diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 01e4f8ba45a..773b06fd9a8 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -183,3 +183,18 @@ ba973dbffa609f5155007e8944eb5185 9dd1bbcf27a0fe513b528c267417136a 803b03ed0a57f6a2ae5b14b1e13edc13 7f5f025dfb1cef5c6ac4e19db783dd54 +7aeafc0758c3593ec6f58e8fc4887499 +97298db86b6af216d7a237f675d7abec +c16a68ecae6acc5cfecb56244c15f36d +59127b44eba6578f6ab7660f95e3b5b9 +9edb908be454e918dec8659faddb8dc1 +fc3b8f30b5bc64fee45b47a4ed0156f6 +c5ae774397caa2ea5dd49faed44dfe12 +5cdbc6c7e389a754471c4177de7250fa +3177adc027853fda4d87379416217047 +6e401fc8041ebbcb508e66f561426d4f +c41e75b363a0d63008aa1111a275463f +e5aeb22cfaae8005adfe28dc40a93215 +3fd96f0c1be7d79a929bb173a63ffc0e +82ddf24294810834c0a6812d598c2c17 +bae0474506c706f03c84a7d8291d143f diff --git a/data/cves.db b/data/cves.db index f0435d6f670..acc0d2304d5 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index 06fd71535c1..11f0a712f20 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-10-09 15:15:17 A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-10-09 15:15:17 A vulnerability was found in 3Scale. There is no auth mechanism to see a PDF invoice of a Developer user if the URL is known. Anyone can see the invoice if the URL is known or guessed. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-10-09 15:15:17 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible using object injection via insecure expression evaluation. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-10-09 15:15:17 In Progress Telerik Report Server versions prior to 2024 Q3 (10.2.24.924), a remote code execution attack is possible through object injection via an insecure type resolution vulnerability. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-10-09 15:15:16 In Progress Telerik Reporting versions prior to 2024 Q3 (18.2.24.924), a code execution attack is possible through object injection via an insecure type resolution vulnerability. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-10-09 15:15:16 In Progress Telerik Reporting versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-10-09 15:15:16 In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), an HTTP DoS attack is possible on anonymous endpoints without rate limiting. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-10-09 15:15:16 In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a password brute forcing attack is possible through weak password requirements. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-10-09 15:15:15 In Progress® Telerik® Report Server versions prior to 2024 Q3 (10.2.24.806), a credential stuffing attack is possible through improper restriction of excessive login attempts. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-10-09 15:15:15 In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped Not doing so will make us send a host command to the transport while the firmware is not alive, which will trigger a WARNING. bad state = 0 WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] Call Trace: iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm] iwl_mvm_config_scan+0x198/0x260 [iwlmvm] iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm] iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm] process_one_work+0x29e/0x640 worker_thread+0x2df/0x690 ? rescuer_thread+0x540/0x540 kthread+0x192/0x1e0 ? set_kthread_struct+0x90/0x90 ret_from_fork+0x22/0x30 详情 @@ -2132,91 +2132,91 @@

眈眈探求 | - Positron Broadcast Signal Processor TRA7005身份认证绕过漏洞 - 详情 + 7aeafc0758c3593ec6f58e8fc4887499 + CVE-2024-34757 + 2024-10-10 03:26:06 + WordPress plugin Borderless跨站脚本漏洞 + 详情 - 8059274cb32cd301644e18dc332f5188 - CVE-2024-41672 - 2024-10-09 09:24:06 - DuckDB信息泄露漏洞 - 详情 + 97298db86b6af216d7a237f675d7abec + CVE-2022-44581 + 2024-10-10 03:26:06 + WordPress plugin Defender Security敏感信息存储漏洞 + 详情 - b10fe702e5e378c1a321a963d1a64214 - CVE-2024-40872 - 2024-10-09 09:24:06 - Absolute Secure Access权限提升漏洞 - 详情 + c16a68ecae6acc5cfecb56244c15f36d + CVE-2024-3551 + 2024-10-10 03:26:06 + WordPress Plugin Penci Soledad Data Migrator本地文件包含漏洞 + 详情 - 73313f4f9a3d2a2ec169c961c4c0276e - CVE-2024-41666 - 2024-10-09 09:24:06 - Argo CD权限管理错误漏洞 - 详情 + 59127b44eba6578f6ab7660f95e3b5b9 + CVE-2024-3134 + 2024-10-10 03:26:06 + WordPress plugin Master Addons存储型跨站脚本漏洞 + 详情 - c8fc532c66d8b2f4edd1708605b73088 - CVE-2024-37084 - 2024-10-09 09:24:06 - VMware Spring Cloud Data Flow代码注入漏洞 - 详情 + 9edb908be454e918dec8659faddb8dc1 + CVE-2024-4204 + 2024-10-10 03:26:06 + WordPress plugin Bulk Posts Editing For WordPress存储型跨站脚本漏洞 + 详情 - d6a6f261142d596aa86efd3c505b893a - CVE-2024-39671 - 2024-10-09 09:24:06 - Huawei EMUI和HarmonyOS访问控制错误漏洞 - 详情 + fc3b8f30b5bc64fee45b47a4ed0156f6 + CVE-2024-3609 + 2024-10-10 03:26:06 + WordPress plugin ReviewX未经授权的数据删除漏洞 + 详情 - 4e9fb9a8940a70dcd1ed5f38411ca880 - CVE-2024-39672 - 2024-10-09 09:24:06 - Huawei EMUI和HarmonyOS内存请求逻辑漏洞 - 详情 + c5ae774397caa2ea5dd49faed44dfe12 + CVE-2023-23700 + 2024-10-10 03:26:06 + WordPress plugin OceanWP路径遍历漏洞 + 详情 - 1d65dd42b76c4ece297200c67e563570 - CVE-2024-41705 - 2024-10-09 09:24:06 - Archer Platform跨站脚本漏洞 - 详情 + 5cdbc6c7e389a754471c4177de7250fa + CVE-2023-23645 + 2024-10-10 03:26:06 + WordPress plugin MainWP Code Snippets Extension代码注入漏洞 + 详情 - 5638d6b29770d302c6a1ecadc4fcaba8 - CVE-2024-6589 - 2024-10-09 09:24:06 - WordPress LearnPress – WordPress LMS Plugin本地文件包含漏洞 - 详情 + 3177adc027853fda4d87379416217047 + CVE-2022-45374 + 2024-10-10 03:26:06 + WordPress plugin YARPP路径遍历漏洞 + 详情 - 49d87a61bfefc95cb5e792f590d434ed - CVE-2024-39670 - 2024-10-09 09:24:06 - Huawei EMUI和HarmonyOS权限许可和访问控制漏洞 - 详情 + 6e401fc8041ebbcb508e66f561426d4f + CVE-2023-48727 + 2024-10-10 03:26:06 + Intel oneVPL software空指针取消引用漏洞 + 详情 - e059a1c9c1b987b516a4a71db5310c41 - CVE-2024-36537 - 2024-10-09 09:24:06 - cert-manager不安全权限漏洞 - 详情 + c41e75b363a0d63008aa1111a275463f + CVE-2022-45368 + 2024-10-10 03:26:06 + WordPress plugin 1003 Mortgage Application路径遍历漏洞 + 详情