From 1b45186ac535a6fa24497eb962bfdadf93fc2fc2 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 5 Apr 2024 23:23:40 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 46964736 -> 46972928 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 373317c0042..fbc8c1e7f72 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -134,3 +134,13 @@ d564b6bbe2e7319823aa9019e48521a5 1c6f68cbab6a0db99ba02ab3143ae8da c2d38650dcf41fa2e5137274a5046849 afeaec7f7ecf15b5b945861d3006ddd5 +e2b6dedb43bb08e84b33408538f0cd21 +c3162abaff7b177eb2fa2367f449eaed +d94877a5cdd26e5714376fcd45c55a8c +7cba84eec4631a86620a688217746075 +52c89620e3db58aa28c3d6f8e9b94b7a +e7b4ba5dbc400327edaed2dd83d7c2fe +b28af8fa6b1a88452329796d7d304370 +24a17b3adf88cdf41dc8ec49ac0181bc +e0e11f54dce0f45bc75b5ea9a562e736 +266de38825bc2cde4433ca10719ef1dd diff --git a/data/cves.db b/data/cves.db index 140366046d22f18752b22e78e3d25cba63d3a844..fedd5ffb6ec68816d92ba125bf84e162cc8a7c6f 100644 GIT binary patch delta 5782 zcmc)Md3+T0`3Laq}$lkt^Ju>!?vO&rIgoQ9Js>?HDx??WJVS}K8PO@fDD0L1i2V;31lebQphk! zF=RMo1Y{)SGRP>%<&Y~NC6Fs2qakA;VAk~l>NG)VG zWDaC5qz*CbE(~xH%&qDS<_Ci`9`yl%v&q1Dt zyZ|`>c@gpwtO~?-+Z$W+p`7z{e$WI{eKz<7O z8RT8adyu1$_aVn1KZkq(`4I98$VZTmA-{wihx`ii3FK4A3CL%V&mkuvry#$E{08z{ z$QO{`LB53i9`XmsX~-WTUqSu^`7`7%%f+!m9HdYxrBOO%P$p$j8_K4(ltb;PJ$0a5 z%A=0di8@mk%BQZ>jS8qc71B9$F7=?Eq*5~Ke~YW(}gsE22v3XqQT@O z7r99zojl|vANeUjL+B#9m@c8AbSVv^Vj4~(Xe3=mqv&$Ff=cL08ckzpERCb_R7w+Q zB2A*nG=-+pG`fnerfcY0x{j`==~PB`{ssjpL}4;1LNlnGD(D89NtG0(7{#fIW>JEw zsfKE4HqD{AR7dk@J}sbyR8Kcj11+M()JRPPT0%={87-%q=w`ZwR?tdXMXPBI-AZfe zHoBeGQIgiv9dsw%MR(H%+DH~{qI+mF-Ah~OKDwVCpsn;EJwy-FHfpBr^awplJ7_08 zMvv1I^d#+~-SiYaP0!G?w1@Um3+idjb5iW=rA3j zAJCihLwbvTL_emt=_m9K{gi%2@6vm8l-{Rf^mF=vKBQmJNAxlMl8)1_=o9*sPS9uc zIh~|a^lSPJ{g%F<-_e)!d-?;Nra#hG^e6f={l&3d6h8i>P%5QSI%QBMWl$*V`wam zqw!Qq6KEn$qRBLcrqVRJims+>=vumtuBYi#Mt1%N1t~;fGATkcsGKV32AWBg6r~u& zsfuP%f~u*8YH2pjp}AB?^JqRTpoLUVH&O#FqQ%rmO$1s(OKBM`r<>?zx`kHIN?Jv$ zX${>sHmC*rl-Sw#!p?dDxq&}L-T z%Cx;oOI}s3;&LR1ZE~F+*ffU=${t(PugRe`Im$ws%j-6RMkL}3x_mw}=#Cg}&FhQk zdcaIBy7RT}ef1)z)9)HLwPa*Tu{zEi8&@LX3(grO77^hzmv7#^tDP`D=+e{!)wi|UZDh%`@WdiIr+%~$+7mWeM-qF z;w3z)D=@_68RGQ)m#)^y@)Q z)17{g=8rf-;bd|98wyhOBF!4Mb-m*pD|dRjQqZlc(x@}k;ieHPS0|d)@kEU}K2})~ zOYYy@ql>k%&rwIdl{?n!7;2UF{nC+<9gT;}Lh)$Sj9EvHk8%vQa(gx^+d6pyy2m@n z?Q}DMuQRYtt$SX{x8zOT(W{{NKXV<$6G$$~n9whS+t57jmX+%dDT&Oyc0AJQDO*x< z^0PXp-sfpTHtRgl;t*y3eO}VL>(V!XTJyEYTYijB&qrRTWzu(F4=xD88-p|o3 zgIQKpn#sJkZt9$DSn)=Vl{;#K(joW%V)VBjrSEe=RqIO~IacY0bVqNiwBI2m&B=h8 z>d?H7n)0nKsIu<4>Xt!=$il>*C}*`l;5WWNcS)zvDehoO$Ch}F(j$FcpGq1uGyczu)7 z)mm`kV@J1XMl8&q8#7yHM(fw68a1QwL>*sI;?dTRCnsvF?G{#CRaIFLGVDHf=Dhv7 zi~ZYcasTUUv5tB6C<9z>r&Djt#P*cd6gy~(I~b;At2wM-#! delta 2738 zcmWmGWpkDX6h%?;Vj;M@ySux)LvT2_yL*s>2ZFo1JHdl{Tj~z96l%~?7btW;AJ+Z> zXXeh_sHo!^qAnfF5R)ZQ+EPC9o1&iLAs{xRu0;u##HI ztmIY-E2WjnN^PaF(pu@P^i~Edqm{|ZY-O>sTG_1ZRt_ttmCMR)<+1Ww`KT__qE*SNY*n$UTGg!TRt>ABRm-Yv)v@YY z^{o0<1FNCc$ZBjgv6@=Vtmak=tEJV-YHhW#+FI?b_Ex0T!RlyrvN~H`tgco!tGm_1 zVxOK?FRQoJ$LeeKv-(>Dtbx`bYp^xM8fp!