Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 3, 2024
1 parent 0883559 commit 3be920f
Show file tree
Hide file tree
Showing 3 changed files with 147 additions and 132 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -189,3 +189,18 @@ cc7847a892a6cb876627cee866e8eab2
4292789f9ba5fc6af72d825e5291d223
97a837bd9a5fdbdb7005e9db1039f737
adab76498479bd586478bb74378229db
68dfbc39572282e904baa61f934c877a
bb918545b5c4839e1986a724e72b0179
e14fd0ff579a026089a2921f4e67ddbc
32dcad00a07f2c31e65942c406e43f3e
115cf2e675a117af75512c363ce474f7
5599fac24173fef41d71295dfe5d0ba9
38d56eb7d32ed71582ec27c6e94215f5
2480c47a08f906d1ed58267d01dd88a7
64580ecd7011a6c01c33073f7cfc9c94
a2998e3312b71b0efdb6959cb18960d8
aafe3255820fe386e1e2c7f4ff461dcd
11c4f7f2e644693f286b138ab4735e5c
e3ae335b3e58e4dd6e20a0d70b68daa8
6118b832982660c46e5ca3e639fa7ec8
9d492a5bd0bccd3cc9e3fe5fbd446173
Binary file modified data/cves.db
Binary file not shown.
264 changes: 132 additions & 132 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-02 23:23:41 -->
<!-- RELEASE TIME : 2024-04-03 05:27:04 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -30,7 +30,7 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>448cfa0216a0757ec96f5862f86eafd4</td>
<td></td>
<td>2024-04-01 10:42:50 <img src="imgs/new.gif" /></td>
<td>2024-04-01 10:42:50</td>
<td>安全事件周报 2024-03-25 第13周</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=660a8fa1c09f255b91b17f77">详情</a></td>
</tr>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>6285ff77c699e986c7085e3b8931a019</td>
<td>CVE-2024-3135</td>
<td>2024-04-01 19:15:46 <img src="imgs/new.gif" /></td>
<td>2024-04-01 19:15:46</td>
<td>The web server lacked CSRF tokens allowing an attacker to host malicious JavaScript on a host that when visited by a LocalAI user, could allow the attacker to fill disk space to deny service or abuse credits.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3135">详情</a></td>
</tr>

<tr>
<td>406e4641aa027840473d9ad8c327512a</td>
<td>CVE-2024-3131</td>
<td>2024-04-01 17:16:19 <img src="imgs/new.gif" /></td>
<td>2024-04-01 17:16:19</td>
<td>A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /classes/Master.php?f=save_category. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258874 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3131">详情</a></td>
</tr>

<tr>
<td>9d0db5c5a6624477d534ad158a402eef</td>
<td>CVE-2024-28232</td>
<td>2024-04-01 17:15:45 <img src="imgs/new.gif" /></td>
<td>2024-04-01 17:15:45</td>
<td>Go package IceWhaleTech/CasaOS-UserService provides user management functionalities to CasaOS. The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in version 0.4.7. This issue in CVE-2024-28232 has been patched in version 0.4.8 but that version has not yet been uploaded to Go's package manager.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28232">详情</a></td>
</tr>

<tr>
<td>42602cc8a17e6e2daf0c3afad8f72bf5</td>
<td>CVE-2024-3129</td>
<td>2024-04-01 16:15:59 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:59</td>
<td>A vulnerability was found in SourceCodester Image Accordion Gallery App 1.0. It has been classified as critical. This affects an unknown part of the file /endpoint/add-image.php. The manipulation of the argument image_name leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258873 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3129">详情</a></td>
</tr>

<tr>
<td>a7d693ba0fac1458a3086e6047bdba79</td>
<td>CVE-2024-30867</td>
<td>2024-04-01 16:15:54 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:54</td>
<td>netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/edit_virtual_site_info.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30867">详情</a></td>
</tr>

<tr>
<td>939f15b667e7d3b04521bc4ed191dacb</td>
<td>CVE-2024-30863</td>
<td>2024-04-01 16:15:48 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:48</td>
<td>netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /WebPages/history.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30863">详情</a></td>
</tr>

<tr>
<td>e106658074a911bd601fba353492d69d</td>
<td>CVE-2024-30862</td>
<td>2024-04-01 16:15:43 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:43</td>
<td>netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /3g/index.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30862">详情</a></td>
</tr>

<tr>
<td>ba92d83794bd15700333efdff69a79b7</td>
<td>CVE-2024-30861</td>
<td>2024-04-01 16:15:38 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:38</td>
<td>netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/configguide/ipsec_guide_1.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30861">详情</a></td>
</tr>

<tr>
<td>656a67e16474830cb761c1528998403f</td>
<td>CVE-2024-30860</td>
<td>2024-04-01 16:15:31 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:31</td>
<td>netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/export_excel_user.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30860">详情</a></td>
</tr>

<tr>
<td>2bdd5bc47c3a082ef04edafb44949d06</td>
<td>CVE-2024-30859</td>
<td>2024-04-01 16:15:20 <img src="imgs/new.gif" /></td>
<td>2024-04-01 16:15:20</td>
<td>netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/config_ISCGroupSSLCert.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30859">详情</a></td>
</tr>
Expand Down Expand Up @@ -1971,6 +1971,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>68dfbc39572282e904baa61f934c877a</td>
<td>CVE-2023-38268</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92933">详情</a></td>
</tr>

<tr>
<td>bb918545b5c4839e1986a724e72b0179</td>
<td>CVE-2023-43015</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92932">详情</a></td>
</tr>

