Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 29, 2024
1 parent d8cafba commit 3f93e5f
Show file tree
Hide file tree
Showing 3 changed files with 66 additions and 51 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -183,3 +183,18 @@ f0c2e28b6f2191fd0704174db8993c95
148a5a86f85f9f536092130072cb7282
89e93c3f2f098787c685285d3a300857
bbb60a5841b208054789d710c40d53b5
fb4ff42a8fb47819f9ebed514e571b9a
98f5585d8aad10f35096aed362718833
ce5c02683bdda07b5326808cf4209e2e
0f3d97e8d9d4d50abebc90f253c7da04
9c7c5326d3780f2a9f6c16e7450b740e
6e4e8d469fe49afb4aaf1272046f5097
ecefe89e0cf048ef18c3d86cb617995c
a458aee6751d6173b58d6ee2f3779262
9766afe62b3115dfb4ee82b8c061724d
5201514e03b0df5bf3ebfa5a56afc6a3
74b4f7ee7762fa66f1a739003905914d
9fdb38f3c2d1360169bd25347a98c3cc
b62b0c10423ba37daf24351ac0299f99
0045a87c6b46dbba7a6cbbeabdb35346
08529c117c25c09c4ca320dd44edecb7
Binary file modified data/cves.db
Binary file not shown.
102 changes: 51 additions & 51 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-10-28 09:26:53 -->
<!-- RELEASE TIME : 2024-10-29 03:31:11 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,15 +366,15 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>44fd7285b1b6d4837d69bdd971556498</td>
<td>CVE-2024-10408</td>
<td>2024-10-27 02:00:06 <img src="imgs/new.gif" /></td>
<td>2024-10-27 02:00:06</td>
<td>A vulnerability has been found in code-projects Blood Bank Management up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /abs.php. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10408">详情</a></td>
</tr>

<tr>
<td>17f2da51516b97b3332d69ad7f1d9c49</td>
<td>CVE-2024-10407</td>
<td>2024-10-27 00:15:12 <img src="imgs/new.gif" /></td>
<td>2024-10-27 00:15:12</td>
<td>A vulnerability, which was classified as critical, was found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/edit_customer.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10407">详情</a></td>
</tr>
Expand Down Expand Up @@ -1979,6 +1979,54 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>fb4ff42a8fb47819f9ebed514e571b9a</td>
<td>CVE-2024-4411</td>
<td>2024-10-29 03:29:00 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Mihdan: Yandex Turbo Feed存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103743">详情</a></td>
</tr>

<tr>
<td>98f5585d8aad10f35096aed362718833</td>
<td>CVE-2024-4398</td>
<td>2024-10-29 03:29:00 <img src="imgs/new.gif" /></td>
<td>WordPress plugin HTML5 Audio Player存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103742">详情</a></td>
</tr>

<tr>
<td>ce5c02683bdda07b5326808cf4209e2e</td>
<td>CVE-2024-8006</td>
<td>2024-10-29 03:29:00 <img src="imgs/new.gif" /></td>
<td>libpcap空指针引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103741">详情</a></td>
</tr>

<tr>
<td>0f3d97e8d9d4d50abebc90f253c7da04</td>
<td>CVE-2024-4383</td>
<td>2024-10-29 03:29:00 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Simple Membership存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103740">详情</a></td>
</tr>

<tr>
<td>9c7c5326d3780f2a9f6c16e7450b740e</td>
<td>CVE-2024-4386</td>
<td>2024-10-29 03:29:00 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Gallery Block存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103739">详情</a></td>
</tr>

<tr>
<td>6e4e8d469fe49afb4aaf1272046f5097</td>
<td>CVE-2024-4397</td>
<td>2024-10-29 03:29:00 <img src="imgs/new.gif" /></td>
<td>WordPress plugin LearnPress任意文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103738">详情</a></td>
</tr>

<tr>
<td>b9c2454f2ba7a259cbc7e286e7648741</td>
<td>CVE-2024-7691</td>
Expand Down Expand Up @@ -2171,54 +2219,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103635">详情</a></td>
</tr>

<tr>
<td>ff2d8ccb968e7c9c225f92c2e1fdc653</td>
<td>CVE-2024-1486</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>General Electric Healthcare Ultrasound权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103634">详情</a></td>
</tr>

<tr>
<td>d7ea38e6da8f928cd1b8f7df93c4fcb3</td>
<td>CVE-2024-0870</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>WordPress plugin YITH WooCommerce Gift Cards未授权的数据修改漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103633">详情</a></td>
</tr>

<tr>
<td>9fae8be3fe57b3fbbcca2fdba79a24a3</td>
<td>CVE-2024-0762</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Phoenix SecureCore缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103632">详情</a></td>
</tr>

<tr>
<td>1871c659553f85e0bec49c03cb14c099</td>
<td>CVE-2024-22268</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>VMware Workstation缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103631">详情</a></td>
</tr>

<tr>
<td>c1bae505d5850debc153af1d5434729f</td>
<td>CVE-2024-22267</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>VMware Workstation内存释放后重用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103630">详情</a></td>
</tr>

<tr>
<td>f58581ecff1ee73dc13096bbf121156a</td>
<td>CVE-2023-6812</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>WordPress plugin WP Compress开放重定向漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103629">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 3f93e5f

Please sign in to comment.