*hFc@7k=7_{v^B;WYmKwUTNA8_)+B4P zHN~20O|zz3QPvD=rZvl&ZP}V*&9&xP^Q{HeLTix~Z7sHzSTWX8Ynip&T4AlUR#~g9 zHP%{doweTDU~RNES(~jb)>dnqwcXlb?X-4TyRALeUTdGV-#TC&v<_K^ts~Y^>zH-i zI$@o(PFbyh=9^|kfb`o?-|YWpRAv)7uGML0Y6kdSpOGWI|?SK~`i#cH}@#kb<{vj)Ix34L0!~CeKbHrG(uxE zK~pqCbF@H9v_fmNL0hy#dqkoGI-(OgqYJvC8@i(hg8h4<7kZ-)`l28DV*mzX5C&ri zhGH0oV+2NG6h>nV#$p`CV*(~(5+-8`reYeVBMLJx6SFWI#vIJWJj}-eEW{#2V= z21~IF%drA0u?nlP25Yen>#+eFu?d^81zWKV+pz;Xu?xGg2Yay(`*8pVaR`TT1V?cU z$8iEDaSE|GjWallb2yI+xQIAh!ev~+Rb0b$+`vuT!fo8aUEIT4cpLBFKHkN9cpo3& zLwtmf@d-Y~XZRdn;7dHfLp;J)_!^J#4W8gBzQuR=9zWnmJi~MRgrD&Ozu;H=hTriA z{={GS8~@;6yu>T~hu3%$HeVsmA0fm?0whEtBt|%rAOcB|49SrKDUk}Pkp^jz4(X8r z8IcK@kp)?i4cU6bB~c2cQ3hpE4&_k+6;TP5 zQ3X{|4b@QtHBk$-Q3rKV5B1Ri4bcdV(F9G=49(F3Ezt_C(FSeN4($<%4(NzZ=!`Dt zif-tR9tigDiC*Z9KIn^n=#K#yh(Q>PAsC8b7>*GbiBTAhF&K++7>@~>xgO+3kefkn1-TvMPAG2t^ShzwZ7CClFOHXNQqpY^&mxK@sTUrX YI;Kk4)cCQb^yGDdxW#Mkg+?X*AACzCz5oCK diff --git a/docs/index.html b/docs/index.html index e0febdb95af..178e07aba56 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + e2b6dedb43bb08e84b33408538f0cd21 + CVE-2024-3352 + 2024-04-05 19:15:07 + A vulnerability has been found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/mod_comments/index.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259456. + 详情 + + + + c3162abaff7b177eb2fa2367f449eaed + CVE-2024-0081 + 2024-04-05 19:15:07 + NVIDIA NeMo framework for Ubuntu contains a vulnerability in tools/asr_webapp where an attacker may cause an allocation of resources without limits or throttling. A successful exploit of this vulnerability may lead to a server-side denial of service. + 详情 + + + + d94877a5cdd26e5714376fcd45c55a8c + CVE-2024-3351 + 2024-04-05 18:15:10 + A vulnerability, which was classified as critical, was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. This affects an unknown part of the file admin/mod_roomtype/index.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259455. + 详情 + + + + 7cba84eec4631a86620a688217746075 + CVE-2024-3350 + 2024-04-05 18:15:10 + A vulnerability, which was classified as critical, has been found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. Affected by this issue is some unknown functionality of the file admin/mod_room/index.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259454 is the identifier assigned to this vulnerability. + 详情 + + + + 52c89620e3db58aa28c3d6f8e9b94b7a + CVE-2024-31851 + 2024-04-05 18:15:09 + A path traversal vulnerability exists in the Java version of CData Sync < 23.4.8843 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions. + 详情 + + + + e7b4ba5dbc400327edaed2dd83d7c2fe + CVE-2024-31850 + 2024-04-05 18:15:09 + A path traversal vulnerability exists in the Java version of CData Arc < 23.4.8839 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions. + 详情 + + + + b28af8fa6b1a88452329796d7d304370 + CVE-2024-31849 + 2024-04-05 18:15:09 + A path traversal vulnerability exists in the Java version of CData Connect < 23.4.8846 