From 699a85101d82c0ac58813bf369bdf079ace48c07 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sat, 30 Nov 2024 15:23:52 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 ++ data/cves.db | Bin 50323456 -> 50331648 bytes docs/index.html | 212 ++++++++++++++++++------------------- 3 files changed, 116 insertions(+), 106 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 171b3894a29..851bfdf82c0 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -162,3 +162,13 @@ ae5f13c37bdb62da328ec37259df0c20 013cc1f619d0e360a5b60ac02e2d2ba5 986cbe64b36bd574405222eeeb27de1f 385cc7886317f397410f62dc190ce97b +26f52e08314e09b9d2c93d1e013424fb +3f725f35496ef3834518e7def96780b8 +afa05246475a6eb58e281fe67ab5dfed +8081ffc69c843827a239f1be21e916c4 +6466a855b952a9a8ecad4e010eb5f429 +81510a57672b6b7c26da6eb5cbfceda6 +781eccd878212e67c51af0cf98725192 +5ce0a9fa05c70f2f44c2741ac0dda9d3 +6a1a416bb27840943f632e63184a6bf2 +8d4f7bffbad5e10ee5c0516d2813a380 diff --git a/data/cves.db b/data/cves.db index a198b308ec8f32dadaddaff8d72aae6981d0ab80..e3347523821661b5dfc8ad0c0cc30cb776dda1a3 100644 GIT binary patch delta 6078 zcmb`}XM7Z80>|;}q(KOn&>B8+MmKC=vo2Y!I5P zN*O7lAQmiO!+;2=C=l$R5Hu(P78DUs;r{>iPPrF%r+)6m@5{c(%skILGtW@A^J=rQ zva;rj)8hNY#7Hqq#IB}3TPGaNsJp*;Oiaf);Z3vV^=iGKS8EdzP%Mf=@hAZ$qB^K9 zN<#HeGOCXnpzBZyN<|G(Bh(l*K}}IJ)Eu=yEm0auN3Bo>;BpppK{$GNT-nizFl?1*yn_tjLD!$bp=wGwOnFL^q*4)D?9@-BAzJ6ZJwjqu!_w z>WliJ{%8Oihz6m-=oT~t4MoGya5MsqM7N?*=r%MOjX`74ICML@1C2)$kcM2yjXX$4 zUNjNqBOjWCCZhsWh>DOO6{9IAfPyH5rlJxw4NXU-Xa<^zW}(^WPBaIVp}D9W%|r81 z7*(JJ=q_|Ox(D5h?n4XFB2yq3!4e^dfo*y^LN#JJ74B z3hhL@&}(QndL8XSd(l4h26_{{h4!Pj(L3k>I*1OTYIGRAi{3-;qYu!B=p*zoI)aX( zPtd367&?w>&*&eie!-J&_w>qByC7r(vDnD+LIed7Re?ZNJr9%m`M)FB@&T|LR4ZQ zR$?P|;vi1anRFpHlAA~#=}Nkh?xY9lNqUi+NpI4J^dj!B!kFcatj$khLT}q zI2l1kl3U3ravK><#*ndO9J!s`LB^8_L?bTZCLW>_FPTX4iH}SolSu(7Bt^teipdlb zAVCr$Q%MP#My8WeGK0({v&d|6Cz(Ua$XrrR=8^d%Oe)9%au>Oq+(Ygq_mPEU5ve4L z$r7@ZEF;Uw{bU7+kO#tRkz)8e))#$y&0GtS1}DBV;3alsrZ@k^@)7x%93e-^C*)Idj2tI5>1d`LbbACn{GDEWkZN{*4^q=uXzpOMc=EjdZPAYYPGOypP~ueb3FMxPvMUYyrsdyY1CzNu=)(lbK3DXzXz{{iEn zWoLw8RV(1hIwsTh)NVx?rsUkK;o6&GVsfv9YaNvvF-LHgd`-R~-;(dhIr2UEft)8l zk_+S~a*@#Gf7%UBj z^g_{%!y*S~PH(CQadbe}Ji+KWrUiTa!Hmi~-shwqOXW8=q9GCrXj>|~xcUs7jaF_1N4A>yoWCNg zv95)5e_(u}77Y14{-W{0d@W#9JH8Ptv1*R3YVFyDra04@d$tMj4gPsoY|*=7H-_Sb zjsE5d4N=b%+FE$06|1t~x^Qh5PN|}qTG33?yqaWHEH;bXs@d?AICKSb)NOXnW%YQC zB_&6MG(nalrdLW+^}(-k4f(Cdy9Tq(N87t#V|uRlNZpic%8GaU zJetSI%=ZZMjRtpL7CI(hyVQngy)3l*`)3;}%TA}Q0&CNm6A5Rl;cQLy+7+u;wOX7u z-K#oOi&b{$c8~6L+UyR=7+Q-*KNbfXi!)c6T3>VVaS6F4dXYynmdxL5%BoxB4{5!9 zLAPeCy>p`}(->l2V=6Snbr*z$#NVD&hjDJ(9--}DJw>+{F9_{9a(hKuxYijRd0REy zR#R+VtD;K|RmQ98bU8hW+o^hFytb-Eu^6dO?h?}Cc%Wh0o@UCp=DN+-G#)DqXkOwA zPSpy0GxUEg1Xm)E<2I&@I%``0+t`zS8@sc!DjPL>&I;Eq=AS!Fbo@;)3`cY?N;nkL zpjYzFdU=Ug5~@;nZZK5|kBY@p;>_jQ;o2UY-CS9nD{Bsq#cOwYy)MmT)v*!jR<~r8 zZ5}*ks-{M|58m4%(PFl$R>>aG`fC}HlpCfsv<~-`PSuJ;HAl{oW$aO6?nFJ**N68e zP}&chPw@A>Lvf0V#J5C||2V$Ye?8u)?s{72AVsfP(Is5lJ-QY>)o@SErpcN`wz*u2 z-C>cO7S(H072T%F4vS`-o3>wQg_psY@Y#E&bmI^fw3$(P@rsaa=rhlo^6M096SYFU zC}eEiyidrA3*k|UK1HhW-Hr>wtqHQ3qct+m*5JTyCsRxfjk3J+rUrlVBsG^V2_+I% zz*;^#T-%MKE{|8s<29>Wmoz8eWVc=NDqf4lt=KKH=9WBouB)@A2`$rck1ev*8QttX z*n|WAsT1=>++JsnJ#wPK2IY3IuRs_5C3+ybfoF>)K26lb+)!b0ZXm=1LLvM?u(Yti zS2S7FLLtpP`QMg7;W9|}|9lDaU%G^GqW-snS&0t2d``HwYjnbiYI&k&cgVWi?Qz&0 zij3v4yREY3mE2yZ1Dk+snC>_!q{UlRo1$X&y3j!