From 21b989ad9c7bd959f3e0786a87c76cbdb75a79ef Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sat, 7 Dec 2024 15:24:17 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 ++ data/cves.db | Bin 50409472 -> 50421760 bytes docs/index.html | 212 ++++++++++++++++++------------------- 3 files changed, 116 insertions(+), 106 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index ca566e35244..9a3b94e5f95 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -132,3 +132,13 @@ d9f4784c901b298a45c9f1c898f6d8d6 d32dcd98baedc0c631969fbd321592f5 7b1ed8c57b92204972d8e3f27935a69b 47ddb5fb2820090776ef99d26c57b5a1 +2dccbb99f03fcbe254dc1bfcb4b24516 +2626ac6614a10b4e1bacfd355f084fca +e2e321219edc3482f79cd1e238fc5099 +9fc20f284d6c796758c03566d08aacb8 +86090bb528b0c38822ad0f671ee672bd +b6238125972cb6f1ee5ef674c48d3b95 +2c4a22710e8ac39225cfe188c2d6df0d +79320fddb0d23ec2234cbf8e5b55b611 +cf51a6bf61ab50cd35cde2e2baace040 +5263a762b608fc0d6f1fbd48b088ecfe diff --git a/data/cves.db b/data/cves.db index c04cd9e94b44f386a056b89619502b2d07660e6a..e2e0ba30918036abab7db830f0e8dba04de1dfac 100644 GIT binary patch delta 5592 zcmd7Ud2|!i7YA_iQd)Le*(u8?V4+Z)nJi6E5CqC5+FBH~V((-!X(MS;lC)3|S@hBt zL|RdbB2HD@HxLzEu;7Y{Qjnq|BBE6hP&PLZ{e35TencrHUsS8tArfy8#nR+nwWJ+i1#nhXr4^v+ziRo;nbC~)u^=BHu zbS_f{(?F&{OqooBnT9ZBF%4xpk4a`ym{cYQlatBC8*g-qBVjmgKPGx?berT|kBQ!!JJ={lzAOd+NcrZ7{4sg!93 zQG>fT%X*Sawrt6vJGTp#5k7+*B0;YvbH!|JC#7v8rDw(R7s+kru zEn&KuX(`h!Ov{*Rm};4BWm?X38`JGfE12q-Rx;hebSKj)rn{I{Gu_Q(GSxHP!*nmx zeN1bZ?q_;{=|QH4m>y<&gy~VH$Cw^xdV=XmrnOA#n4V%<&-66YGfdAiZD88S^c>Uk zOfN9K$h3*+C8h?Z%}iUEUS@iQ=~brJm|kakgJ~<%n@n#pz0I_Z=^dtbnYJ@EGVNg6 z$@Cu6E~X}?-AwN@eZce~(;lXenD#P#%(Rc`6Q=!4pE4a_`i$vwre>xun7(BCis>NJ z*Gz|)4l^BL`iALSrlU;9n2s}@U^>b49n<$rKQR5s^b^x5rqfJ6Go4}jh3VI7vMnVW z2(UvEw1i|xfmYBO+CW=q2koH)bc9q$gR`I$bcQa_6}mxp=m9+;9eP1;=mUL0g0tZq z=m-5_0GtaMFc1boCJcrlkOf2GJdi;F6&&CM7q}rCJm7_4a6ViB!(jwm2qR$>Tm++G z42*>w7zg8F0!)NSa4}4VOW;z-g*>G4p+cbxDu{{tDyj{foX6p6oR$?8u&m5 zKNt{zA}EF+TnE!31SJrL2$aGMh(ZkFPzL2N6J|jL%!WB|J?ke1+Wlqgqwh2 z5mZ7IRKsFe0yo1_xCNF$4b;M|upDlK+hGON!AiIT?u1ov7p#W6!GwCa2kwRYU=7?4 z55R-)5IhWzz@zXOJPuF5ldu-n!Bemvo`z@OS=ay@;W>C7UVs;26TAcsuoI0E0mw{R4W!ErbNC*eEz9)5ry;U_o+r{QNf1HZtpwrUbM z{vf~(Nzf9KAq84NYiI*)p&hh`4$u)&Aq~!gPS6>;Kv(Dn-Ju8cgmmZyy`c~E1qsfE zbD$sehXHUdWWYce1eq`xhCmh!h4VlL1ypc=6I|eiZ18{=hQax80St!`a3PF@QE(BA zhA}V}a$p>chY2tdCc(up87_fKAs6!CGRTK1a5-E7Q{hUu3a*9%xCW-dwNMDw{%ha^ z9sFQG0E(a(f^Z#7hY*xN7$Q&#Gaw2vh(j5a!