diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index a28e9739a75..44051ad6968 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -140,3 +140,7 @@ dc2a3fa3cae3187ca2cc88918775ab60 c1b57d94cf6d71bb9ef4133faf38e990 8e884e48b7fa155062d89f3a91f125dd 555caaea8e57b95df7fa3723d455acb4 +6ae1b34edd04fa1c36fb06c46d6116e7 +1a32c26c95a5545e2de9e75ddb534188 +b247fbf3aa03f19500f76fe6f5814982 +c258ba4845672069fabce35baef07b57 diff --git a/data/cves.db b/data/cves.db index 37fd92e7a4a..f97a1a33275 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index e567e5a885b..a774af19a09 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-12-04 11:30:51 ** INITIAL LIMITED RELEASE ** User Interface (UI) Misrepresentation of Critical Information vulnerability in [WITHHELD] allows Content Spoofing.This issue affects [WITHHELD]: through [WITHHELD]. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-12-04 11:30:50 ** INITIAL LIMITED RELEASE ** User Interface (UI) Misrepresentation of Critical Information vulnerability in [WITHHELD] allows Content Spoofing.This issue affects [WITHHELD]: through 2024-12-04. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-12-04 11:30:50 Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromWizardHandle modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-12-04 11:30:50 Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoubleL2tpConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-12-04 11:30:50 Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (setDoublePppoeConfig->guest_ip_check(overflow arg: mask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-12-04 11:30:50 Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fromAdvSetLanip(overflow arg:lanMask) modules) allows Overflow Buffers.This issue affects Tenda AC6V2: through 15.03.06.50 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-12-04 11:15:05 Double-Free Vulnerability in uD3TN BPv7 Caused by Malformed Endpoint Identifier allows remote attacker to reliably cause DoS 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-12-04 10:15:05 The Additional Custom Order Status for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the wfwp_wcos_delete_finished, wfwp_wcos_delete_fallback_finished, wfwp_wcos_delete_fallback_orders_updated, and wfwp_wcos_delete_fallback_status parameters in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-12-04 09:15:04 Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions 1.3.4 to 3.5.7) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-12-04 09:15:04 The Classic Addons – WPBakery Page Builder plugin for WordPress is vulnerable to Limited Local PHP File Inclusion in all versions up to, and including, 3.0 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, and permissions granted by an Administrator, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability is limited to PHP files in a Windows environment. 详情