From 600bc342bb6e480c7a80e110357ace4d956b68cf Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 4 Apr 2024 03:26:08 +0000 Subject: [PATCH] Updated by Github Bot --- cache/RedQueen.dat | 1 + data/cves.db | Bin 46948352 -> 46948352 bytes docs/index.html | 52 ++++++++++++++++++++++----------------------- 3 files changed, 27 insertions(+), 26 deletions(-) diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index bb1344ad1da..77def1487a0 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -157,3 +157,4 @@ f827406b553ac82153afb7601208e0d4 0a0339ab97832aeb5818dddcf6b0125c 89039d16287674e92028ced4db0c8b9c 22d11d6473f73d07232585587324f16f +256dd90a471317b77549c6176d8f442e diff --git a/data/cves.db b/data/cves.db index b9c31340e3306e1d6a4c31b3503622a36c81e2d1..dbcc0ee3c9bf887e51c708aeec9862d4bab462fa 100644 GIT binary patch delta 2811 zcmWmDRa6iL0EOX!f!*ERC=Dhmc6Y}G5xcuVy*74tcXxN|y61W-y3KX>zlZOf`~07C zldm2tkc_28170jE78md$MOJ_nXr;5#TN$j3R*;p+%4}t^vRc`!>{bpdrTUJ0`dajfw-T&=R-)D4O0ou6 z1Fb>UU~7mq)EZ_Dw?+GuUEHd|Y) zt=2YcyS2mGY3;IhTYId%);?>$b-+4k9kLEvN35gPG3&T>!a8Z4vQArPth3fR>%4Wr zx@cXpE?ZZutJXE^x^=_4Y2C7JTX(Fx);;UK^}u>)y==W=y=uK?y>7i>y=lE=y=}c? zy=%Q^y>ESBJ+eNuKC(WxKCwQvKC?czzOWu!Ppqd_n)S?jZhdKeWqobEu)eXrwZ5~y zw|=mGw0^RFwtlgGwSKdHxBjsHwEnXGw*ImHov(mY1t1XVkRBP35kbg=%*cYQ$cF65 zft<*N+{lBx$cOwWfPyH5!YG2GD2C!Ffs!bN(kO$nD2MW>fQqPu%BX^>sD@xvM-7A^ z6k!NQ1R@cIXvClkLSw>E3`%%v_(6#M+bC7Cv-*^bVWCGM-TKwFZ4zq^u_=EnV#$p`CV*(~(5+-8`reYeVV+N9uf|;0w*)Zl{F6LoA z7GNP3Ar*_U1WU0D%drA0u?nlP25Yen>#+eFu?d^81zWKV+pz;Xu?xGg2Yay(`*8pV zaR`TT1V?cU$8iEDaSEq#24`^&=WziSaS4}k1y^wm*Kq?kaSOL`2X}D~_wgX`k{$-` zY@0npP?wjotjzoVNa=$l)$)@L?0TMrFG%TDWNZAPl*hRj7m(b z84@269U2}Qoe&)z8Bw!eRA_WmVoXv*L|Ff{^V^>+T^!e?ad22jSa@(mR7^z7me%w3 z2Uafqbk)%($rsa(U3jv2;qx^o)7H;^d^Yvzp&e=44nMne@M-GyE%D(80&A9y3Xe=m pND2>*35|{njtJ=&!%7GV4hiocA0HkSo)90BcqO*m!@z4n{{fIDEzSS{ delta 2660 zcmWmDWm^yi07c<}0oaM%UDzGi-HCne?ru=8ii%>lVs{5Nb}w|Zm&VeivFY;c!}|x$ z^PI?Y2SXzfn=RnQqU?17UPQ?XumY__R$?oOmDCEdf~^oMnU&m1VWqTES*fiwR$42a zmEOu=Wwb)AOjc$qiSUIg+R&FbgmDkE=<+lo01+79>VXKH$)GB5bw@O%H zR!OUrRoW_Jm9@%Q<*f=r-f2y3J@${KBrvBp~CtntI$#~N4q1n-Bi2#tm=$jww@z3m zty9)%>x^~QO0dpZ=dBCYMeCAv*}7s~wXRv$tsB-&>z4Jt^?~)F^^tYkx?_E8ePZ3U z?pgP(2i8ODk@eX6)cVZ&-1@@$()!AJVm-Bt^6hToGLvfTq7)qiP zN}~+Qq8!Sj0xF^sDx(Ujq8h5B2EtJjwNM*%P#5)39}UnDjnEiP&=k$k94*iitOvN-rA_~(n12bXF!febzH0EL+<|76Run@6WgvD5brC5gLSb>#T zh1FPtwOEJs*nl`}#3pRU7Hq{fY{w4l#4hZ{9_+C^8{4vLGw6AvnV#$p`CV*(~(5+-8`reYc*5ryfPftfI7VK(L< z8gnrZ^AUpuScq6G!eT7JQY^!AtiVdF!fLF+TCBr*Y(N|~ViPuF3$|h#wqpl&Vi$H} z5B6do_TvB!;t&qw2#(?y;&B`&a1y6*8fS182{?!IxPXhegv+>stGI^ixPhC2XLKuY oON-=*gTvoTwlw5%NV?#Jv~i6C!h+&!#+42XNC=O(6?i`AKTo3cdjJ3c diff --git a/docs/index.html b/docs/index.html index 9119da33d2b..b502c981335 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-04-02 19:15:47 Server-Side Request Forgery (SSRF) vulnerability in Builderall Team Builderall Builder for WordPress.This issue affects Builderall Builder for WordPress: from n/a through 2.0.1. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-04-02 19:15:47 Server-Side Request Forgery (SSRF) vulnerability in Nelio Software Nelio Content.This issue affects Nelio Content: from n/a through 3.2.0. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-04-02 19:15:47 Server-Side Request Forgery (SSRF) vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks.This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.2.25. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-04-02 18:15:12 Cross-Site Request Forgery (CSRF) vulnerability in Toastie Studio Woocommerce Social Media Share Buttons allows Stored XSS.This issue affects Woocommerce Social Media Share Buttons: from n/a through 1.3.0. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-04-02 18:15:12 Cross-Site Request Forgery (CSRF) vulnerability in Adam Bowen Tax Rate Upload allows Reflected XSS.This issue affects Tax Rate Upload: from n/a through 2.4.5. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-04-02 18:15:12 An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in Ap4Sample.h in AP4_Sample::GetOffset() const, leading to a Denial of Service (DoS), as demonstrated by mp42ts. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-04-02 18:15:12 An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_SubStream::~AP4_SubStream at Ap4ByteStream.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-04-02 18:15:12 An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free in AP4_UnknownAtom::~AP4_UnknownAtom at Ap4Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42ts. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-04-02 18:15:12 An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-04-02 18:15:12 Foxit PDF Reader AcroForm Annotation Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22641. 详情 @@ -2094,7 +2094,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Google Chromecast任意代码执行漏洞 详情 @@ -2102,7 +2102,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Google Pixel空指针解引用漏洞 详情 @@ -2110,7 +2110,7 @@

