035c971f8e301f82ed07aaffe465b8</td>
<td>CVE-2023-50275</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>HPE OneView身份认证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96424">详情</a></td>
</tr>

<tr>
<td>9c49300ba4bfe7ddf4dab6bbaab0460a</td>
<td>CVE-2024-22490</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>beetl-bbs跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96423">详情</a></td>
</tr>

<tr>
<td>4087af4230b47a5a2c8f5c596a0ed14b</td>
<td>CVE-2023-50274</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>HPE OneView命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96422">详情</a></td>
</tr>

<tr>
<td>020bffe383a724b304fe1e4271e2570f</td>
<td>CVE-2024-22496</td>
<td>2024-06-13 09:21:10 <img src="imgs/new.gif" /></td>
<td>2024-06-13 09:21:10</td>
<td>JFinalcms跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/96421">详情</a></td>
</tr>
Expand Down

0 comments on commit bdc4eca

Please sign in to comment.