From b8f813f5826ca45a44866e662749164e43ae4df4 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 5 Dec 2024 03:39:03 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 50368512 -> 50372608 bytes docs/index.html | 262 +++++++++++++++++++++++----------------------- 3 files changed, 146 insertions(+), 131 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index f8dfd85f08f..47456ce853e 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -110,3 +110,18 @@ dbc0913696cafec13a47c2dee27cd8c2 58a8e6a03cc3086fb513c0bd4fe5f289 b3d7ea8a0b0204b196a0a464e66f73de 4d285100b27bd8f04b467bda616fa0ff +7814029b14f351fdde4330d8ccd01c24 +c18f77010460fa75a05e834d6ff8dd3d +945718d7b5462d88a6870eb6d5db0498 +a8a95473373cf1ae794ff5e7086880f0 +fd61514e58689180051990cae22c35d9 +0a23ff6171b29396f0cb71b9538947db +c9fbfe2950091bc2284dc48c34dff8e8 +f0e5e6d1e7d83e00a9fbe69d5c60dfca +d91440307dcccc509b9c7febb08006ad +da683e95470c336767715ac6f5680b2d +f68416098fba9ea10df4a975852eaa3f +c55178da0d071073d36ef2930ae7bff5 +15fd12608509466434284ab873b83488 +7d1b5152dc9b57973d531bf732a29fa5 +bae391c3fcd81f351570cecbee24eb6a diff --git a/data/cves.db b/data/cves.db index e83cfcea9be1fdb618ff7ace5c911d7d9dcb013a..94bc6bcb52240b6b46eff91cdb3b5dc850a53c9e 100644 GIT binary patch delta 4623 zcmZ|RcXSlx_XhB=fslj*h=9`6r5Qm2Q+H-iK}13kB!UnS%bnes#b{t52_PzxMIRLv z0Vz=s7aJB7MMYH9AlSu%6$?dlDWa$-ilFj+CjR4ZIlr9qxhLo3B+q;AduOt>D`vN? z-7vfD{0>dlW@Rb)3&Q;xtxXD~5hMi3hBSsWf#g7%LUJK_kbFopNCBh}(j3wP(h^bx zIRVlN(i+kRaw6m;NLxrdNP9>JNJq%YkW(P1Lc)+vkj{`Ukgkw!kkcT=kkcXEAw3{x zKzc$-AiW^HAqqr=Xb>G@KukykVnJ+(1L*@f6LJ>hY)D^7KgccxfOC7svLzY68LGFPphujNEK~_NSgWL~!0P-N@A;?O|!;nWHk3t@Utb#lac>=N; z@+9Ob$QsDgkY^yzLe@f_gRFx*4|xIdB4j<}CCJN=S0MF}4UktM8zGw@uR&giya9O= z@)qQ6$UBgCA)6uZLEeXa0QnHI1@aN(W5_3vPa&T{K8I|Dd;$3q@)hK3$TrA!$PUO( z$TyH(kZ&R1LDG=jkUfySkbRKvA^RaeKz@WAfcymc8S)F{AmmrbZ;(Tf-ywfM4nzKg z9Dy8#`~~?N@(<+L9BDLH8c~R{sWCO79BN9rlt=m0j0&ibno|pENkw!5wW8M4hEAlD zs4cal_SAto(#doRol0TqM4hP%b){}}8Wq#&)SY_J8PtKQCp=06LEbQYj6h!8C-1()l!uhSLQ!g39PZ8cCz*A{tF&sGP>q zIJ%g|(kiO zT|?K>bu^Q%r&&}>Nt#VJ(2WGTiEgG_Xb#;G@lmGowSe^(PCOcb#xcq zO-pGR-9yXiUP{plx{vOs2k1e1h*r|W^awplkI^c6oSvZ7^dvn+Yv^fuhMuLh^c=0D z=jjD{k=D~o^fJ9d^|XOrrH!Op5vPb#5a)SDDiNh6&M zGATk9+2l|kI+M<#v#BrjqjRV~ol67gJQ_%)G>8V%5E@G7(=ZxN7tjbQqYG&yjiQTa zG>xHh8cXBoVj54E(4}-4T~5LLU5ZkSJn|_{6X*)6peyMrs-%fDi4ruKrcf1CQw>d} zX*8X#rWte%T}#)|OuC+CQ7t8DHr+rs66hwnnQoyubSvFPx6@p@gXYnET0nQwLRv(N zX$jTQU351srDb#vEvI`aMJwn&x}P4P2k9YNNe|N_^e8<>tLSlhf>zU$^c1b3r|B7b zme$g9w2q#q7wAP=PcPBS^a|C}26~k?(k6P1UZ*$cO?r#org!LF+Dz}!`}6^QNL%P5 z`j|eUPw6xIoVL;z^d)^oU(+_)PCIBPeM7tGTl$XDw43(OUfM_BhhCQbp$F&XuFPJZ z6?}ND+g{bTH1*-^Eun(?