Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed May 2, 2024
1 parent 736a53e commit bc61c89
Show file tree
Hide file tree
Showing 3 changed files with 29 additions and 20 deletions.
9 changes: 9 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -152,3 +152,12 @@ faf8dba3c2d05153a64ff34c2f5bc76f
b4643f3907b8063dda1bc6cc5035927e
b697e0e791e1418a676ac1c88e33c39a
8dc74055adf30e2b367855ced5144c3a
a5e46d81ab76b41d946ad7431be9f343
d5bcaf0aa6c33e9f9d43754957364a4b
5bb4caaf5afe037fe5c0b685255e1367
d01eff928dbacf8cd2fb5c843c50ebb6
9f0e9bc64bef587fe2b2c953ac2f485e
4ac4cea989c488234efc66af02722571
9b25051b7651245d639781bd6dd90172
f272a6959536e4921d1eb40f6fa8ee70
7a568c8d32ba7374207e874e59679aa6
Binary file modified data/cves.db
Binary file not shown.
40 changes: 20 additions & 20 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-05-01 23:24:08 -->
<!-- RELEASE TIME : 2024-05-02 03:25:14 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>a10e2005a12767c8c3c0446d67e0b14f</td>
<td>CVE-2024-1371</td>
<td>2024-04-30 03:15:06 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:15:06</td>
<td>The LeadConnector plugin for WordPress is vulnerable to unauthorized modification & loss of data due to a missing capability check on the lc_public_api_proxy() function in all versions up to, and including, 1.7. This makes it possible for unauthenticated attackers to delete arbitrary posts.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1371">详情</a></td>
</tr>

<tr>
<td>16aeb31568fc5a65740e8d3d7f527edf</td>
<td>CVE-2024-4226</td>
<td>2024-04-30 02:15:06 <img src="imgs/new.gif" /></td>
<td>2024-04-30 02:15:06</td>
<td>It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4226">详情</a></td>
</tr>

<tr>
<td>120609d25cef1b0ecb090cb89b2f885e</td>
<td>CVE-2024-0216</td>
<td>2024-04-30 02:15:06 <img src="imgs/new.gif" /></td>
<td>2024-04-30 02:15:06</td>
<td>The Google Doc Embedder plugin for WordPress is vulnerable to Server Side Request Forgery via the 'gview' shortcode in versions up to, and including, 2.6.4. This can allow authenticated attackers with contributor-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-0216">详情</a></td>
</tr>

<tr>
<td>5ee37ce759172af1063c14e5151d1eb8</td>
<td>CVE-2024-4327</td>
<td>2024-04-30 01:15:46 <img src="imgs/new.gif" /></td>
<td>2024-04-30 01:15:46</td>
<td>A vulnerability was found in Apryse WebViewer up to 10.8.0. It has been classified as problematic. This affects an unknown part of the component PDF Document Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.9 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-262419. NOTE: The vendor was contacted early about this disclosure and explains that the documentation recommends a strict Content Security Policy and the issue was fixed in release 10.9.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4327">详情</a></td>
</tr>

<tr>
<td>e6b3a4872b84544b2c1d81589eeac7fa</td>
<td>CVE-2024-34050</td>
<td>2024-04-30 00:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-30 00:15:07</td>
<td>Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return uint64(b[2])<<16 | uint64(b[1])<<8 | uint64(b[0])" in reader.go.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34050">详情</a></td>
</tr>

<tr>
<td>e97fe5877d445b61fbb7e13f35ee6829</td>
<td>CVE-2024-34049</td>
<td>2024-04-30 00:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-30 00:15:07</td>
<td>Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return plmnIdString[0:3], plmnIdString[3:]" in reader.go.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34049">详情</a></td>
</tr>

<tr>
<td>6f35aef1799fefcea297e47c8598db9d</td>
<td>CVE-2024-34048</td>
<td>2024-04-30 00:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-30 00:15:07</td>
<td>O-RAN RIC I-Release e2mgr lacks array size checks in E2nodeConfigUpdateNotificationHandler.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34048">详情</a></td>
</tr>

<tr>
<td>5a5c9867adcf69240452d650a5433be3</td>
<td>CVE-2024-34047</td>
<td>2024-04-30 00:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-30 00:15:07</td>
<td>O-RAN RIC I-Release e2mgr lacks array size checks in RicServiceUpdateHandler.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34047">详情</a></td>
</tr>

<tr>
<td>26e166921e93ac7571a1466da9dc86a4</td>
<td>CVE-2024-34046</td>
<td>2024-04-30 00:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-30 00:15:07</td>
<td>The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment().</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34046">详情</a></td>
</tr>

<tr>
<td>9ab635c06cc8e2248035cc963bb0d061</td>
<td>CVE-2024-34045</td>
<td>2024-04-30 00:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-30 00:15:07</td>
<td>The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment().</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-34045">详情</a></td>
</tr>
Expand Down Expand Up @@ -1974,71 +1974,71 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>5d4011ca3e542aa85f2fcf7b406e1375</td>
<td>CVE-2024-1237</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Elementor Header &amp; Footer Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94368">详情</a></td>
</tr>

<tr>
<td>5e4887c8a36891f4c9662ff046faff4d</td>
<td>CVE-2024-1234</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Exclusive Addons for Elementor Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94367">详情</a></td>
</tr>

<tr>
<td>a90456f5bdf04538f64f485b0d9d45d0</td>
<td>CVE-2024-1203</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Conversios Plugin SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94366">详情</a></td>
</tr>

<tr>
<td>cbe4016c226e1fcd697b0b1a1ef33fd3</td>
<td>CVE-2024-1176</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress HT Easy GA4 – Google Analytics Plugin未经授权数据访问漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94365">详情</a></td>
</tr>

<tr>
<td>5138e8a59588f2fdfb6e58cff33882b0</td>
<td>CVE-2024-1158</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Post Form Plugin未经授权数据访问漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94364">详情</a></td>
</tr>

<tr>
<td>152a7bb91f87e8da910d97151ed7ac6c</td>
<td>CVE-2024-1293</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94363">详情</a></td>
</tr>

<tr>
<td>17def008fc2e8dd8b4415244a2cfb72c</td>
<td>CVE-2024-1291</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94362">详情</a></td>
</tr>

<tr>
<td>01f6c023aab5ca9de3a428fe2ebbf938</td>
<td>CVE-2024-1311</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin任意文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94361">详情</a></td>
</tr>

<tr>
<td>614cbb75e91c0d1286da303e42b60e70</td>
<td>CVE-2024-1296</td>
<td>2024-04-30 03:23:11 <img src="imgs/new.gif" /></td>
<td>2024-04-30 03:23:11</td>
<td>WordPress Brizy – Page Builder Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94360">详情</a></td>
</tr>
Expand Down

0 comments on commit bc61c89

Please sign in to comment.