From 3f93e5faba7a96d00ed75f23f3bbbcc7ccda37a3 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Tue, 29 Oct 2024 03:31:13 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++++++ data/cves.db | Bin 49848320 -> 49852416 bytes docs/index.html | 102 +++++++++++++++++++++++----------------------- 3 files changed, 66 insertions(+), 51 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 24301cb6d01..606f7ff0ffa 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -183,3 +183,18 @@ f0c2e28b6f2191fd0704174db8993c95 148a5a86f85f9f536092130072cb7282 89e93c3f2f098787c685285d3a300857 bbb60a5841b208054789d710c40d53b5 +fb4ff42a8fb47819f9ebed514e571b9a +98f5585d8aad10f35096aed362718833 +ce5c02683bdda07b5326808cf4209e2e +0f3d97e8d9d4d50abebc90f253c7da04 +9c7c5326d3780f2a9f6c16e7450b740e +6e4e8d469fe49afb4aaf1272046f5097 +ecefe89e0cf048ef18c3d86cb617995c +a458aee6751d6173b58d6ee2f3779262 +9766afe62b3115dfb4ee82b8c061724d +5201514e03b0df5bf3ebfa5a56afc6a3 +74b4f7ee7762fa66f1a739003905914d +9fdb38f3c2d1360169bd25347a98c3cc +b62b0c10423ba37daf24351ac0299f99 +0045a87c6b46dbba7a6cbbeabdb35346 +08529c117c25c09c4ca320dd44edecb7 diff --git a/data/cves.db b/data/cves.db index 506c67bfb6f1b2d8dc328339e98ba9e52a2398c4..cbcab31e2f672ff3531377144d9a0f633ff6b518 100644 GIT binary patch delta 4454 zcmZwJdAwBP9|!R6X}f9B>K4*eNb2g$IcLt96RNAl)}@U^_?($JQ&+cpuUnD5!3UL8 zL`jS#du5A|Tv;Mp_Ar*DRkDO+|9xio`TdkX-p_0P`hK48^L(H4nkmn$FPXA#eaWo- z8va(VUa#r1BYlg0%YY~%45B{KfM`fGA{rCLL=$2!qAAggXil^s_9j{qt%%k{8=@`I zj@XANA=(oih<%Cui2aFMchr?L)=T;N8C>=A{G-%hzE!ViHC@XiARW~#G}Mx#4_S>;tAqO zVma{?v4VJ-s3V>sRuaz=&k@fPFA%GU7m1gM)x^uhE5xhBYsBls8sZJ&P2w%$ZQ>o` zUE)1rE%83_0r4S`BR(QNCO#oPCDsw25$lQ1i4DX?ViU2M*g|Y2z96;{UlQAiuZXXS zZ-{S+9mIFU_rwpxPU1&m7x5GEGw}=YEAbogJMqU<6wN@97*byvNJD8Pjip$c$X?P^ znn`nMA$vVGOWta??5pt58EFdAnJKemwp=UM$sD;}ZjiY$Pi~a?a+55Oo8=bC%B^yn+%9*>Lb+4!lDp*|xmWI! z`(=?VmL>9lJSY#z!}5qMl}F_w#!%YwR|Jr$`1KXzLy_lr~D|p-M3%~<@|Y}>$K?rmQkKh8vO=DgI(bG`%CqvE zJTEWEDtS>}lGXCEydtm4Yx26RkvHT`c}w1wcjR4pPu9x&@_~FPIr&IFmQUnUStp;# zdih*7$VS;Dn`Mh^l`o7H*k&x8S-hk{pL+Q}uXW94Z8J`-U({f3tA0~HXxM8Sb7#*S zIA@!o<;(oCJ->XFU%t*S-{hBX^UIF>@?C!UKEM2sUv?UG1Lyo`)csPwq~6kO<5|0m zPAwWH8!T?HZ~f4C)M#3izP{z6DP@^br8Ft;&@EGBH$N$GV(}mhT`v|*xlzwf#NsJ8 z46U^7dA{XZo0r#ZzA4-PfOyApm_qOkitgcNBsSPJgh}2Y08dFgf85{<+RddUF42taK zlt#@`%a53U_A{W67|--zt}35+i4y&!myFq#o3g#QnYIEy?Ixpc=s7Vn;W=iwM`E^f z!