%Ub36)+p-!1XW}Zh(0(9~QtuxDjpw zhDA^bRZtC!VF}y}OW_t+1~pI%x59F`4Q_`OPzNjF4!9Fm!CkN#?gkU;;U2gb?t?XO zKRf^r!b9*dJOYoxWAHdU0Z+nOSO-tRdUzV1foEX@Y=r0Fd3XU{giY`gG{9!q0x!cW z@G86pufrR#72brm;BD9j@4&mT9U5T=?1cAV7c{|ccppB14`B~{1bg9Q*ax4$e)tp) zz-RC|G{YD0C42=3;cKyp4v96(TCKCMZehK>*6oXq$T1ri?hx%7uB|yF+Su#%Q9*J; zc=;jGp|zP-v)Z<#liY=y=i=9$xp_AJbmHcj%X+RpBoGc;;fNK!vBI}jIBJDsRyb~j z6IM8Bh3~BJy%m12!jD$?$qJ{eaM}t#Tj7iqezC%@;)R~8?O!i!Ww&RxXuCD}R70vX z-PY4yo12tXISKPw~yROM-^U)Oy;uQwn&0=myoT~5EQ`0&x`Q=P85PoKG_ zhuPTwj7Vzfl9egN<~rUZWHa^bBjS9sap1io$;@wgSY)IHqLC75roXUA3x$kmMPYw4 zZ~aWs$y_`4sOV}^Ql|m6qN>@lwci&RT3I|8C<{q(ZB`^4DXEYG!BE`P-Z*X> zl^Qcbh8~X<$kPhqMzmy_nU`@`IL%{=>qYm5`Uk%i{cMAN-vimoq3r$}#_VG=Q`2qs za}#r{O5x^;#M(MKDm!Z4fUe2`)#LQL^=z*@+vU+^hs*8u%N|YB&AiWdi1aRs;_xIE zH#ry%O1aTUQB*52x2zc@2AfAG+%1MC&nOT2jflD9V3Tk**qV-G9ew_k%WP{M|NX!B zvE5l<&yexhDxBb1iTU<+RQA>k)o`eas(1~*?r?h4K(<%+D~9Uu1ay~Nw{EogdtnZD zx)RUKF${lc)QH8TaYopPYVk-^Ixv5^GD1PBapZ8)3gRx-1rtlmus+ zdAFPvEq3t3sER zy}vNbzdHLO@k!Bq$ zMfF$@&kvTAhH%_o?<;!r%MFzk1;bfVz7YyZrO}AL3};G;7e^yyMa5FCR#B>%$5yly z1M6}#@-liIn7^_F`7I7r6vniW5i8WoqERCpFRU;$vv%7D!eyo|zR{LsuHU;vTwrc) zIxXJq_FE(R!}9;Z8SH=L7x7JE=~V^XJSVYfx}#Fpd~OuFqPo1r-?w(}>5al?hTVHanpyI(-PSQP zYQ&>Kquf9_`i*E}tWcy#@@sKT8aT5!s25AYn52bb5wrKu4z~V%2Mtwa)hda^74e7m z_}4P?f4fj~*Y>Mz1I&>bFNvfM$fea0L`t6)?fR!|NZViC-rgY9_p>D@Wi7UG^E|6K zs#`m%TWc=W?a;E_s?RN>8OnatN5JQI;?nYX4Bgx^bAw19rYN$KXyrMF*87K#^!v~ZCbnYc#`G>>k5U-UH_G7pJ?4f9g=iN3bcf685=H~sU|=xH-c#_tsa z@ZN*1sGQ2pHzfLMp<_`Y-n(3i=Jo~Lisp04I$pwbKdv0rhs)5AP35guMfxB#R(IlV z$uEgSP{4X59LBAVizNVKLq-Xji}lT%F=_y=$i~JKVyW5pbsl^G delta 2941 zcmWmGWtSBM6op~t4lx2sDJ>}_-5}B}-3^Yb%wN+Dc=kwbEJXt#7Oh zRz@q6mD$Q-eQRa4vRT=!99B*%mzCSfW97B-S^2F3Rza(fRoME@Dq?+a6}5_4#jO%n zNvo7q+A3p}waQuLtqN8}>j$fnRoSXyRkf;F)vX#Sy)023P~FLDpbvh&9x*HOv}rjj%>qqpZ=^7;CIG&Khq`uqIlQtjX3C z>sM>4HO>0Xnr_XoW?HkX2y3=A$C_)+v*ue1tcBJhYq7P&T52t`mRl>VmDVb2we`ET z##(Ewv({T1tc}(tYqRx-wZ+!J0?dTd2mPpqfbGwUzwZ|k}B!g^`_W4*FoTmM@BS#PYj);sIH^}+gReHy8du?j%| zp@@zch>2JT!)J(%IEahS@de@`J`x}y65&gHg~UjLq)3M3NP(328mW*PX^Yy&_p*|X*AsV4EnxH9~A-I2Yv_MO=!jEW;HfW1> zXpau)h)(E?F6fGG2uFAHKu`2SZ}h=W_!+;TFZ!WB24EltVK9bZD2!nkju9A%Q5cOe z7>jWjj|rHFNtlc&_!Uzz4ZmSJW?&{}Ap)~82XiqG^RWO6u?UN?1WU0D%drA0u?nm4 zJJw(=)?qz1U?VnRGycF9Y{fQg#}4d7Bz9pp_FymeVLuMwAP(U$j^HT%#4#Ml37o_! zoW>cP#W|eE1zf}>T*eh##Wh^V4cx>n+{PW;#Xa1|13bhdJVq3r;3=NrFZ_+?c!8Jr z2e0rN|KdNq!CSn;dwjr0dfNs$c6kpe04HBuop(jYC;Aw9l924qAgWJVTzi>%0o?8t$f$c5a~qXH`82UJ33R6$i#Lv_?ZP1Hhd)InX;Lwz(r zLo`BTG(l4|Lva7*Xn~e!g&)xxZO|6&&>kJo5uMN(UC+Rq5|YeFi(Sd7R+D4{2k2mU|t0CGMImYc@@m-VEzr}zhK@3^EQ}w y!MqRVLogqM`4rfeG9vWh;20rs4n>QzIYIU7n?obh%zYRL3yVCIH6*l9^#1|#hjFg} diff --git a/docs/index.html b/docs/index.html index ec20914e345..4150da214ee 