^7%z>Na;6s+@Ut{xhVVB4jQ`# xm6)1EwjA7>Wb6n{G9^X)>(`_xcw+V6*YJAVZchy7nRQ{@$>aF^yzN(++7-d$g)f%-{tyAmO2DMRbQn6~Y+M>3qZECyPp?0cWYPZ^> z_NskqzdE4e)IoJf9acxwQFTnkD~n1{$JGgSQk_zX>a;qe&Z=|jyt<$+s!Qs!x}uU) zvbw6Ssq5;7x~Xod+v<+GtL~}$>VbNw9;wIbiF&G1RH}NWo~sw?rFx}at2FgSy;bkj zd-XwmRG-vm^+kPE-_&>YL;Y00)Nl1i{Z;8IV}b5|hynv_z!vNv6J!Q^$O2g*8#q9A zFhLH;3ArFQPijaEO2v5D6tH=>fQ_&TVqr6EfvvC&w!;qC z3A!HoF2F^&1ef6o zBtbGgXYizT0$#m z4Q-$;w1f8G3mu>%bb`*%1-gPCbc62D1A2l#^n%{d2l_%k=nn&6APj=RFa(CeFbII* zFak!xC>RZ6U@VM-@h|}`&GAb@i2Wey*IryJu%%iT{B%YC7R+* zakkF3C2XB+^V(*&&192d^TXz&&1;(!b3jU*aV(-u&Z;Xz5>w+0aS#r{VK@Ru;TXh& z1rp#moPd*X3KHQooPo1&4$i{`xCocvGF&k%iK$73chvuzxRr@0@9)>%Y!{Yhct<3R z@N%`p1ST63jEJP(e!k}Lpk!keGly9cXC)i8vf8 + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 26f52e08314e09b9d2c93d1e013424fb + CVE-2024-11998 + 2024-11-30 09:31:04 + A vulnerability was found in code-projects Farmacia 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /visualizer-forneccedor.chp. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + 3f725f35496ef3834518e7def96780b8 + CVE-2024-11997 + 2024-11-30 08:15:05 + A vulnerability was found in code-projects Farmacia 1.0. It has been classified as problematic. This affects an unknown part of the file /vendas.php. The manipulation of the argument notaFiscal leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + afa05246475a6eb58e281fe67ab5dfed + CVE-2024-11996 + 2024-11-30 08:15:03 + A vulnerability was found in code-projects Farmacia 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /editar-fornecedor.php. The manipulation of the argument cidade leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. + 详情 + + + + 8081ffc69c843827a239f1be21e916c4 + CVE-2024-11252 + 2024-11-30 06:15:17 + The Social Sharing Plugin – Sassy Social Share plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the heateor_mastodon_share parameter in all versions up to, and including, 3.3.69 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. + 详情 + + + + 6466a855b952a9a8ecad4e010eb5f429 + CVE-2024-43703 + 2024-11-30 03:15:14 + Software installed and run as a non-privileged user may conduct improper GPU system calls to achieve unauthorised reads and writes of physical memory from the GPU HW. + 详情 + + + + 81510a57672b6b7c26da6eb5cbfceda6 + CVE-2024-43702 + 2024-11-30 03:15:13 + Software installed and run as a non-privileged user may conduct improper GPU system calls to allow unprivileged access to arbitrary physical memory page. + 详情 + + + + 781eccd878212e67c51af0cf98725192 + CVE-2024-53623 + 2024-11-29 23:15:04 + Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information. + 详情 + + + + 5ce0a9fa05c70f2f44c2741ac0dda9d3 + CVE-2024-54159 + 2024-11-29 22:15:07 + stalld through 1.19.7 allows local users to cause a denial of service (file overwrite) via a /tmp/rtthrottle symlink attack. + 详情 + + + + 6a1a416bb27840943f632e63184a6bf2 + CVE-2024-11995 + 2024-11-29 21:15:04 + A vulnerability has been found in code-projects Farmacia 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /pagamento.php. The manipulation of the argument total leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + 8d4f7bffbad5e10ee5c0516d2813a380 + CVE-2024-53507 + 2024-11-29 20:15:21 + A SQL injection vulnerability was discovered in Siyuan 3.1.11 in /getHistoryItems. + 详情 + + d216fae7966329e95d51f2cabd12bbc8 CVE-2024-47094 @@ -366,7 +446,7 @@

