Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 12, 2024
1 parent e9f689e commit 86c0664
Show file tree
Hide file tree
Showing 3 changed files with 104 additions and 89 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -113,3 +113,18 @@ eed7068e0443f7be79c1700f21937afa
317fdd63a2e2678fe420cb0142a9a4da
250e47cf0b1e4a6a499f79e09ace7dcb
e5f28ba928f75cc38ff2d90b5b10a9ed
73003f18bdb351c594e21063510c69d7
a1b7d11b11132756d7b65d22ca692806
22bee4d934505369b3508678261b2f87
a96c59451064ce1b9b4d86839a3d5cc2
7a76238d0f00302376bf6ea558732ac1
cc90f10451c3db4d0b91ee13cb8cd563
4ed7b40ee6e6d3106101ff230571272f
7ad8fa25ef01182e7b68fa4df5ec52ce
e4a315dca4650fe9e703fb85beca1ff8
a542e458fdef7f8bcd442bffb9404774
c06d3d38c8160900f6e38856c2780665
7dcbaed96391fff5f09eec3578978fee
72f5a3dfb7be4d5da0df17db2b452c73
cb3ff3014afcfcbc6e351b182804269c
e6749972d7bce2c245d9e1db5c67e93c
Binary file modified data/cves.db
Binary file not shown.
178 changes: 89 additions & 89 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-10-11 21:25:15 -->
<!-- RELEASE TIME : 2024-10-12 09:24:13 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>dfa4a6190fd7db71398cbe165104799f</td>
<td>CVE-2024-9792</td>
<td>2024-10-10 15:15:15 <img src="imgs/new.gif" /></td>
<td>2024-10-10 15:15:15</td>
<td>A vulnerability classified as problematic has been found in D-Link DSL-2750U R5B017. This affects an unknown part of the component Port Forwarding Page. The manipulation of the argument PortMappingDescription leads to cross site scripting. It is possible to initiate the attack remotely.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9792">详情</a></td>
</tr>

<tr>
<td>5fecda3a6c9b0e5493bce57bffda2d26</td>
<td>CVE-2024-9790</td>
<td>2024-10-10 15:15:15 <img src="imgs/new.gif" /></td>
<td>2024-10-10 15:15:15</td>
<td>A vulnerability was found in LyLme_spage 1.9.5. It has been classified as critical. Affected is an unknown function of the file /admin/sou.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9790">详情</a></td>
</tr>

<tr>
<td>3899d9438f12e23dcacb9dbd3038087c</td>
<td>CVE-2024-9789</td>
<td>2024-10-10 14:15:06 <img src="imgs/new.gif" /></td>
<td>2024-10-10 14:15:06</td>
<td>A vulnerability was found in LyLme_spage 1.9.5 and classified as critical. This issue affects some unknown processing of the file /admin/apply.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9789">详情</a></td>
</tr>

<tr>
<td>546d5a035e17cd43f49f54a53aa1448a</td>
<td>CVE-2024-9788</td>
<td>2024-10-10 14:15:06 <img src="imgs/new.gif" /></td>
<td>2024-10-10 14:15:06</td>
<td>A vulnerability has been found in LyLme_spage 1.9.5 and classified as critical. This vulnerability affects unknown code of the file /admin/tag.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9788">详情</a></td>
</tr>

<tr>
<td>72b79308071b93914bd1d8d76f6fdfb2</td>
<td>CVE-2024-9787</td>
<td>2024-10-10 14:15:06 <img src="imgs/new.gif" /></td>
<td>2024-10-10 14:15:06</td>
<td>A vulnerability, which was classified as problematic, was found in Contemporary Control System BASrouter BACnet BASRT-B 2.7.2. This affects an unknown part of the component UDP Packet Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9787">详情</a></td>
</tr>