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 2dccbb99f03fcbe254dc1bfcb4b24516 + CVE-2024-11501 + 2024-12-07 12:15:19 + The Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3 via deserialization of untrusted input from wd_gallery_$id parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. + 详情 + + + + 2626ac6614a10b4e1bacfd355f084fca + CVE-2024-11464 + 2024-12-07 12:15:19 + The Easy Code Snippets plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + 详情 + + + + e2e321219edc3482f79cd1e238fc5099 + CVE-2024-11457 + 2024-12-07 12:15:19 + The Feedpress Generator – External RSS Frontend Customizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + 详情 + + + + 9fc20f284d6c796758c03566d08aacb8 + CVE-2024-11380 + 2024-12-07 12:15:17 + The Mini Program API plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'qvideo' shortcode in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + 详情 + + + + 86090bb528b0c38822ad0f671ee672bd + CVE-2024-12270 + 2024-12-07 10:15:06 + The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. + 详情 + + + + b6238125972cb6f1ee5ef674c48d3b95 + CVE-2024-12253 + 2024-12-07 10:15:06 + The Simple Ecommerce Shopping Cart Plugin- Sell products through Paypal plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'save_settings', 'export_csv', and 'simpleecommcart-action' actions in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the plugins settings and retrieve order and log data (which is also accessible to unauthenticated users). + 详情 + + + + 2c4a22710e8ac39225cfe188c2d6df0d + CVE-2024-12128 + 2024-12-07 10:15:05 + The Simple Ecommerce Shopping Cart Plugin- Sell products through Paypal plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘monthly_sales_current_year’ parameter in all versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + 详情 + + + + 79320fddb0d23ec2234cbf8e5b55b611 + CVE-2024-11374 + 2024-12-07 10:15:05 + The TWChat – Send or receive messages from users plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.0.4. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + 详情 + + + + cf51a6bf61ab50cd35cde2e2baace040 + CVE-2024-11367 + 2024-12-07 10:15:05 + The Smoove connector for Elementor forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + 详情 + + + + 5263a762b608fc0d6f1fbd48b088ecfe + CVE-2024-11010 + 2024-12-07 10:15:04 + The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.4 via the 'default_lang' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. + 详情 + + 8005fbdff62ad91ebee53bd77371e395 CVE-2024-53908 @@ -366,7 +446,7 @@

