Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 26, 2024
1 parent 61d2bdb commit 7eb02f9
Show file tree
Hide file tree
Showing 4 changed files with 15 additions and 13 deletions.
1 change: 1 addition & 0 deletions cache/Cert 360.dat
Original file line number Diff line number Diff line change
Expand Up @@ -164,3 +164,4 @@ d8c34853fbcc6b39ae0a3783c6fa6d44
48ff3925c0cc22862b0d6e1f52140bdc
f000a20bfa53fd8b0f5231b52ff34577
55c72f6f2af616fbddbb643df06c3b3a
bc2c3923f651854c68f2dd6f99d69f0a
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -118,3 +118,4 @@ b7ea85bfcc761d1a31eed633b0fdcf88
7f8f74fb7d80f06199d9eb41bcaa5cce
74912b600c66d27f10b69747660626a7
8f56dc22ce5356a70c244c9549fee0b6
6e9a62415a6d721405d639aa522eec7d
Binary file modified data/cves.db
Binary file not shown.
26 changes: 13 additions & 13 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-25 12:36:32 -->
<!-- RELEASE TIME : 2024-02-26 03:24:36 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -27,6 +27,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>bc2c3923f651854c68f2dd6f99d69f0a</td>
<td></td>
<td>2024-02-26 03:00:09 <img src="imgs/new.gif" /></td>
<td>安全事件周报 2024-02-19 第8周</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=65dbfe67c09f255b91b17dec">详情</a></td>
</tr>

<tr>
<td>55c72f6f2af616fbddbb643df06c3b3a</td>
<td>CVE-2024-21413</td>
Expand Down Expand Up @@ -259,14 +267,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=65548700ea0822e915605f61">详情</a></td>
</tr>

<tr>
<td>e0eeac094199a36e77b80367b0494ff0</td>
<td></td>
<td>2023-11-13 09:06:47</td>
<td>安全事件周报 2023-11-06 第45周</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=6551e721ea0822e915605f3c">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand All @@ -286,31 +286,31 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>d5f2ea064dd354098873ef40f528fee2</td>
<td>CVE-2024-21502</td>
<td>2024-02-24 05:15:44 <img src="imgs/new.gif" /></td>
<td>2024-02-24 05:15:44</td>
<td>Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable's actual value it could be arbitrary free(), arbitrary realloc(), null pointer dereference and other. Since the stack can be controlled by the attacker, the vulnerability could be used to corrupt allocator structure, leading to possible heap exploitation. The attacker could cause denial of service by exploiting this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21502">详情</a></td>
</tr>

<tr>
<td>44456e2fe953f67d8b1826b8889d54da</td>
<td>CVE-2024-21501</td>
<td>2024-02-24 05:15:44 <img src="imgs/new.gif" /></td>
<td>2024-02-24 05:15:44</td>
<td>Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21501">详情</a></td>
</tr>

<tr>
<td>b66b8cef44c3dd75e1a1f19fda5cdb08</td>
<td>CVE-2024-1810</td>
<td>2024-02-24 05:15:43 <img src="imgs/new.gif" /></td>
<td>2024-02-24 05:15:43</td>
<td>The Archivist – Custom Archive Templates plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘shortcode_attributes' parameter in all versions up to, and including, 1.7.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1810">详情</a></td>
</tr>

<tr>
<td>6ef3af727eb04d9fb4c43ad16e6db9df</td>
<td>CVE-2024-22395</td>
<td>2024-02-24 00:15:45 <img src="imgs/new.gif" /></td>
<td>2024-02-24 00:15:45</td>
<td>Improper access control vulnerability has been identified in the SMA100 SSL-VPN virtual office portal, which in specific conditions could potentially enable a remote authenticated attacker to associate another user's MFA mobile application.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22395">详情</a></td>
</tr>
Expand Down

0 comments on commit 7eb02f9

Please sign in to comment.