眈眈探求 | + 2024-04-02 07:20:54 EverShop NPM跨站脚本漏洞 详情 @@ -2118,7 +2118,7 @@

眈眈探求 | + 2024-04-02 07:20:54 EverShop NPM跨站脚本漏洞 详情 @@ -2126,7 +2126,7 @@

眈眈探求 | + 2024-04-02 07:20:54 HashiCorp Vault拒绝服务漏洞 详情 @@ -2134,7 +2134,7 @@

眈眈探求 | + 2024-04-02 07:20:54 nuxt-api-party不受控制的资源消耗漏洞 详情 @@ -2142,7 +2142,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Caddy-geo-ip身份认证绕过漏洞 详情 @@ -2150,7 +2150,7 @@

眈眈探求 | + 2024-04-02 07:20:54 QNAP Systems QTS和QuTS hero缓冲区溢出漏洞 详情 @@ -2158,7 +2158,7 @@

眈眈探求 | + 2024-04-02 07:20:54 QNAP Systems QTS和QuTS hero缓冲区溢出漏洞 详情 @@ -2166,7 +2166,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Qualys Web Application跨站脚本漏洞 详情 @@ -2174,7 +2174,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Candid无限循环漏洞 详情 @@ -2182,7 +2182,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Johnson Controls多款产品不受控制的资源消耗漏洞 详情 @@ -2190,7 +2190,7 @@

眈眈探求 | + 2024-04-02 07:20:54 GPAC内存泄露漏洞 详情 @@ -2198,7 +2198,7 @@

眈眈探求 | + 2024-04-02 07:20:54 Gladys Assistant目录遍历漏洞 详情 @@ -2206,7 +2206,7 @@

眈眈探求 | + 2024-04-02 07:20:54 ControlByWeb Relay跨站脚本漏洞 详情