眈眈探求 | + 2024-12-05 11:15:06 User Interface (UI) Misrepresentation of Critical Information vulnerability in DropBox Sign(HelloSign) allows Content Spoofing. Displayed version does not show the layer flattened version, once download, If printed (e.g. via Google Chrome -> Examine the print preview): Will render the vulnerability only, not all layers are flattened. This issue affects DropBox Sign(HelloSign): through 2024-12-04. 详情 @@ -374,7 +454,7 @@

眈眈探求 | + 2024-12-05 10:31:40 Inclusion of undocumented features or chicken bits issue exists in UD-LT1 firmware Ver.2.1.8 and earlier and UD-LT1/EX firmware Ver.2.1.8 and earlier. A remote attacker may disable the firewall function of the affected products. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. 详情 @@ -382,7 +462,7 @@

眈眈探求 | + 2024-12-05 10:31:40 UD-LT1 firmware Ver.2.1.8 and earlier and UD-LT1/EX firmware Ver.2.1.8 and earlier allow a remote authenticated attacker with an administrative account to execute arbitrary OS commands. 详情 @@ -390,7 +470,7 @@

眈眈探求 | + 2024-12-05 10:31:40 Incorrect permission assignment for critical resource issue exists in UD-LT1 firmware Ver.2.1.8 and earlier and UD-LT1/EX firmware Ver.2.1.8 and earlier. If an attacker with the guest account of the affected products accesses a specific file, the information containing credentials may be obtained. 详情 @@ -398,7 +478,7 @@

眈眈探求 | + 2024-12-05 10:31:39 The WIP WooCarousel Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wip_woocarousel_products_carousel' shortcode in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -406,7 +486,7 @@

眈眈探求 | + 2024-12-05 10:31:39 The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scripting via the Contact Info Block link parameter in all versions up to, and including, 2.0.77 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -414,7 +494,7 @@

眈眈探求 | + 2024-12-05 10:31:39 The Simple Redirection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the settings_page() function. This makes it possible for unauthenticated attackers to update the plugin's settings and redirect all site visitors via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 详情 @@ -422,7 +502,7 @@

眈眈探求 | + 2024-12-05 10:31:39 The Accounting for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -430,7 +510,7 @@

眈眈探求 | + 2024-12-05 10:31:39 The NewsMunch theme for WordPress is vulnerable to Stored Cross-Site Scripting via a malicious display name in all versions up to, and including, 1.0.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -438,91 +518,11 @@

