Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed May 13, 2024
1 parent ad71be0 commit 849beca
Show file tree
Hide file tree
Showing 3 changed files with 20 additions and 19 deletions.
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -103,3 +103,4 @@ e51173453a5c73b98129c9b49b8a3bb8
b54cb3c74a4ecfdb70f135eefc3d291a
71cd679525b8c3bed7d4e74d40249f9b
ca55f94bf1e440857740ffe3d38b05c8
72bb5ac3ad6b3d5210bebf3e641140b5
Binary file modified data/cves.db
Binary file not shown.
38 changes: 19 additions & 19 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-05-11 07:23:14 -->
<!-- RELEASE TIME : 2024-05-13 03:25:58 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -286,23 +286,23 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>97091980c5e1b8458e4e6fa2fc74838e</td>
<td>CVE-2024-34360</td>
<td>2024-05-10 00:00:00 <img src="imgs/new.gif" /></td>
<td>2024-05-10 00:00:00</td>
<td>Nodes can publish ATXs which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule and can serve as an attack vector where Nodes are rewarded for holding their PoST data for less than one epoch but still being eligible for rewards.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34360">详情</a></td>
</tr>

<tr>
<td>f14b094a1f9177dc64e84fdbe5968b5c</td>
<td>CVE-2024-34349</td>
<td>2024-05-10 00:00:00 <img src="imgs/new.gif" /></td>
<td>2024-05-10 00:00:00</td>
<td>There is a possibility to execute javascript code in the Admin panel. In order to perform an XSS attack input a script into Name field in which of the resources: Taxons, Products, Product Options or Product Variants. The code will be executed while using an autocomplete field with one of the listed entities in the Admin Panel. Also for the taxons in the category tree on the product form.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34349">详情</a></td>
</tr>

<tr>
<td>903af0a69e5d47ff38f36d634b501944</td>
<td>CVE-2024-32964</td>
<td>2024-05-10 00:00:00 <img src="imgs/new.gif" /></td>
<td>2024-05-10 00:00:00</td>
<td>SSRF ,All users will be impacted.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32964">详情</a></td>
</tr>
Expand Down Expand Up @@ -1974,119 +1974,119 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>dcc499b87574144c124d82ea56a02fa2</td>
<td>CVE-2021-38938</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>IBM Host Access Transformation Services信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94683">详情</a></td>
</tr>

<tr>
<td>fedcd22bf677d7ba1283137ef9268429</td>
<td>CVE-2023-47162</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>IBM Sterling Secure Proxy跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94682">详情</a></td>
</tr>

<tr>
<td>f3cb4125992652ec2e682c85e433be2c</td>
<td>CVE-2023-46182</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>IBM Sterling Secure Proxy跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94681">详情</a></td>
</tr>

<tr>
<td>cb1dba16726612cb00da510050b8139a</td>
<td>CVE-2024-28070</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>Mitel MiContact Center Business信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94680">详情</a></td>
</tr>

<tr>
<td>e2f7af369639e47c1bf5bcfca88c02bc</td>
<td>CVE-2024-22513</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>Simple JWT信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94679">详情</a></td>
</tr>

<tr>
<td>5b1d2b8ca75d05992235fcfcb2d49181</td>
<td>CVE-2024-28640</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>TOTOLink X5000R和A7000R缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94678">详情</a></td>
</tr>

<tr>
<td>2f187238b6ccdde1a1360201445ae916</td>
<td>CVE-2024-28639</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>TOTOLink X5000R和A7000R缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94677">详情</a></td>
</tr>

<tr>
<td>222bed1130f690f6442b5c4e79be2d90</td>
<td>CVE-2023-46179</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>IBM Sterling Secure Proxy信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94676">详情</a></td>
</tr>

<tr>
<td>8f300ce972351ec8676ddeccc08df06a</td>
<td>CVE-2024-28069</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>Mitel MiContact Center Business信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94675">详情</a></td>
</tr>

<tr>
<td>81ceb07131177a0aa1481d3ec3749330</td>
<td>CVE-2024-2495</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>FriendlyWrt加密密钥漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94674">详情</a></td>
</tr>

<tr>
<td>b4beced351a2368355455ab4f05afc3a</td>
<td>CVE-2024-2294</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>WordPress Backuply Plugin目录遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94673">详情</a></td>
</tr>

<tr>
<td>af1904a750b6d1fe91dd794f6564f7f2</td>
<td>CVE-2023-6725</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>OpenStack Designate访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94672">详情</a></td>
</tr>

<tr>
<td>42b96babc8ff3401debbb65b3df9057c</td>
<td>CVE-2024-2308</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>WordPress ElementInvader Addons for Elementor Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94671">详情</a></td>
</tr>

<tr>
<td>f7cab244a92c930f1fb49b1a834b971e</td>
<td>CVE-2024-28847</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>OpenMetadata代码注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94670">详情</a></td>
</tr>

<tr>
<td>ecf8b658e8021d4bd64f9b1e30263801</td>
<td>CVE-2024-6525</td>
<td>2024-05-10 09:22:42 <img src="imgs/new.gif" /></td>
<td>2024-05-10 09:22:42</td>
<td>WordPress ElementsKit Elementor addons Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94669">详情</a></td>
</tr>
Expand Down

0 comments on commit 849beca

Please sign in to comment.