Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed May 7, 2024
1 parent 239ddf1 commit aa8406e
Show file tree
Hide file tree
Showing 3 changed files with 101 additions and 86 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -168,3 +168,18 @@ e5d5ae3301e97bd9db6048ee8a9f9b1b
e650ba3da06dcb5ced4aba5744679baf
cb3ed5920eeacfef0f3cdec6b0dda487
888b6ce799c73abbf66f927267164418
90bcd60e47b9021a55c78b42ed2c444d
7c9cd966edcc6435d525afdad76324c2
d9d19930a6250e0dfd690e3a8bafc8f8
dbf5e2f75715ffd2b107553311f4061d
6a49c7588feadb20464eb848cf0e895a
6173dca00b18f45efa99ed05fdbb95e6
50189184b6661d6d79056b5568b97209
e137c673497069db3898151945cd0039
ea2d9c7432e1da8903c1f853a3d36079
286f3596bbde448c479d03c329e42d93
0226366a6e0ea225ed7d1f35a9d7c377
e41e6a81b63f4dc08dd965c073cb39d0
31d12bd64f7ba23c1031994fb50c420e
b5ab393eadb03a6777e13da8d9317878
fb1453820f896c78166f2b62dd1e4356
Binary file modified data/cves.db
Binary file not shown.
172 changes: 86 additions & 86 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-05-06 23:23:16 -->
<!-- RELEASE TIME : 2024-05-07 03:27:32 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>9a64fd3ea990ec616bdbf594b16b0e6e</td>
<td>CVE-2024-4493</td>
<td>2024-05-05 03:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 03:15:07</td>
<td>A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656). Affected is the function formSetAutoPing. The manipulation of the argument ping1/ping2 leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263082 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4493">详情</a></td>
</tr>

<tr>
<td>72fe7aa0e375a66197448fea1aa700ca</td>
<td>CVE-2024-34490</td>
<td>2024-05-05 03:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 03:15:07</td>
<td>In Maxima through 5.47.0 before 51704c, the plotting facilities make use of predictable names under /tmp. Thus, the contents may be controlled by a local attacker who can create files in advance with these names. This affects, for example, plot2d.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34490">详情</a></td>
</tr>

<tr>
<td>fc24713ce3a9173484ce6b5457714923</td>
<td>CVE-2024-34489</td>
<td>2024-05-05 03:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 03:15:07</td>
<td>OFPHello in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via length=0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34489">详情</a></td>
</tr>

<tr>
<td>0cc1c8dd6314f422d5b4c25fa3ef8af3</td>
<td>CVE-2024-34488</td>
<td>2024-05-05 03:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 03:15:07</td>
<td>OFPMultipartReply in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via b.length=0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34488">详情</a></td>
</tr>

<tr>
<td>db0165496031b41f4575154155f0f1e3</td>
<td>CVE-2024-34487</td>
<td>2024-05-05 03:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 03:15:07</td>
<td>OFPFlowStats in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via inst.length=0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34487">详情</a></td>
</tr>

<tr>
<td>4364e0e862f93ef28657ee90fb05e3cf</td>
<td>CVE-2024-34486</td>
<td>2024-05-05 03:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 03:15:07</td>
<td>OFPPacketQueue in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via OFPQueueProp.len=0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34486">详情</a></td>
</tr>

<tr>
<td>d43a7635a07e7d333585d0738dc300fe</td>
<td>CVE-2024-34484</td>
<td>2024-05-05 02:15:07 <img src="imgs/new.gif" /></td>
<td>2024-05-05 02:15:07</td>
<td>OFPBucket in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via action.len=0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34484">详情</a></td>
</tr>

<tr>
<td>c36c5f3ab5c1f39bfa19caa675010301</td>
<td>CVE-2024-34483</td>
<td>2024-05-05 02:15:06 <img src="imgs/new.gif" /></td>
<td>2024-05-05 02:15:06</td>
<td>OFPGroupDescStats in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via OFPBucket.len=0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34483">详情</a></td>
</tr>

<tr>
<td>21c9f7c337ff541d7e2fc92a89dfb471</td>
<td>CVE-2024-4492</td>
<td>2024-05-05 01:15:06 <img src="imgs/new.gif" /></td>
<td>2024-05-05 01:15:06</td>
<td>A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4656). This issue affects the function formOfflineSet of the file /goform/setStaOffline. The manipulation of the argument GO/ssidIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263081 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4492">详情</a></td>
</tr>

<tr>
<td>5a052594ee52aa6cdd21db8de39c800a</td>
<td>CVE-2024-34478</td>
<td>2024-05-05 01:15:06 <img src="imgs/new.gif" /></td>
<td>2024-05-05 01:15:06</td>
<td>btcd before 0.24.0 does not correctly implement the consensus rules outlined in BIP 68 and BIP 112, making it susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34478">详情</a></td>
</tr>
Expand Down Expand Up @@ -2092,123 +2092,123 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>5d4011ca3e542aa85f2fcf7b406e1375</td>
<td>CVE-2024-1237</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Elementor Header &amp; Footer Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94368">详情</a></td>
<td>90bcd60e47b9021a55c78b42ed2c444d</td>
<td>CVE-2024-0499</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>SourceCodester House Rental Management System跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94463">详情</a></td>
</tr>

