Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Dec 6, 2024
1 parent b41eda4 commit 28fae96
Show file tree
Hide file tree
Showing 3 changed files with 15 additions and 11 deletions.
4 changes: 4 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -140,3 +140,7 @@ dc2a3fa3cae3187ca2cc88918775ab60
c1b57d94cf6d71bb9ef4133faf38e990
8e884e48b7fa155062d89f3a91f125dd
555caaea8e57b95df7fa3723d455acb4
6ae1b34edd04fa1c36fb06c46d6116e7
1a32c26c95a5545e2de9e75ddb534188
b247fbf3aa03f19500f76fe6f5814982
c258ba4845672069fabce35baef07b57
Binary file modified data/cves.db
Binary file not shown.
22 changes: 11 additions & 11 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-12-05 15:28:57 -->
<!-- RELEASE TIME : 2024-12-06 03:38:22 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>b803b349c35d632b3cf6a7dba45ceba0</td>
<td>CVE-2024-52277</td>
<td>2024-12-04 11:30:51 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:30:51</td>
<td>** INITIAL LIMITED RELEASE ** User Interface (UI) Misrepresentation of Critical Information vulnerability in [WITHHELD] allows Content Spoofing.This issue affects [WITHHELD]: through [WITHHELD].</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-52277">详情</a></td>
</tr>

<tr>
<td>12727cb7dfddc82e51c7b448710cb05c</td>
<td>CVE-2024-52276</td>
<td>2024-12-04 11:30:50 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:30:50</td>
<td>** INITIAL LIMITED RELEASE ** User Interface (UI) Misrepresentation of Critical Information vulnerability in [WITHHELD] allows Content Spoofing.This issue affects [WITHHELD]: through 2024-12-04.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-52276">详情</a></td>
</tr>

<tr>
<td>ba63dfef634a2fe0687179acf7d464e8</td>
<td>CVE-2024-52275</td>
<td>2024-12-04 11:30:50 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:30:50</td>
<td>Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromWizardHandle modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-52275">详情</a></td>
</tr>

<tr>
<td>baed5a479cb89eea0ae03744791b412f</td>
<td>CVE-2024-52274</td>
<td>2024-12-04 11:30:50 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:30:50</td>
<td>Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoubleL2tpConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-52274">详情</a></td>
</tr>

<tr>
<td>edeaf99f5aa6e681e896b69ee375c365</td>
<td>CVE-2024-52273</td>
<td>2024-12-04 11:30:50 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:30:50</td>
<td>Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-52273">详情</a></td>
</tr>

<tr>
<td>d30a6a0a871c08efe722fa0218fa92fe</td>
<td>CVE-2024-52272</td>
<td>2024-12-04 11:30:50 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:30:50</td>
<td>Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromAdvSetLanip(overflow arg:lanMask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-52272">详情</a></td>
</tr>

<tr>
<td>7caf3ddef8fd06a87306652a96e9be1f</td>
<td>CVE-2024-12107</td>
<td>2024-12-04 11:15:05 <img src="imgs/new.gif" /></td>
<td>2024-12-04 11:15:05</td>
<td>Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12107">详情</a></td>
</tr>

<tr>
<td>2e70d46367c2fe2fd630bfe42ed30405</td>
<td>CVE-2024-11814</td>
<td>2024-12-04 10:15:05 <img src="imgs/new.gif" /></td>
<td>2024-12-04 10:15:05</td>
<td>The Additional Custom Order Status for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the wfwp_wcos_delete_finished, wfwp_wcos_delete_fallback_finished, wfwp_wcos_delete_fallback_orders_updated, and wfwp_wcos_delete_fallback_status parameters in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-11814">详情</a></td>
</tr>

<tr>
<td>f1290c5f5300021600825d693b2501cb</td>
<td>CVE-2024-5020</td>
<td>2024-12-04 09:15:04 <img src="imgs/new.gif" /></td>
<td>2024-12-04 09:15:04</td>
<td>Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions 1.3.4 to 3.5.7) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5020">详情</a></td>
</tr>

<tr>
<td>7450e61446c158e6a5881d1fb9cab4e6</td>
<td>CVE-2024-11952</td>
<td>2024-12-04 09:15:04 <img src="imgs/new.gif" /></td>
<td>2024-12-04 09:15:04</td>
<td>The Classic Addons – WPBakery Page Builder plugin for WordPress is vulnerable to Limited Local PHP File Inclusion in all versions up to, and including, 3.0 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, and permissions granted by an Administrator, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability is limited to PHP files in a Windows environment.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-11952">详情</a></td>
</tr>
Expand Down

0 comments on commit 28fae96

Please sign in to comment.