<tr>
<td>348e467c14b334a11dfab9319ecdef70</td>
<td>CVE-2024-9312</td>
<td>2024-10-10 14:15:05 <img src="imgs/new.gif" /></td>
<td>2024-10-10 14:15:05</td>
<td>Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9312">详情</a></td>
</tr>

<tr>
<td>0cfb2ae586379312325c5bd7bbcfce4f</td>
<td>CVE-2024-4658</td>
<td>2024-10-10 14:15:05 <img src="imgs/new.gif" /></td>
<td>2024-10-10 14:15:05</td>
<td>SQL Injection: Hibernate vulnerability in TE Informatics Nova CMS allows SQL Injection.This issue affects Nova CMS: before 5.0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4658">详情</a></td>
</tr>

<tr>
<td>814b7b2cb8616b2f1c8ae7e7dfafee15</td>
<td>CVE-2024-44711</td>
<td>2024-10-10 14:15:04 <img src="imgs/new.gif" /></td>
<td>2024-10-10 14:15:04</td>
<td>Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-44711">详情</a></td>
</tr>

<tr>
<td>6934ba7568a466d8f213c3b93eb948b1</td>
<td>CVE-2024-9786</td>
<td>2024-10-10 13:15:14 <img src="imgs/new.gif" /></td>
<td>2024-10-10 13:15:14</td>
<td>A vulnerability, which was classified as critical, has been found in D-Link DIR-619L B1 2.06. Affected by this issue is the function formSetLog of the file /goform/formSetLog. The manipulation of the argument curTime leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9786">详情</a></td>
</tr>

<tr>
<td>8856413412be45dffb014938d9fa924d</td>
<td>CVE-2024-9785</td>
<td>2024-10-10 13:15:14 <img src="imgs/new.gif" /></td>
<td>2024-10-10 13:15:14</td>
<td>A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. Affected by this vulnerability is the function formSetDDNS of the file /goform/formSetDDNS. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9785">详情</a></td>
</tr>
Expand Down Expand Up @@ -1979,6 +1979,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>73003f18bdb351c594e21063510c69d7</td>
<td>CVE-2024-42029</td>
<td>2024-10-12 09:22:06 <img src="imgs/new.gif" /></td>
<td>xdg-desktop-portal-hyprland操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102853">详情</a></td>
</tr>

<tr>
<td>9b3fd595c47d5eebb5ac1315d496bbd6</td>
<td>CVE-2024-40689</td>
Expand Down Expand Up @@ -2100,123 +2108,115 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>5d6c0f1ef6972e6adfff388ef1263a9c</td>
<td>CVE-2023-47683</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin WordPress Social Login and Register权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102724">详情</a></td>
</tr>

<tr>
<td>783502739838401e029e2838d6132046</td>
<td>CVE-2023-51356</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin ARMember权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102723">详情</a></td>
<td>a1b7d11b11132756d7b65d22ca692806</td>
<td>CVE-2024-6661</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress ParityPress – Parity Pricing with Discount Rules跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102863">详情</a></td>
</tr>

<tr>
<td>d99a809250982dc3404b411351ff1960</td>
<td>CVE-2023-49753</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Adifier System路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102722">详情</a></td>
<td>22bee4d934505369b3508678261b2f87</td>
<td>CVE-2024-6634</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Master Currency WP Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102862">详情</a></td>
</tr>

<tr>
<td>7d061b34ed0afbda2eacaa5eecf7db86</td>
<td>CVE-2023-34186</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Headless CMS缺少授权漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102721">详情</a></td>
<td>a96c59451064ce1b9b4d86839a3d5cc2</td>
<td>CVE-2024-6591</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Ultimate WordPress Auction Plugin未授权邮件创建漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102861">详情</a></td>
</tr>

<tr>
<td>5c689b85cb4eeb59c1ad0f942271b461</td>
<td>CVE-2023-37389</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Booking Package权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102720">详情</a></td>
<td>7a76238d0f00302376bf6ea558732ac1</td>
<td>CVE-2024-6573</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Intelligence Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102860">详情</a></td>
</tr>