%jWM79S(&GN2XRU+#l*&zl3#nZmQGHL}+UhB@gM&^TsXT zA7c3-C_e_}Ku~@P%FjXhB`61j@@r6j3(BFO{2r7)f^s-0e+K19P>u%Wub})Llz&3? z{!fG)R<=MSzo_rS!%$TfhC%v86~=E>t<=CTT?e{$wlo8j1pBVQOvNS_tES6 zFD>YtqbinZMAjdv&CY4jrI52}p7T~#i}L21ns+UnS8%XkXtNdh$MXHWmAQZ9_H0_4 zv#zLY`?~CP%7)htg!(6Sq?Nqk?TV9yJX+NCbw`cq@t9|;!Rbs(iTSap?`wu1jkp;{ zb2Lp$y|8p=C|npGH8olttE!k>Q<0dIT66O6p>}!y_nfidoVu1QM!GjgQ9L~ug{MXt zqIoeVYFdt^d#0{Nf-6 zs+R4!il-Hu|W=SFPZcT9t;r0WqYVp*!`#v*YuVk=S2%gA(e zT_0XjT2bj&hX*7kP4Z(kiK@M;>-W{IUM8{ZHvf(L_g<}JN2GfMac&UjsD`2Fisi-l z#k-9YRcwkL+vt0IjEs4JJ}8C?u_X^C77h* zn|{PoeamBaisCx)s2_1WGZx`cW0_Birs$4d*Jw|-)+x2g-=VG0Y#K@|f(r|IX^d zAi_|RZILbxW;KoximU1Icto|-DA&)4#Fbc--#eymJBH;&Gq1+b^ucA}VQ#fwHPo+3 zJ=yP>&?(11Z6g|z)MQJfPYaTU1mp4|s;L^jX-8~FH>7CE_DFXNMmC-)uI&bUrt6j-i>rK^9D|ROZz)W*mAI0T zVwjHOl=(G&Rd`S$;a%ZYR)z;uCZ>9+WYNmdiN|gCzm4h17D#suA_p?kF-%LfJuAvr zu;$q|m)%nMs`N}Rsu)h@Eg2ETaz-`0Cu44EOUI4>&$byxvMbVEf|LYPVyYdtEJaoL t`*GJYUB&eIlJX+l1kckmm)g)c>$)vlTc4Wx=c!LZCuPp=-+vkA{{R`8dB6Yw delta 2930 zcmWmGWw#Yn7)4>HLSWd5*3laoeT5-wcMXj4*^2)|^gtngOAieN>wB3Y5GC{|P}nibuOVa2p! zS>IW)t?#WkR$MEd^@A1PN?;|l5?P6@Bvw)@nU&m1VWqTES*fiwR$42amEOu=WwbI` znXMnKELK)4o0Z+lVdb=PS-Gt|R$eQgmES606|@Rjg{>l1QLC6$+$v#}v`Sf}tuj_w ztDIHd`pK$bRkSKum8~jPRjZm+-Kt^zY}K@CS+%V?R$Z%}Ro`l0HMAO8jjbkDQ>&T9 zKFzHbR!ggu)!J%f{bIGX+F9+b4pv92lhxVkVs*8;S>3H3R!^&!)!XW0^|kt0{jCAk zKx>dS*cxJmSVOI0)^KZtWox80${KBrvBp~CtntDCNurZvl& zZOyUfTEAMqS)tZEE6kd2EwC0^zgvr}#nuvQskO{nZmqCZTC1$p)*5TAwa!{^ZLl_4 zo2<>&7Hg}u&Dw75uy$IztlicgYp=D>+HW1O4qAt-Kde8k!`2b&sCCRbZk@1BTBoeP ztkc#R>#TLoI&WRDE?SqY%hna^s&&n}Zr!kMTDPp*)*b7vb4R)_>L;>#g<9dT)KOK3bow&(;^~tMzS+!cS0m1P}oc5ebnI z1yK*(fcQv&gh+(MNP?tDhU7?rlt_itNQ1OUhxEvRjL3w{ z_z_u<71@v-Igk^%kQ;fB7x|DM1yB%$P#8r}6va>+B~TKjP#R@W7UfVLKcNCDq7o{j z3aX+Ss-p&eMorX0ZPYCfiG(&Lz=4gSIXoc2jgI~}V?a&?_&=H-` z8C}p7-OwF9&=bAT8-36h{m>r+Fc5<<7()<(p%{kY7y)A>MqxC@U@XRAJSJcwCSfwB zU@E3zI%Z%dW??qwU@m^eZwSRagke4wU?G0TA}q!dEX6V`#|o^(Dy+sDti?L4#|CV~ zCTzwQY{fQg#}4eoF6_o0?8QFp#{nF~A^d?qaTrH%6vuEJCvXy{@E14({R}?&AR-;t?L>Z~TKNc#3Cuju&`|S9pzo@gLscE#Bch zKHwuh;WNJAE53yvqX6fR03skFA|W!OAS$9EI$|IuV&OZ)#`lPWxQK@z5FZJU5Q&f& zNstuDkQ^zH5~+|HX^$ zq8N&!1WKY5N}~+Qq8!TOCsaU1R6=D`K~+>kb=1JmsEJyrjXJ1{dZ>>EXoyB=j3#J` zW(e-z94*iitOvN-z#|+HGEX>9n%*C(x4WXEaFwDmSEX40v zgvD5brC5gLSb>#Th1FPtwOEJs*no}Lgw5E3t=NX`*nyqch27YLz1WBSIDmsVgg@{n z4&w-p;uwzO1Ww`<{=#XT!C9Qcd0fCnT*75s!Bt$tb=<&B+`?_#!Cle2wOGnNucE3ne<`QusFO> zwC^D>xM!MqOU-(da==1nkfgLxOs`(Qo<^D&rD!F&$pOE6yp kdmDv*3oO4IEkd}D;i5l|d?MVeIP*I_+xamhLgd*01G}|!9{>OV diff --git a/docs/index.html b/docs/index.html index 379ba74a306..523857a3c4b 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-12-03 11:15:04 The Campaign Monitor Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-12-03 10:15:05 Dell NetWorker Management Console, version(s) 19.11, contain(s) an Improper Verification of Cryptographic Signature vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Code execution. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-12-03 10:15:05 Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators. Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-12-03 10:15:05 The Charity Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.2 via the 'nacharity_elementor_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-12-03 10:15:05 The WP Mailster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mst_subscribe' shortcode in all versions up to, and including, 1.8.17.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-12-03 10:15:05 The AWeber Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-12-03 09:15:05 The BMLT Tabbed Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bmlt_tabbed_map' shortcode in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-12-03 09:15:04 The IdeaPush plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the idea_push_taxonomy_save_routine function in all versions up to, and including, 8.71. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete terms for the "boards" taxonomy. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-12-03 08:15:06 The Scratch & Win – Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'swin-campaign' shortcode in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-12-03 08:15:06 The jAlbum Bridge plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ar’ parameter in all versions up to, and including, 2.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -1987,6 +1987,126 @@

眈眈探求 | TITLE URL + + 7814029b14f351fdde4330d8ccd01c24 + CVE-2024-31835 + 2024-12-05 03:36:55 + FlatPress跨站脚本漏洞 + 详情 + + + + c18f77010460fa75a05e834d6ff8dd3d + CVE-2024-42514 + 2024-12-05 03:36:55 + Mitel MiContact Center Business信息泄露漏洞 + 详情 + + + + 945718d7b5462d88a6870eb6d5db0498 + CVE-2024-46079 + 2024-12-05 03:36:55 + Scriptcase跨站脚本漏洞 + 详情 + + + + a8a95473373cf1ae794ff5e7086880f0 + CVE-2024-45999 + 2024-12-05 03:36:55 + Peter Goodhall Cloudlog SQL注入漏洞 + 详情 + + + + fd61514e58689180051990cae22c35d9 + CVE-2024-9411 + 2024-12-05 03:36:55 + OFSoft OFCMS跨站脚本漏洞 + 详情 + + + + 0a23ff6171b29396f0cb71b9538947db + CVE-2024-9423 + 2024-12-05 03:36:55 + HP LaserJet Printers拒绝服务漏洞 + 详情 + + + + c9fbfe2950091bc2284dc48c34dff8e8 + CVE-2024-20515 + 2024-12-05 03:36:55 + Cisco Identity Services Engine信息泄露漏洞 + 详情 + + + + f0e5e6d1e7d83e00a9fbe69d5c60dfca + CVE-2024-20393 + 2024-12-05 03:36:55 + Cisco Small Business多款产品信息泄露漏洞 + 详情 + + + + d91440307dcccc509b9c7febb08006ad + CVE-2024-7315 + 2024-12-05 03:36:55 + WordPress plugin WPvivid信息泄露漏洞 + 详情 + + + + da683e95470c336767715ac6f5680b2d + CVE-2024-9333 + 2024-12-05 03:36:55 + M-Files Connector访问绕过漏洞 + 详情 + + + + f68416098fba9ea10df4a975852eaa3f + CVE-2024-8254 + 2024-12-05 03:36:55 + WordPress plugin Email Subscribers by Icegram Express代码注入漏洞 + 详情 + + + + c55178da0d071073d36ef2930ae7bff5 + CVE-2024-8800 + 2024-12-05 03:36:55 + WordPress plugin RabbitLoader反射型跨站脚本漏洞 + 详情 + + + + 15fd12608509466434284ab873b83488 + CVE-2024-8967 + 2024-12-05 03:36:55 + WordPress plugin PWA — easy way to Progressive Web App存储型跨站脚本漏洞 + 详情 + + + + 7d1b5152dc9b57973d531bf732a29fa5 + CVE-2024-9172 + 2024-12-05 03:36:55 + WordPress plugin Demo Importer Plus跨站脚本漏洞 + 详情 + + + + bae391c3fcd81f351570cecbee24eb6a + CVE-2024-9222 + 2024-12-05 03:36:55 + WordPress plugin Paid Membership Subscriptions跨站脚本漏洞 + 详情 + + a3be5a2e3da1785f58036036e6e8f402 CVE-2024-10543 @@ -2107,126 +2227,6 @@

眈眈探求 | 详情 - - 129a5f999f19b2c690c08769223302bf - CVE-2024-52020 - 2024-12-03 12:47:01 - NETGEAR R8500命令注入漏洞 - 详情 - - - - d4d3e0a2ebadbb45b8f2aa1f7c1a687a - CVE-2023-29120 - 2024-12-03 12:47:01 - Enel X Waybox操作系统命令注入漏洞 - 详情 - - - - 2e2d734e701b82e0a318a8d93b845311 - CVE-2024-49522 - 2024-12-03 12:47:01 - Adobe Substance 3D Painter越界写入漏洞 - 详情 - - - - f7ba5d97a716f43411f8a004436664cc - CVE-2024-51362 - 2024-12-03 12:47:01 - LSC Smart Connect Indoor IP Camera信息泄露漏洞 - 详情 - - - - 147fe9cb59e6f705f4f916c2b898a49e - CVE-2024-51023 - 2024-12-03 12:47:01 - D-Link DIR_823G命令注入漏洞 - 详情 - - - - 95706a76c7363b44c03a4923f566b359 - CVE-2024-51024 - 2024-12-03 12:47:01 - D-Link DIR_823G命令注入漏洞 - 详情 - - - - cd0d059ea80f2892d504665b7a893483 - CVE-2024-49377 - 2024-12-03 12:47:01 - OctoPrint跨站脚本漏洞 - 详情 - - - - 4b55fce5f5ca9d74dd0eac2978b312e8 - CVE-2024-49773 - 2024-12-03 12:47:01 - SuiteCRM SQL注入漏洞 - 详情 - - - - c5212850893fd7f7f2e3692e152a137f - CVE-2024-50335 - 2024-12-03 12:47:01 - SuiteCRM跨站脚本漏洞 - 详情 - - - - f798b76651f3ba259a71cd2395b9f0d1 - CVE-2024-0134 - 2024-12-03 12:47:01 - NVIDIA Container Toolkit和NVIDIA GPU Operator UNIX符号链接漏洞 - 详情 - - - - 2d2fe58155760ea2c1def184dc0b3b08 - CVE-2023-29118 - 2024-12-03 12:47:01 - Enel X Waybox SQL注入漏洞 - 详情 - - - - 3d27c7c3e6f1fe77e94147142f1c6308 - CVE-2023-29126 - 2024-12-03 12:47:01 - Enel X Waybox PHP类型欺骗漏洞 - 详情 - - - - 55ccb74233bf64196dfdaba80f38bfee - CVE-2024-51015 - 2024-12-03 12:47:01 - NETGEAR R7000P命令注入漏洞 - 详情 - - - - b833f17140d10529bd4a01ef15cae2f1 - CVE-2024-52023 - 2024-12-03 12:47:01 - NETGEAR多款产品堆栈溢出漏洞 - 详情 - - - - 56a21ab913beae9f6145e1aa21a2dc33 - CVE-2024-52029 - 2024-12-03 12:47:01 - NETGEAR R7000P堆栈溢出漏洞 - 详情 - -