<tr>
<td>e14fd0ff579a026089a2921f4e67ddbc</td>
<td>CVE-2023-40699</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92931">详情</a></td>
</tr>

<tr>
<td>32dcad00a07f2c31e65942c406e43f3e</td>
<td>CVE-2023-42009</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92930">详情</a></td>
</tr>

<tr>
<td>115cf2e675a117af75512c363ce474f7</td>
<td>CVE-2023-42022</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92929">详情</a></td>
</tr>

<tr>
<td>5599fac24173fef41d71295dfe5d0ba9</td>
<td>CVE-2023-43021</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92928">详情</a></td>
</tr>

<tr>
<td>38d56eb7d32ed71582ec27c6e94215f5</td>
<td>CVE-2023-46174</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>IBM InfoSphere Information Server跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92927">详情</a></td>
</tr>

<tr>
<td>2480c47a08f906d1ed58267d01dd88a7</td>
<td>CVE-2023-49277</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>dpaste跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92926">详情</a></td>
</tr>

<tr>
<td>64580ecd7011a6c01c33073f7cfc9c94</td>
<td>CVE-2023-44382</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>October代码注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92925">详情</a></td>
</tr>

<tr>
<td>a2998e3312b71b0efdb6959cb18960d8</td>
<td>CVE-2023-48886</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>NettyRpc反序列化漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92924">详情</a></td>
</tr>

<tr>
<td>aafe3255820fe386e1e2c7f4ff461dcd</td>
<td>CVE-2023-48887</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>Jupiter反序列化漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92923">详情</a></td>
</tr>

<tr>
<td>11c4f7f2e644693f286b138ab4735e5c</td>
<td>CVE-2023-49914</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>InteraXon Muse 2拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92922">详情</a></td>
</tr>

<tr>
<td>e3ae335b3e58e4dd6e20a0d70b68daa8</td>
<td>CVE-2023-39256</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>Dell Rugged Control Center访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92921">详情</a></td>
</tr>

<tr>
<td>6118b832982660c46e5ca3e639fa7ec8</td>
<td>CVE-2023-39257</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>Dell Rugged Control Center访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92920">详情</a></td>
</tr>

<tr>
<td>9d492a5bd0bccd3cc9e3fe5fbd446173</td>
<td>CVE-2023-49293</td>
<td>2024-04-03 05:24:54 <img src="imgs/new.gif" /></td>
<td>Vite跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92919">详情</a></td>
</tr>

<tr>
<td>9f888be4e3a486511255223546012657</td>
<td>CVE-2023-6181</td>
Expand Down Expand Up @@ -2091,126 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92889">详情</a></td>
</tr>

<tr>
<td>d736bb795941d018c1dfc28d9ce3fecb</td>
<td>CVE-2023-5907</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>WordPress File Manager Plugin外部实体文件或目录访问漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92813">详情</a></td>
</tr>

<tr>
<td>ced055f70d3ca5f33d2e6b4a846be403</td>
<td>CVE-2023-5955</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>WordPress Contact Form Email Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92812">详情</a></td>
</tr>

<tr>
<td>a5a6c01b83d291f00ec80947dfda7d24</td>
<td>CVE-2023-5940</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>WordPress WP Not Login Hide (WPNLH) Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92811">详情</a></td>
</tr>

<tr>
<td>96f480bd9e20110f6cb2ef59221d9f8e</td>
<td>CVE-2023-6035</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>WordPress EazyDocs Plugin SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92810">详情</a></td>
</tr>

<tr>
<td>a52ae05bead72fa063d925f8a457df2e</td>
<td>CVE-2023-36646</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92809">详情</a></td>
</tr>

<tr>
<td>c7da92f4588153eeb93b155b95052140</td>
<td>CVE-2023-49058</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>SAP Master Data Governance路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92808">详情</a></td>
</tr>

<tr>
<td>6d91adc782276ade0962b8a961227462</td>
<td>CVE-2023-36650</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike完整性检查值验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92807">详情</a></td>
</tr>

<tr>
<td>ff8c30992ad610f40db07740b0d31de4</td>
<td>CVE-2023-36649</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92806">详情</a></td>
</tr>

<tr>
<td>da26e4138c55f779a11430b42ad2b0b6</td>
<td>CVE-2023-36648</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike身份认证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92805">详情</a></td>
</tr>

<tr>
<td>8811235e3dc307658442126efc11701f</td>
<td>CVE-2023-36652</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92804">详情</a></td>
</tr>

<tr>
<td>325db86bf82c76151b8f4be0bd55e519</td>
<td>CVE-2023-42476</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>SAP Business Objects Web Intelligence跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92803">详情</a></td>
</tr>

<tr>
<td>5cf7df918df8eff7a4e8f1da1a783af4</td>
<td>CVE-2023-36651</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike硬编码凭据使用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92802">详情</a></td>
</tr>

<tr>
<td>5f864211d9cbfb4fdb9498d2bc0a64ad</td>
<td>CVE-2023-36647</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike硬编码凭据使用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92801">详情</a></td>
</tr>

<tr>
<td>de419b9bc5345930209dad6e7ba14ede</td>
<td>CVE-2023-36654</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>ProLion CryptoSpike目录遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92800">详情</a></td>
</tr>

<tr>
<td>f37cc635d320a3781a2086035d0479df</td>
<td>CVE-2023-42481</td>
<td>2024-04-01 09:22:46 <img src="imgs/new.gif" /></td>
<td>SAP Commerce Cloud访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92799">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 3be920f

Please sign in to comment.