<tr>
<td>33a7d2a940f8ddfee3f5ad63d8dac6f5</td>
<td>CVE-2023-48319</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Salon booking system权限管理错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102719">详情</a></td>
<td>cc90f10451c3db4d0b91ee13cb8cd563</td>
<td>CVE-2024-6566</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Aramex Shipping WooCommerce Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102859">详情</a></td>
</tr>

<tr>
<td>80792c0f4408c7f8f8894a4e80bdbfc4</td>
<td>CVE-2023-51479</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Build App Online权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102718">详情</a></td>
<td>4ed7b40ee6e6d3106101ff230571272f</td>
<td>CVE-2024-6548</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Add Admin JavaScript Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102858">详情</a></td>
</tr>

<tr>
<td>e168431dd4ee9899b6f59b44cff27caa</td>
<td>CVE-2024-22145</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin InstaWP Connect权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102717">详情</a></td>
<td>7ad8fa25ef01182e7b68fa4df5ec52ce</td>
<td>CVE-2024-6547</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Add Admin CSS Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102857">详情</a></td>
</tr>

<tr>
<td>c3aa1ffa8945d29325df721a5c77090a</td>
<td>CVE-2023-51398</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Ultimate Addons for Beaver Builder权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102716">详情</a></td>
<td>e4a315dca4650fe9e703fb85beca1ff8</td>
<td>CVE-2024-6546</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress One Click Close Comments Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102856">详情</a></td>
</tr>

<tr>
<td>0f260ee69cd816e77e8c5a12b2f95ff6</td>
<td>CVE-2023-48757</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin JetEngine权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102715">详情</a></td>
<td>a542e458fdef7f8bcd442bffb9404774</td>
<td>CVE-2024-6545</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Admin Trim Interface Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102855">详情</a></td>
</tr>

<tr>
<td>ba973dbffa609f5155007e8944eb5185</td>
<td>CVE-2023-47868</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin wpForo Forum权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102714">详情</a></td>
<td>c06d3d38c8160900f6e38856c2780665</td>
<td>CVE-2024-6549</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>WordPress Admin Post Navigation Plugin完整路径泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102854">详情</a></td>
</tr>

<tr>
<td>5f51bb4b513845902ca53716137553cb</td>
<td>CVE-2023-37999</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin HT Mega权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102713">详情</a></td>
<td>7dcbaed96391fff5f09eec3578978fee</td>
<td>CVE-2024-4603</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>OpenSSL拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102852">详情</a></td>
</tr>

<tr>
<td>9dd1bbcf27a0fe513b528c267417136a</td>
<td>CVE-2023-51401</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Ultimate Addons for Beaver Builder路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102712">详情</a></td>
<td>72f5a3dfb7be4d5da0df17db2b452c73</td>
<td>CVE-2024-4609</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>Rockwell Automation FactoryTalk View SESQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102851">详情</a></td>
</tr>

<tr>
<td>803b03ed0a57f6a2ae5b14b1e13edc13</td>
<td>CVE-2023-51424</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin WebinarIgnition权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102711">详情</a></td>
<td>cb3ff3014afcfcbc6e351b182804269c</td>
<td>CVE-2024-4956</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>Sonatype Nexus Repository路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102850">详情</a></td>
</tr>

<tr>
<td>7f5f025dfb1cef5c6ac4e19db783dd54</td>
<td>CVE-2023-37866</td>
<td>2024-10-10 09:23:34 <img src="imgs/new.gif" /></td>
<td>WordPress plugin JetFormBuilder权限管理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102710">详情</a></td>
<td>e6749972d7bce2c245d9e1db5c67e93c</td>
<td>CVE-2024-27260</td>
<td>2024-10-11 09:22:06 <img src="imgs/new.gif" /></td>
<td>IBM AIX命令执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102849">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit 86c0664

Please sign in to comment.