眈眈探求 | + 2024-12-05 10:31:38 The AnyWhere Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.11 via the 'INSERT_ELEMENTOR' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. 详情 - - b803b349c35d632b3cf6a7dba45ceba0 - CVE-2024-52277 - 2024-12-04 11:30:51 - ** INITIAL LIMITED RELEASE ** User Interface (UI) Misrepresentation of Critical Information vulnerability in [WITHHELD] allows Content Spoofing.This issue affects [WITHHELD]: through [WITHHELD]. - 详情 - - - - 12727cb7dfddc82e51c7b448710cb05c - CVE-2024-52276 - 2024-12-04 11:30:50 - ** INITIAL LIMITED RELEASE ** User Interface (UI) Misrepresentation of Critical Information vulnerability in [WITHHELD] allows Content Spoofing.This issue affects [WITHHELD]: through 2024-12-04. - 详情 - - - - ba63dfef634a2fe0687179acf7d464e8 - CVE-2024-52275 - 2024-12-04 11:30:50 - Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromWizardHandle modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50. - 详情 - - - - baed5a479cb89eea0ae03744791b412f - CVE-2024-52274 - 2024-12-04 11:30:50 - Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoubleL2tpConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 - 详情 - - - - edeaf99f5aa6e681e896b69ee375c365 - CVE-2024-52273 - 2024-12-04 11:30:50 - Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 - 详情 - - - - d30a6a0a871c08efe722fa0218fa92fe - CVE-2024-52272 - 2024-12-04 11:30:50 - Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromAdvSetLanip(overflow arg:lanMask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 - 详情 - - - - 7caf3ddef8fd06a87306652a96e9be1f - CVE-2024-12107 - 2024-12-04 11:15:05 - Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS - 详情 - - - - 2e70d46367c2fe2fd630bfe42ed30405 - CVE-2024-11814 - 2024-12-04 10:15:05 - The Additional Custom Order Status for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the wfwp_wcos_delete_finished, wfwp_wcos_delete_fallback_finished, wfwp_wcos_delete_fallback_orders_updated, and wfwp_wcos_delete_fallback_status parameters in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - 详情 - - - - f1290c5f5300021600825d693b2501cb - CVE-2024-5020 - 2024-12-04 09:15:04 - Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions 1.3.4 to 3.5.7) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 7450e61446c158e6a5881d1fb9cab4e6 - CVE-2024-11952 - 2024-12-04 09:15:04 - The Classic Addons – WPBakery Page Builder plugin for WordPress is vulnerable to Limited Local PHP File Inclusion in all versions up to, and including, 3.0 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, and permissions granted by an Administrator, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability is limited to PHP files in a Windows environment. - 详情 - - @@ -2110,7 +2110,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Foreman信息泄露漏洞 详情 @@ -2118,7 +2118,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Unified Communications Manager信息泄露漏洞 详情 @@ -2126,7 +2126,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)服务器端安全性客户端实施漏洞 详情 @@ -2134,7 +2134,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Enterprise Chat and Email (ECE)输入验证错误漏洞 详情 @@ -2142,7 +2142,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Unified Industrial Wireless Software命令注入漏洞 详情 @@ -2150,7 +2150,7 @@

眈眈探求 | + 2024-12-05 09:25:10 IBM Maximo Application Suite - Monitor Component跨站脚本漏洞 详情 @@ -2158,7 +2158,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Unified Contact Center Management Portal跨站脚本漏洞 详情 @@ -2166,7 +2166,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)路径遍历漏洞 详情 @@ -2174,7 +2174,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)路径遍历漏洞 详情 @@ -2182,7 +2182,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)服务器端请求伪造漏洞 详情 @@ -2190,7 +2190,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)跨站脚本漏洞 详情 @@ -2198,7 +2198,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)跨站脚本漏洞 详情 @@ -2206,7 +2206,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco AsyncOS Software跨站脚本漏洞 详情 @@ -2214,7 +2214,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Meeting Server信息泄露漏洞 详情 @@ -2222,7 +2222,7 @@

眈眈探求 | + 2024-12-05 09:25:10 Cisco Identity Services Engine (ISE)跨站脚本漏洞 详情