*6w3z1p@bDsFgGWp#2~wpFLkj7af6q6QYC{EW%m_`=;ZR+gEzQ@*DL{gji6nL#2< zBz=X(?4*|pOlQxmvQ^(3ZCVYl7++HvM#{tSiLiFU*ovBeODxYPI%cK?bCvn#1}ZQa z#*(Jx#_dE(^}R&C(YP5;rX9=lLu>cu;-=|VRwQbYK~1*$;$cSn-4AeVAtRcJGB>W! zRg?S)#?!G_JeGibx&>(rfk>pqVc$G@6nYX-{a1X8Bsns7Ac#Qs;G_(sSM7` zwmfsS(dA!`)Uh&g=FTdFmnd8#l2$iCTtB>c)KB|iB22}iP8jo|2|w69+{q3t+F`V5 zUtTdb6;$<(j0&n!;pE7ONwtaU$e=LH&K|qQ=={&%Muo2Jy2uT?jCD=gHP=&b-1Po> zdyj3gwnd-j3z~i2?C7R-t=3&zG~cL;OzBzFqj>I+e%;=*GbPMT&R@mI{N2Z6mY6c6RM++l@%JbKO#-Bzw4?N|VA{v9=2>Ci#|F4SM!tI9Jdc%sk&2#SAx_sW2B?~uR zxp>P1nLVC%G}Do}N%{RI^J9|M#^Px^X{DmJYero^k<#QlUf}B!lKkt#@%M+xQ}qAF zq-^5EirR3)+ert(xYa^6F9Bjgm&2X3pAl^JV|nMBzc%cBUC~6Y@=zsbI`9 zqxs=7?Sz?1#}a8fOr(QY5Oafc(hc^Qb;ol0hvO@T1hv_f;s(mBQ@WvHt*h`Dq~l delta 2874 zcmWmG^Vb#z7{>8>-n_8v^=8|)ZP&GI+q%+Ly)E0^viVlqaxL4owKaX8A3ond;5z3% z=N@tAUg8l4?j;UO9{E*-2stNC4J{e*)ks+pt$-C`MY1AWQLLy|G%LCl!}`XGX~nW) zTXC#!t+-Y^E54P$N@yjr5?e{Eq*gL3xs}37X?TUJ0`da<0{?-6%pf$)EYz?u7 zTEnd2)(C5)HOd-ojj?QvwZ>WFtqImd>j&#cYmznDnqq}nQ>~w@Y1VXWhBecgWzDwc zSaYp;)_iM$wa{8*Ew+|eORZ(ra%+XP(pqJ$w$@l{t)H!5taa9UYlF4X+GK6Ewpd%O zZPs>chqcq%W$m{1SbME~)_yD8I$#~N4q3lizgfRqhpi*lQR|p>+&W>Mv`$&4tv{?Y z)>-SEb>6yQU9>J)m#r(-RqL8{-MV4jv~F3qtvl9T>z;MrdSE@Y9$AmAC)QKznf2Uy zVZF3oS+A`()?4eH_1^kmeY8GVpRF&}pVnX2SL<)5h1|%4yvT?AD1d?}gu*C-q9}&qD1nkFh0-X4vM7i0sDO&7gvzLbs;GwQ zsDYZOh1#ftx~PZxXn=-jgvMxsrf7!dXn~dp?*Bbnp*7l|E!v?yI-nyup)jWjj|rHFAMhh4VKSy53{&wF zreQi}U?yf^Hs)Y1=3zb-U?CP^F_vH{mSH(oU?o;zHP&D)e#S3YhxOQijo5_E*n+Lt zhV9sao!Eul*n_>;hy4i00UX33{EFZ3I}YOrj^Y@O;{;CP6i(w0oWWU~!+Bi5MO?yV zT)|ab!*$%iP29q5+`(Pk!+ku!Lp;J`Ji${u!*jgAOT5Bsyun+%!+U(dM|{F(e8Hdi z3t#a!{=vWaFX99RIDZ5Xf=GyrD2R$^h>jTe1~Cx}u@MK~A}-<~J`x}y5+N~?ASsd| zIZ_}czC$X6A~n(=Ez%)9G9V)|Av3ZdE3zRwav&#iAvf|MFY+Nj3ZNhgp)iV|D2kyt zN}wc4p)|^%EXtugDxe}Np)#tVDypG6YM>@+p*HHEF6yB^8lWK>p)s1EDVm`j0T_ru7>pqpieVUz5g3V4 z7>zM7#$p`CV*)1P2mFXhn2ae1!&Ll)X_$@~n2A}KjX9W$d69;D zqd11+IDwNmh12*0XK)tha2^+M5tncoS8x^Aa2+>r6Sr_1cW@W?a32rw5RdQ}Pw*7a z0{iqluzX6ib&<+P2tKdjF~gn*nuN?s6I%N2l#0`z2gr+HUIz0jnAgF)3Fd7u?