眈眈探求 | + 2024-11-28 09:47:12 The Tumult Hype Animations plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the hypeanimations_panel() function in all versions up to, and including, 1.9.15. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. 详情 @@ -374,7 +454,7 @@

眈眈探求 | + 2024-11-28 09:47:12 The Restaurant & Cafe Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.9 via the 'narestaurant_elementor_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. 详情 @@ -382,7 +462,7 @@

眈眈探求 | + 2024-11-28 09:47:11 The Widget Options – The #1 WordPress Widget & Block Control Plugin plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.0.7 via the display logic functionality that extends several page builders. This is due to the plugin allowing users to supply input that will be passed through eval() without any filtering or capability checks. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server. Special note: We suggested the vendor implement an allowlist of functions and limit the ability to execute commands to just administrators, however, they did not take our advice. We are considering this patched, however, we believe it could still be further hardened and there may be residual risk with how the issue is currently patched. 详情 @@ -390,7 +470,7 @@

眈眈探求 | + 2024-11-28 09:47:11 The Primary Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.6.2 via the [prim_elementor_template] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created with Elementor that they should not have access to. 详情 @@ -398,7 +478,7 @@

眈眈探求 | + 2024-11-28 09:47:10 The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.7.1003 via the 'wpr-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created via Elementor that they should not have access to. 详情 @@ -406,7 +486,7 @@

眈眈探求 | + 2024-11-28 09:47:09 The Contest Gallery plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 24.0.7. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account. 详情 @@ -414,7 +494,7 @@

眈眈探求 | + 2024-11-28 09:46:07 The uyuni-server-attestation systemd service needs a database_password environment variable. This file has 640 permission, and cannot be shown users, but the environment is still exposed by systemd to non-privileged users. 详情 @@ -422,7 +502,7 @@

眈眈探求 | + 2024-11-28 09:42:48 Mattermost versions 10.0.x <= 10.0.1, 10.1.x <= 10.1.1, 9.11.x <= 9.11.3, 9.5.x <= 9.5.11 fail to properly validate email addresses which allows an unauthenticated user to bypass email domain restrictions via carefully crafted input on email registration. 详情 @@ -430,7 +510,7 @@

眈眈探求 | + 2024-11-28 09:38:03 Various problems in obs-scm-bridge allows attackers that create specially crafted git repositories to leak information of cause denial of service. 详情 @@ -438,91 +518,11 @@

