diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index f27ff3670ba..42ed8684900 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -162,3 +162,13 @@ d05d84e1991b97aa5bcf00bf20b264f2 e51bd18511f85dd246f6c515ec2af7ad 15e45ef5b7a214d58aadeca8b3096422 b694c1138e76c76fa8e0c545655608f2 +a10e2005a12767c8c3c0446d67e0b14f +16aeb31568fc5a65740e8d3d7f527edf +120609d25cef1b0ecb090cb89b2f885e +5ee37ce759172af1063c14e5151d1eb8 +e6b3a4872b84544b2c1d81589eeac7fa +e97fe5877d445b61fbb7e13f35ee6829 +6f35aef1799fefcea297e47c8598db9d +5a5c9867adcf69240452d650a5433be3 +26e166921e93ac7571a1466da9dc86a4 +9ab635c06cc8e2248035cc963bb0d061 diff --git a/data/cves.db b/data/cves.db index a1ca3b7150d..3a34ca84565 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index d2397a11d0a..7268b8d3ea0 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + a10e2005a12767c8c3c0446d67e0b14f + CVE-2024-1371 + 2024-04-30 03:15:06 + The LeadConnector plugin for WordPress is vulnerable to unauthorized modification & loss of data due to a missing capability check on the lc_public_api_proxy() function in all versions up to, and including, 1.7. This makes it possible for unauthenticated attackers to delete arbitrary posts. + 详情 + + + + 16aeb31568fc5a65740e8d3d7f527edf + CVE-2024-4226 + 2024-04-30 02:15:06 + It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed. + 详情 + + + + 120609d25cef1b0ecb090cb89b2f885e + CVE-2024-0216 + 2024-04-30 02:15:06 + The Google Doc Embedder plugin for WordPress is vulnerable to Server Side Request Forgery via the 'gview' shortcode in versions up to, and including, 2.6.4. This can allow authenticated attackers with contributor-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. + 详情 + + + + 5ee37ce759172af1063c14e5151d1eb8 + CVE-2024-4327 + 2024-04-30 01:15:46 + A vulnerability was found in Apryse WebViewer up to 10.8.0. It has been classified as problematic. This affects an unknown part of the component PDF Document Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.9 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-262419. NOTE: The vendor was contacted early about this disclosure and explains that the documentation recommends a strict Content Security Policy and the issue was fixed in release 10.9. + 详情 + + + + e6b3a4872b84544b2c1d81589eeac7fa + CVE-2024-34050 + 2024-04-30 00:15:07 + Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return uint64(b[2])<<16 | uint64(b[1])<<8 | uint64(b[0])" in reader.go. + 详情 + + + + e97fe5877d445b61fbb7e13f35ee6829 + CVE-2024-34049 + 2024-04-30 00:15:07 + Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return plmnIdString[0:3], plmnIdString[3:]" in reader.go. + 详情 + + + + 6f35aef1799fefcea297e47c8598db9d + CVE-2024-34048 + 2024-04-30 00:15:07 + O-RAN RIC I-Release e2mgr lacks array size checks in E2nodeConfigUpdateNotificationHandler. + 详情 + + + + 5a5c9867adcf69240452d650a5433be3 + CVE-2024-34047 + 2024-04-30 00:15:07 + O-RAN RIC I-Release e2mgr lacks array size checks in RicServiceUpdateHandler. + 详情 + + + + 26e166921e93ac7571a1466da9dc86a4 + CVE-2024-34046 + 2024-04-30 00:15:07 + The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment(). + 详情 + + + + 9ab635c06cc8e2248035cc963bb0d061 + CVE-2024-34045 + 2024-04-30 00:15:07 + The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment(). + 详情 + + e3bf125cf831009947f3bbfd387a6c6f CVE-2024-4296 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - e1bb42e08783e8349c9b901a4a8d5547 - CVE-2024-2838 - 2024-04-27 04:15:09 - The WPC Composite Products for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wooco_components[0][name]' parameter in all versions up to, and including, 7.2.7 due to insufficient input sanitization and output escaping and missing authorization on the ajax_save_components function. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 2df35630aef744ff595cf8f6b6081e11 - CVE-2024-2258 - 2024-04-27 04:15:08 - The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name autofilled into forms in all versions up to, and including, 1.15.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 3971e3e034b68833e02e1eb2390f33c6 - CVE-2024-2859 - 2024-04-27 00:15:07 - By default, SANnav OVA is shipped with root user login enabled. While protected by a password, access to root could expose SANnav to a remote attacker should they gain access to the root account. - 详情 - - - - c37d2f2b00567a070d842367ddd413eb - CVE-2024-4244 - 2024-04-26 22:15:08 - A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by this vulnerability is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. - 详情 - - - - 511e69a55f9b3db722c048d02808c416 - CVE-2024-4243 - 2024-04-26 22:15:08 - A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-262134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. - 详情 - - - - 584dfff03389ba2a3fdd8cce35a833a2 - CVE-2024-31828 - 2024-04-26 22:15:08 - Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL. - 详情 - - - - 0320bfd886c68ff724da6d3106700d0e - CVE-2024-31741 - 2024-04-26 22:15:08 - Cross Site Scripting vulnerability in MiniCMS v.1.11 allows a remote attacker to run arbitrary code via crafted string in the URL after login. - 详情 - - - - 8e0680838acd7b7a0d5c1637057c0d8f - CVE-2024-31551 - 2024-04-26 22:15:08 - Directory Traversal vulnerability in lib/admin/image.admin.php in cmseasy v7.7.7.9 20240105 allows attackers to delete arbitrary files via crafted GET request. - 详情 - - - - d490b80eeece4c355200325bc0b2b3b1 - CVE-2024-30804 - 2024-04-26 22:15:08 - An issue discovered in the DeviceIoControl component in ASUS Fan_Xpert before v.10013 allows an attacker to execute arbitrary code via crafted IOCTL requests. - 详情 - - - - fdad9fb02646a816f9cbdfdc53b0ebc7 - CVE-2024-3052 - 2024-04-26 22:15:08 - Malformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway. - 详情 - -