From bc61c894a0a97f1f42e94379ad6969ad5d9c85e3 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 2 May 2024 03:25:16 +0000 Subject: [PATCH] Updated by Github Bot --- cache/RedQueen.dat | 9 +++++++++ data/cves.db | Bin 47325184 -> 47329280 bytes docs/index.html | 40 ++++++++++++++++++++-------------------- 3 files changed, 29 insertions(+), 20 deletions(-) diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index e5ddb2c865a..d2427d64dd1 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -152,3 +152,12 @@ faf8dba3c2d05153a64ff34c2f5bc76f b4643f3907b8063dda1bc6cc5035927e b697e0e791e1418a676ac1c88e33c39a 8dc74055adf30e2b367855ced5144c3a +a5e46d81ab76b41d946ad7431be9f343 +d5bcaf0aa6c33e9f9d43754957364a4b +5bb4caaf5afe037fe5c0b685255e1367 +d01eff928dbacf8cd2fb5c843c50ebb6 +9f0e9bc64bef587fe2b2c953ac2f485e +4ac4cea989c488234efc66af02722571 +9b25051b7651245d639781bd6dd90172 +f272a6959536e4921d1eb40f6fa8ee70 +7a568c8d32ba7374207e874e59679aa6 diff --git a/data/cves.db b/data/cves.db index bbe847d897d41e0514da6a042d593cf4b676aca6..ca03d4a38a626b9bc246ed5dac71031da3117a2c 100644 GIT binary patch delta 2981 zcmW;Ob#xZw8^-bNWdk-wD}qRuD8qFS(%m7Yz{NHO7<5W)z(se8#7hbo2r@!yAR#f@ z!T=NzyBo#dm){?sKcD+L&vnjy&YgASRH>{Rr%Ej>8$KZp`om^^jH0DsNS= zDq5AS%2pMts#VRZZq=|JwrX0BSdUt@tZ1vY^_Uf7#aeMzyp>=jT1i&2m13n@b*#Ep zJ*&R;xYfXFXf?7LTTQH{Rx_)))xv6NwX#}UZLGFdJFC6b!RlyrvN~H`tghA*RyV7= z)x+v(^|GF{p0avdeXPC~{q(cataK~G>ThLQ1FV78AnR%C8S7c=Icu;r#2RW1vxZwE ztdZ6zYqT}S8f%TSp0~zZ6Re5WBx|yjWo27atf|&C%hq&jhBecgWzDwcSaYp;)_iM$ zwa{8*Ew+|eORZ(ra%+Y4g0<3m(OPA#w$@l{t)R8eT5oNzHd>pk&DKlS7Hg}u&3f5- z#d_6x&Dw6gZtbvkT5njptQ>2%wa40P?X%vr_FD(6gVrJIu$5~av5s1AS;ws7)(PvR z^|p1&I&Gb?&RTiaIqST2!MbQ&vMyU!taq$;t@o_=tq-iL)`!+d*2mT-)-~(8b;J79 z`pmj%eQw>dzOZgvUs_*TUt8Z;-&)^U-&;ReKUzOoKU=?8zgoXpzgvG;e_DT8e_MB~ zf2@D4yVifR6gp3#2p}KA5RUvPfP#oXBnlx4g;4}WQ4GaV0wr-D?nfy+fYK;~2T>Le zp&ZJi0xF^sDx(Ujq8h5B1|CLDJc3723(=^J#}I>9#33FDNJJ8nk%CmzL0!~CeLRi^ zXoyB=j3#J`W@wHUXo*&6jW%eDc4&_d=!j0}j4tSkC(sSu(E~lv3s2%H^hO`_#l8Of zAr0xsK!0Rn00v?Zp2jnH7SCZYhF~a$VK_!$Bt~I0#$YVQ;dzY51Wd#vOhy*6F$GgG z4aRiLz)Z}-Y|O!2%)@*vz(Op-Vl2T@EW>iFzzbN37qJSfu?A}q#5%0U25iJ8Y{pC2 zg00wwm+=Z-#cSA(*RcaT@dkDw2fMKcd$A91Vm}VxAP(U$a&ZJl@fMEZI8NXs-o`1M z#u=PN9?s!BF5n_A;WDn^9lVS8@IF4kReXq#@G(BYHC)FHe2UL-6QAQ2zQApKiLdZA zzQMQn4&UPk{D`0MGk(FZ_zl0~5B!P0@Hg(@AN-5E_%C#p0<1p*$cHe5BR>kDAR-Wn zLWn|P6hToGLvfTqN!*9~Q3?;BG|J#Xl*L0Rhw`X^il~IjsDi4fhU%z+hfx!c;8D~< zG-~59#2^-Nh(`hvk%VNVAQg2`7xhpdkD~z^q7fRS37VoAnxh3;q7_=B4cej|+M@$H zq7yo!3%cS7bVGOaKu`3-lXwcf(Fc8Tum65XLpn0hADI|{ff$6R@eH2Da~O;v7>Z#S zju9A%Q5cOe7>jXu9^)|q6EO*sk%eqb!Bk9xFɀSFWIb1)b4FdqxB5R0%FORyBn zupBG!0#@Qhtio!n!CC~d4(qW28?gzS@e;ORE4JZfyn5!ht|utM<+r71^##jqCy;g|ib=)8Z0i5@XYnlM-X&5)w0#;!