眈眈探求 | + 2024-11-28 09:26:38 A Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in the Setup Wizard, HTTP Proxy credentials pane in spacewalk-web allows attackers to attack users by providing specially crafted URLs to click. This issue affects Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1: before 5.0.15-150600.3.10.2; SUSE Manager Server Module 4.3: before 4.3.42-150400.3.52.1. 详情 - - 2f727bde471b13c1ae2e14076ab3a4c8 - CVE-2024-52323 - 2024-11-27 09:54:07 - Zohocorp ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account. - 详情 - - - - 78c73790025e596e2f99c11661f97985 - CVE-2024-11667 - 2024-11-27 09:39:41 - A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL. - 详情 - - - - 33b86be4fda888a50ee1a76c72c90638 - CVE-2024-36467 - 2024-11-27 07:15:09 - An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. - 详情 - - - - 1fb8e3c220dcc19f8a44aa1cb777b334 - CVE-2024-10895 - 2024-11-27 07:15:08 - The Counter Up – Animated Number Counter & Milestone Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'lgx-counter' shortcode in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - d768d0b6cf54837815bfaeb67117fc0b - CVE-2024-10580 - 2024-11-27 07:15:07 - The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to unauthorized form submissions due to a missing capability check on the submit_form() function in all versions up to, and including, 7.8.5. This makes it possible for unauthenticated attackers to submit unpublished forms. - 详情 - - - - 7a72c1f1369688b841eb91926443ca98 - CVE-2024-10175 - 2024-11-27 07:15:07 - The Pricing Tables For WPBakery Page Builder (formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wdo_pricing_tables shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 77e99e99cdeb887bc152d7fc043686cb - CVE-2024-52959 - 2024-11-27 06:15:19 - A Improper Control of Generation of Code ('Code Injection') vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to perform arbitrary system commands via a DLL file. - 详情 - - - - fda1b5c1d4095322a3e93a9067c98fad - CVE-2024-52958 - 2024-11-27 06:15:18 - A improper verification of cryptographic signature vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to load a malicious DLL via upload plugin function. - 详情 - - - - 7e01b98183c1a6b72d5cc438a2ceab04 - CVE-2024-11219 - 2024-11-27 06:15:18 - The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information. - 详情 - - - - 58ee1c1a3573e58c2cbe62c68b43edef - CVE-2024-11083 - 2024-11-27 06:15:17 - The ProfilePress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.15.18 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. - 详情 - - @@ -2110,7 +2110,7 @@

眈眈探求 | + 2024-11-28 12:47:17 Autodesk AutoCAD越界写入漏洞 详情 @@ -2118,7 +2118,7 @@

眈眈探求 | + 2024-11-28 12:47:17 TRENDnet TEW-752DRU缓冲区溢出漏洞 详情 @@ -2126,7 +2126,7 @@

眈眈探求 | + 2024-11-28 12:47:17 D-Link DIR-860L缓冲区溢出漏洞 详情 @@ -2134,7 +2134,7 @@

眈眈探求 | + 2024-11-28 12:47:17 CPython CPU资源消耗漏洞 详情 @@ -2142,7 +2142,7 @@

眈眈探求 | + 2024-11-28 09:25:22 WordPress plugin SermonAudio Widgets SQL注入漏洞 详情 @@ -2150,7 +2150,7 @@

眈眈探求 | + 2024-11-28 09:25:22 WordPress plugin Back Link Tracker跨站请求伪造漏洞 详情 @@ -2158,7 +2158,7 @@

眈眈探求 | + 2024-11-28 09:25:22 Code-Projects Blood Bank System跨站脚本漏洞 详情 @@ -2166,7 +2166,7 @@

眈眈探求 | + 2024-11-28 09:25:22 PHPGurukul Boat Booking System SQL注入漏洞 详情 @@ -2174,7 +2174,7 @@

眈眈探求 | + 2024-11-28 09:25:22 SourceCodester Sentiment Based Movie Rating System SQL注入漏洞 详情 @@ -2182,7 +2182,7 @@

眈眈探求 | + 2024-11-28 09:25:22 WordPress plugin Product Website Showcase代码问题漏洞 详情 @@ -2190,7 +2190,7 @@

眈眈探求 | + 2024-11-28 09:25:22 WordPress plugin Simple User Registration身份验证绕过漏洞 详情 @@ -2198,7 +2198,7 @@

眈眈探求 | + 2024-11-28 09:25:22 WordPress plugin All in One Slider跨站脚本漏洞 详情 @@ -2206,7 +2206,7 @@

眈眈探求 | + 2024-11-28 09:25:22 Anuj Kumar Ifsc Code Finder Project跨站脚本漏洞 详情 @@ -2214,7 +2214,7 @@

眈眈探求 | + 2024-11-28 09:25:22 Codezips Sales Management System SQL注入漏洞 详情 @@ -2222,7 +2222,7 @@

眈眈探求 | + 2024-11-28 09:25:22 Ivanti远程代码执行漏洞 详情