}B+B z%!gn;2JGMkSaW0*no(!Lw1Df-HSkY=*%yHJJJ6K1HD$; diff --git a/docs/index.html b/docs/index.html index dae258381dd..17d5dac57d4 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-10-27 02:00:06 A vulnerability has been found in code-projects Blood Bank Management up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /abs.php. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-10-27 00:15:12 A vulnerability, which was classified as critical, was found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/edit_customer.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. 详情 @@ -1979,6 +1979,54 @@

眈眈探求 | TITLE URL + + fb4ff42a8fb47819f9ebed514e571b9a + CVE-2024-4411 + 2024-10-29 03:29:00 + WordPress plugin Mihdan: Yandex Turbo Feed存储型跨站脚本漏洞 + 详情 + + + + 98f5585d8aad10f35096aed362718833 + CVE-2024-4398 + 2024-10-29 03:29:00 + WordPress plugin HTML5 Audio Player存储型跨站脚本漏洞 + 详情 + + + + ce5c02683bdda07b5326808cf4209e2e + CVE-2024-8006 + 2024-10-29 03:29:00 + libpcap空指针引用漏洞 + 详情 + + + + 0f3d97e8d9d4d50abebc90f253c7da04 + CVE-2024-4383 + 2024-10-29 03:29:00 + WordPress plugin Simple Membership存储型跨站脚本漏洞 + 详情 + + + + 9c7c5326d3780f2a9f6c16e7450b740e + CVE-2024-4386 + 2024-10-29 03:29:00 + WordPress plugin Gallery Block存储型跨站脚本漏洞 + 详情 + + + + 6e4e8d469fe49afb4aaf1272046f5097 + CVE-2024-4397 + 2024-10-29 03:29:00 + WordPress plugin LearnPress任意文件上传漏洞 + 详情 + + b9c2454f2ba7a259cbc7e286e7648741 CVE-2024-7691 @@ -2171,54 +2219,6 @@

眈眈探求 | 详情 - - ff2d8ccb968e7c9c225f92c2e1fdc653 - CVE-2024-1486 - 2024-10-28 03:30:42 - General Electric Healthcare Ultrasound权限提升漏洞 - 详情 - - - - d7ea38e6da8f928cd1b8f7df93c4fcb3 - CVE-2024-0870 - 2024-10-28 03:30:42 - WordPress plugin YITH WooCommerce Gift Cards未授权的数据修改漏洞 - 详情 - - - - 9fae8be3fe57b3fbbcca2fdba79a24a3 - CVE-2024-0762 - 2024-10-28 03:30:42 - Phoenix SecureCore缓冲区溢出漏洞 - 详情 - - - - 1871c659553f85e0bec49c03cb14c099 - CVE-2024-22268 - 2024-10-28 03:30:42 - VMware Workstation缓冲区溢出漏洞 - 详情 - - - - c1bae505d5850debc153af1d5434729f - CVE-2024-22267 - 2024-10-28 03:30:42 - VMware Workstation内存释放后重用漏洞 - 详情 - - - - f58581ecff1ee73dc13096bbf121156a - CVE-2023-6812 - 2024-10-28 03:30:42 - WordPress plugin WP Compress开放重定向漏洞 - 详情 - -