Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Nov 5, 2024
1 parent 601d554 commit 95c430d
Show file tree
Hide file tree
Showing 3 changed files with 22 additions and 7 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -119,3 +119,18 @@ ddcd3908606927cbb9eb911fcab99c9a
921e056df939297a33e8f7151680cf2d
7b861bf26741afd5ab752b2a105f2ad4
47885a50d91a5d7098785f3c43332d19
4e64137889a52a72c41c0e2a34a11883
a8775cf18e427fb27e0727e30ddd8f1f
77ae7959da752574afb9e4ad40639a96
b519622cf4428ee54146e3db003bd9fd
69c3b1e02e1b4bdde001c3b73be66761
d5d3c0337687a077d914585dac5efadc
7d3a216fc1a69406a1df2b60a5d4e21e
fa335a0172e9ba45fef2cc94920bc71d
ede04d544cf307f9d8743f072e55f176
9ecbe6773c0a040d89a2eaab9ca77c75
286c3e6ee8e448e952692a8fed9292b5
fb1b133a8266a6a0a602e73778a448f8
c2c155e6c529a51620429abfb93c137c
04cd59220f0e450e5791153deb205f6c
267ff950eb2a6bfcf8ef656b71acddf6
Binary file modified data/cves.db
Binary file not shown.
14 changes: 7 additions & 7 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-11-04 18:30:58 -->
<!-- RELEASE TIME : 2024-11-05 03:27:29 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,47 +366,47 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>2574508adf0842b5633e49e14c2148d0</td>
<td>CVE-2024-10735</td>
<td>2024-11-03 14:15:13 <img src="imgs/new.gif" /></td>
<td>2024-11-03 14:15:13</td>
<td>A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /editNominee.php. The manipulation of the argument nominee_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10735">详情</a></td>
</tr>

<tr>
<td>fe2e0827c1101a8cadc578827379d5ab</td>
<td>CVE-2024-10734</td>
<td>2024-11-03 13:15:03 <img src="imgs/new.gif" /></td>
<td>2024-11-03 13:15:03</td>
<td>A vulnerability was found in Project Worlds Life Insurance Management System 1.0. It has been classified as critical. This affects an unknown part of the file /editPayment.php. The manipulation of the argument recipt_no leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10734">详情</a></td>
</tr>

<tr>
<td>68a36067213470b487f2f2e69736adfa</td>
<td>CVE-2024-10733</td>
<td>2024-11-03 12:15:12 <img src="imgs/new.gif" /></td>
<td>2024-11-03 12:15:12</td>
<td>A vulnerability was found in code-projects Restaurant Order System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10733">详情</a></td>
</tr>

<tr>
<td>7939ea4dec7bd387d5748274bd747d21</td>
<td>CVE-2024-10732</td>
<td>2024-11-03 11:15:03 <img src="imgs/new.gif" /></td>
<td>2024-11-03 11:15:03</td>
<td>A vulnerability has been found in Tongda OA 2017 up to 11.10 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /module/word_model/view/index.php. The manipulation of the argument query_str leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10732">详情</a></td>
</tr>

<tr>
<td>81f8e1446fee3f35f2f4736cba6f2153</td>
<td>CVE-2024-10731</td>
<td>2024-11-03 10:15:03 <img src="imgs/new.gif" /></td>
<td>2024-11-03 10:15:03</td>
<td>A vulnerability, which was classified as critical, was found in Tongda OA up to 11.10. Affected is an unknown function of the file /pda/appcenter/check_seal.php. The manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10731">详情</a></td>
</tr>

<tr>
<td>44f01974c5741fe3206a0bf0a5b22df4</td>
<td>CVE-2024-10730</td>
<td>2024-11-03 09:15:02 <img src="imgs/new.gif" /></td>
<td>2024-11-03 09:15:02</td>
<td>A vulnerability, which was classified as critical, has been found in Tongda OA up to 11.6. This issue affects some unknown processing of the file /pda/appcenter/web_show.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10730">详情</a></td>
</tr>
Expand Down

0 comments on commit 95c430d

Please sign in to comment.