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application. + 详情 + + + + 24a17b3adf88cdf41dc8ec49ac0181bc + CVE-2024-31848 + 2024-04-05 18:15:09 + A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application. + 详情 + + + + e0e11f54dce0f45bc75b5ea9a562e736 + CVE-2024-28065 + 2024-04-05 18:15:09 + In Unify CP IP Phone firmware 1.10.4.3, files are not encrypted and contain sensitive information such as the root password hash. + 详情 + + + + 266de38825bc2cde4433ca10719ef1dd + CVE-2024-22004 + 2024-04-05 18:15:09 + Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application + 详情 + + 2a6dd1d0db696ec5e5b4e9921df99e08 CVE-2024-30254 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - fa09c37ae60fa8c653d7bcde65a566c3 - CVE-2024-30532 - 2024-04-02 19:15:47 - Server-Side Request Forgery (SSRF) vulnerability in Builderall Team Builderall Builder for WordPress.This issue affects Builderall Builder for WordPress: from n/a through 2.0.1. - 详情 - - - - a4a15e2918ab54d875205c5c674720dc - CVE-2024-30531 - 2024-04-02 19:15:47 - Server-Side Request Forgery (SSRF) vulnerability in Nelio Software Nelio Content.This issue affects Nelio Content: from n/a through 3.2.0. - 详情 - - - - 2a576f53311ad6eadc2d53838f1f1ea4 - CVE-2024-24888 - 2024-04-02 19:15:47 - Server-Side Request Forgery (SSRF) vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.2.25. - 详情 - - - - 6a1bec15a8a72dbb15ad06d4a798db63 - CVE-2024-31109 - 2024-04-02 18:15:12 - Cross-Site Request Forgery (CSRF) vulnerability in Toastie Studio Woocommerce Social Media Share Buttons allows Stored XSS.This issue affects Woocommerce Social Media Share Buttons: from n/a through 1.3.0. - 详情 - - - - 74e56bdfdd9788335970b261e2f115e0 - CVE-2024-31105 - 2024-04-02 18:15:12 - Cross-Site Request Forgery (CSRF) vulnerability in Adam Bowen Tax Rate Upload allows Reflected XSS.This issue affects Tax Rate Upload: from n/a through 2.4.5. - 详情 - - - - 59143db454989b8bda90f10d06587d9e - CVE-2024-30809 - 2024-04-02 18:15:12 - An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in Ap4Sample.h in AP4_Sample::GetOffset() const, leading to a Denial of Service (DoS), as demonstrated by mp42ts. - 详情 - - - - a17adba9216dc8d7614dace9a259110a - CVE-2024-30808 - 2024-04-02 18:15:12 - An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_SubStream::~AP4_SubStream at Ap4ByteStream.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts. - 详情 - - - - 44015d76a5cc45c0cfc0b8bd9b93090b - CVE-2024-30807 - 2024-04-02 18:15:12 - An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_UnknownAtom::~AP4_UnknownAtom at Ap4Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts. - 详情 - - - - be29dcd2a22fe999df897e4ba15f8b69 - CVE-2024-30806 - 2024-04-02 18:15:12 - An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac. - 详情 - - - - eca672d6cfc57a980ff9790e1a2dd144 - CVE-2024-30335 - 2024-04-02 18:15:12 - Foxit PDF Reader AcroForm Annotation Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22641. - 详情 - -