~4TV$(8` zGBQ$QVw2-;@8581;ru4unnlOO#3e+>B*dh49W?QgX?n+2Kv{`Oo>T|k4^6v zothb&6rB*C)IT~cBQrfZtzSZXTt;F_M!)3bZ1P72XJ#GdCq0}qB3Ntpsle5+KF%2) L9N6qk;M)HH6vJri delta 2732 zcmWmGWpfn<07OypAP~bLI0SbH?(Xhx3&Gu8f-Df+g1fuB1t&P6E%icOsF%9X%ZKv^ z?##|??DNFP*ei*V%W?#dNtUc+zU5K1g2v306=VghqR*h*=ovO=s-E6fVFBCOO_ z8Y``p&Ps1(urgYitjt!VmBq?xWwWwdIjo#kE-SZ{$BMG@TKTN}RspM^RmduA6|st1 z#jN6139F=4$|`L|TV<@WRynJ@Rl%xgRkA8uRjjI3HLJQ+!>Vc3vT9p(th!b`tG?C1 zYG^gG8e2`QrdBhnxz)mIX|=LiTWzeiRy(V`)xqj$b+S5JU97HFH> z>SM)NeXV|0e`|m>&>Cb7wuV?ktzp)1YlJn@8fA^P##m#man^Wif;G{aWKFiFSW~TO z)^uxz6>H73W?8eXIhL)t);w#z6=yB57Fvs}#nuvQskO{nZmqCZTC1#hYqhn;T5GMd z)>|8_jn*b>v$e(AYHhQ&TRW_s)-G$ewa40P?X&h<2dsnEA?vVp#5!snvyNLQtdrI$ z>$G*oI%}P?&RZ9(i`FIUvXx+6v94Oztn1bd>!x+fx@{#|cdWbCJ?p;pzrLw|>#6m&^^Wzf^`7;<^?~)F^^x_=dTxDeePVrTeP(@bePMlRePw-ZePg|_ zzO}xyzPEm`ezbnFeztzGURu9ezgfRqe^`H7e_4N9|5*Q8|5>l%6tq}D2p~C9AQ&l; z3LywZ7{U>O)JTK0NQd;ufQ-n5%!ou5WJNY)M-JpfF62fYL?JKoAwLSBAPS){il8Wp zp*TvQBub$)qEQBAQ4Zx%0TodRl~Dy%Q4Q5m12s_#wNVFkQ4jUe01eRyjnM>6(G1Pe z0xi)Bt+6u^MZz7VEGc8?X_Zuo+vh72B{KJFpYGup4`@7yGau2XGLFa2Q8$6vuEJCvXy{ za2jWD7Uyst7jO}ma2W}>f~&ZO>$riNxP{wD#2wtlJ>16wJj5eBMiQRj4ZMlB@Dy+3 z9lVS8@IF4khxiE3@EjlG6MTx#@HxJ~m-q@_;~TudxA+d<;|KhRpYSt&!Aty#-|##B zz@PXFf8!tgi~sN{C{6+9j{uS*1%iLAM&FB3Zf7SqX>$k7>c6=N}?1>BN}B;7UfVL6;KhCP#INF71dB3 zHBb|^P#bkn7xhpd4bTvc&=^h76wS~aEzlCJ&>C&f7VXd;9ncY-&>3CO72VJsJ=dVjRX}0w!V-CSwYwVj8An24XQ2 zvoITTV9dol%tss+U?CP^F_vH{mSH(oU?o-|9;>kiYq1XNu>l*g37fG6Td@t>u>(7? z3%jugd$AAuaR3K#2#0Y5M{x|taRMiC3a4=fXK@baaRC=`373(8E4YelxQ-jRiCegh zMBKq$+{1l5z(YL3{)1$NE|c@erY+3Qo85D}Xccp8+D;d!Z`nZakGS`R53NQjS1 z3XGVWEj)Qlvhe%iVPS + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-04-30 03:15:06 The LeadConnector plugin for WordPress is vulnerable to unauthorized modification & loss of data due to a missing capability check on the lc_public_api_proxy() function in all versions up to, and including, 1.7. This makes it possible for unauthenticated attackers to delete arbitrary posts. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-04-30 02:15:06 It was identified that in certain versions of Octopus Server, that a user created with no permissions could view all users, user roles and permissions. This functionality was removed in versions of Octopus Server after the fixed versions listed. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-04-30 02:15:06 The Google Doc Embedder plugin for WordPress is vulnerable to Server Side Request Forgery via the 'gview' shortcode in versions up to, and including, 2.6.4. This can allow authenticated attackers with contributor-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-04-30 01:15:46 A vulnerability was found in Apryse WebViewer up to 10.8.0. It has been classified as problematic. This affects an unknown part of the component PDF Document Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.9 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-262419. NOTE: The vendor was contacted early about this disclosure and explains that the documentation recommends a strict Content Security Policy and the issue was fixed in release 10.9. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-04-30 00:15:07 Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return uint64(b[2])<<16 | uint64(b[1])<<8 | uint64(b[0])" in reader.go. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-04-30 00:15:07 Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return plmnIdString[0:3], plmnIdString[3:]" in reader.go. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-04-30 00:15:07 O-RAN RIC I-Release e2mgr lacks array size checks in E2nodeConfigUpdateNotificationHandler. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-04-30 00:15:07 O-RAN RIC I-Release e2mgr lacks array size checks in RicServiceUpdateHandler. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-04-30 00:15:07 The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->sctpParams->e2tCounters[IN_SUCC][MSG_COUNTER][ProcedureCode_id_RICsubscription]->Increment(). 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-04-30 00:15:07 The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment(). 详情 @@ -1974,7 +1974,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Elementor Header & Footer Builder Plugin跨站脚本漏洞 详情 @@ -1982,7 +1982,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Exclusive Addons for Elementor Plugin跨站脚本漏洞 详情 @@ -1990,7 +1990,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Conversios Plugin SQL注入漏洞 详情 @@ -1998,7 +1998,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress HT Easy GA4 – Google Analytics Plugin未经授权数据访问漏洞 详情 @@ -2006,7 +2006,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Post Form Plugin未经授权数据访问漏洞 详情 @@ -2014,7 +2014,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Brizy – Page Builder Plugin跨站脚本漏洞 详情 @@ -2022,7 +2022,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Brizy – Page Builder Plugin跨站脚本漏洞 详情 @@ -2030,7 +2030,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Brizy – Page Builder Plugin任意文件上传漏洞 详情 @@ -2038,7 +2038,7 @@

眈眈探求 | + 2024-04-30 03:23:11 WordPress Brizy – Page Builder Plugin跨站脚本漏洞 详情