<tr>
<td>5e4887c8a36891f4c9662ff046faff4d</td>
<td>CVE-2024-1234</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Exclusive Addons for Elementor Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94367">详情</a></td>
<td>7c9cd966edcc6435d525afdad76324c2</td>
<td>CVE-2023-51070</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>QStar Archive Solutions访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94462">详情</a></td>
</tr>

<tr>
<td>a90456f5bdf04538f64f485b0d9d45d0</td>
<td>CVE-2024-1203</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Conversios Plugin SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94366">详情</a></td>
<td>d9d19930a6250e0dfd690e3a8bafc8f8</td>
<td>CVE-2023-51068</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>QStar Archive Solutions跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94461">详情</a></td>
</tr>

<tr>
<td>cbe4016c226e1fcd697b0b1a1ef33fd3</td>
<td>CVE-2024-1176</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress HT Easy GA4 – Google Analytics Plugin未经授权数据访问漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94365">详情</a></td>
<td>dbf5e2f75715ffd2b107553311f4061d</td>
<td>CVE-2024-0251</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>WordPress Plugin Advanced Woo Search跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94460">详情</a></td>
</tr>

<tr>
<td>5138e8a59588f2fdfb6e58cff33882b0</td>
<td>CVE-2024-1158</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Post Form Plugin未经授权数据访问漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94364">详情</a></td>
<td>6a49c7588feadb20464eb848cf0e895a</td>
<td>CVE-2023-52289</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Flaskcode路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94459">详情</a></td>
</tr>

<tr>
<td>152a7bb91f87e8da910d97151ed7ac6c</td>
<td>CVE-2024-1293</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94363">详情</a></td>
<td>6173dca00b18f45efa99ed05fdbb95e6</td>
<td>CVE-2024-0502</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>SourceCodester House Rental Management System SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94458">详情</a></td>
</tr>

<tr>
<td>17def008fc2e8dd8b4415244a2cfb72c</td>
<td>CVE-2024-1291</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94362">详情</a></td>
<td>50189184b6661d6d79056b5568b97209</td>
<td>CVE-2024-21640</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Chromium Embedded Framework缓冲区错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94457">详情</a></td>
</tr>

<tr>
<td>01f6c023aab5ca9de3a428fe2ebbf938</td>
<td>CVE-2024-1311</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin任意文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94361">详情</a></td>
<td>e137c673497069db3898151945cd0039</td>
<td>CVE-2024-0480</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Taokeyun SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94456">详情</a></td>
</tr>

<tr>
<td>614cbb75e91c0d1286da303e42b60e70</td>
<td>CVE-2024-1296</td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94360">详情</a></td>
<td>ea2d9c7432e1da8903c1f853a3d36079</td>
<td>CVE-2024-0482</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Taokeyun SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94455">详情</a></td>
</tr>

<tr>
<td>c3f6e3bb8498997f29d786ca0343fbf9</td>
<td>CVE-2024-0828</td>
<td>2024-04-29 07:20:11</td>
<td>WordPress Play.ht Plugin未经授权访问漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94319">详情</a></td>
<td>286f3596bbde448c479d03c329e42d93</td>
<td>CVE-2024-0481</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Taokeyun SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94454">详情</a></td>
</tr>

<tr>
<td>4d745deab91d6efa260ca1fbe5ff8222</td>
<td>CVE-2024-0700</td>
<td>2024-04-29 07:20:11</td>
<td>WordPress Play.ht Plugin跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94318">详情</a></td>
<td>0226366a6e0ea225ed7d1f35a9d7c377</td>
<td>CVE-2024-22209</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>EDX Open edX Platform访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94453">详情</a></td>
</tr>

<tr>
<td>c396cd275f51f52d411efdb5d6973591</td>
<td>CVE-2024-0829</td>
<td>2024-04-29 07:20:11</td>
<td>WordPress Comments Extra Fields For Post,Pages and CPT授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94317">详情</a></td>
<td>e41e6a81b63f4dc08dd965c073cb39d0</td>
<td>CVE-2024-0483</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Taokeyun SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94452">详情</a></td>
</tr>

<tr>
<td>eb847a8d81032b0fd875935860aae3b1</td>
<td>CVE-2024-0631</td>
<td>2024-04-29 07:20:11</td>
<td>WordPress Duitku Payment Gateway Plugin未经授权数据修改漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94316">详情</a></td>
<td>31d12bd64f7ba23c1031994fb50c420e</td>
<td>CVE-2024-0484</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Fighting Cock Information System SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94451">详情</a></td>
</tr>

<tr>
<td>175f8e13884b580692e6f781c36e1188</td>
<td>CVE-2024-0700</td>
<td>2024-04-29 07:20:11</td>
<td>WordPress Simple Tweet Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94315">详情</a></td>
<td>b5ab393eadb03a6777e13da8d9317878</td>
<td>CVE-2024-0488</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Fighting Cock Information System SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94450">详情</a></td>
</tr>

<tr>
<td>e92fd641aacf64338e4cd75aca05ede9</td>
<td>CVE-2024-0614</td>
<td>2024-04-29 07:20:11</td>
<td>WordPress Events Manager Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94314">详情</a></td>
<td>fb1453820f896c78166f2b62dd1e4356</td>
<td>CVE-2024-0487</td>
<td>2024-05-06 03:25:26 <img src="imgs/new.gif" /></td>
<td>Fighting Cock Information System SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94449">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit aa8406e

Please sign in to comment.