Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 1, 2024
1 parent 18ba56f commit be69325
Show file tree
Hide file tree
Showing 3 changed files with 146 additions and 131 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -129,3 +129,18 @@ acb4443750c13606208de3579f79756a
eafc6f1559ea6dd5a923ac84b7d76d45
30e6bf9ab3014fcafe8d5e938765b9b5
8ba83b01f81b3ed70e39ebaf901a92a4
28cc3dae3c03376da17c9bb7060c1282
e28d48b8f9df615887b581b1fa751ea7
13e1a06bc9c06674606025643d5af02f
43cb17205625ab7f87a3eb6fd8cc3df5
987256edf55b674bcb923997bc188156
473a470afbd91faa255482dbbec2455e
e2db3089d55484cccd38f934c4dd3000
b1645281b8267c111393e037299ebfd6
aefc3173c07994d9cf48490477569369
6a84db31e3ff61f90e61e7252f37c8c0
880c1d46570b63c14a2004d9c9fd3f83
a9be3c1b2c737e77d87e964eeb17da12
ac7e56012c3e808b148b09f588138c87
e00d9454956d93d948646c10c686d769
169534c7f9e5070265b57d9122f7a1bc
Binary file modified data/cves.db
Binary file not shown.
262 changes: 131 additions & 131 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-03-31 21:19:52 -->
<!-- RELEASE TIME : 2024-04-01 03:24:08 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>7f1f0b4edbcebebd4b64393bfd69648e</td>
<td>CVE-2024-3091</td>
<td>2024-03-30 14:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-30 14:15:07</td>
<td>A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/search.php of the component Search Request Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258684.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3091">详情</a></td>
</tr>

<tr>
<td>2c3e3532ce1a03de76da71078d4852c5</td>
<td>CVE-2024-3090</td>
<td>2024-03-30 13:15:45 <img src="imgs/new.gif" /></td>
<td>2024-03-30 13:15:45</td>
<td>A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/add-ambulance.php of the component Add Ambulance Page. The manipulation of the argument Ambulance Reg No/Driver Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258683.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3090">详情</a></td>
</tr>

<tr>
<td>ea9f8233c666a7ec16a2b18719b47ce6</td>
<td>CVE-2024-3089</td>
<td>2024-03-30 12:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-30 12:15:07</td>
<td>A vulnerability has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/manage-ambulance.php of the component Manage Ambulance Page. The manipulation of the argument del leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258682 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3089">详情</a></td>
</tr>

<tr>
<td>b7c55675e473a905ba15bf84a535d23a</td>
<td>CVE-2024-3018</td>
<td>2024-03-30 12:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-30 12:15:07</td>
<td>The Essential Addons for Elementor plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.9.13 via deserialization of untrusted input from the 'error_resetpassword' attribute of the "Login | Register Form" widget (disabled by default). This makes it possible for authenticated attackers, with author-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3018">详情</a></td>
</tr>

<tr>
<td>0ba925883081380c2d14a6562af0ec56</td>
<td>CVE-2024-3088</td>
<td>2024-03-30 11:15:50 <img src="imgs/new.gif" /></td>
<td>2024-03-30 11:15:50</td>
<td>A vulnerability, which was classified as critical, was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. This affects an unknown part of the file /admin/forgot-password.php of the component Forgot Password Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258681 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3088">详情</a></td>
</tr>

<tr>
<td>00e6f1c3ef7f3c16850b2a6da35b9727</td>
<td>CVE-2024-3087</td>
<td>2024-03-30 11:15:50 <img src="imgs/new.gif" /></td>
<td>2024-03-30 11:15:50</td>
<td>A vulnerability, which was classified as critical, has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this issue is some unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258680.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3087">详情</a></td>
</tr>

<tr>
<td>1d93635b300bedb2d2fb89a676246bf2</td>
<td>CVE-2024-2491</td>
<td>2024-03-30 10:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-30 10:15:07</td>
<td>The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the *_html_tag* attribute of multiple widgets in all versions up to, and including, 2.7.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2491">详情</a></td>
</tr>

<tr>
<td>f968527478b6017203e184ec4200de4d</td>
<td>CVE-2024-3086</td>
<td>2024-03-30 09:15:22 <img src="imgs/new.gif" /></td>
<td>2024-03-30 09:15:22</td>
<td>A vulnerability classified as problematic was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this vulnerability is an unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258679.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3086">详情</a></td>
</tr>

<tr>
<td>c239db33de976c8c4f6e9b5c44bd91b3</td>
<td>CVE-2024-3085</td>
<td>2024-03-30 09:15:22 <img src="imgs/new.gif" /></td>
<td>2024-03-30 09:15:22</td>
<td>A vulnerability classified as critical has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258678 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3085">详情</a></td>
</tr>

<tr>
<td>f57a898b45cfc90b1252c7672c88ca28</td>
<td>CVE-2024-3084</td>
<td>2024-03-30 08:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-30 08:15:07</td>
<td>A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been rated as problematic. This issue affects some unknown processing of the component Hire an Ambulance Page. The manipulation of the argument Patient Name/Relative Name/Relative Phone Number/City/State/Message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258677 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3084">详情</a></td>
</tr>
Expand Down Expand Up @@ -1971,6 +1971,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>28cc3dae3c03376da17c9bb7060c1282</td>
<td>CVE-2023-39413</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92763">详情</a></td>
</tr>

<tr>
<td>e28d48b8f9df615887b581b1fa751ea7</td>
<td>CVE-2023-39317</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92762">详情</a></td>
</tr>

<tr>
<td>13e1a06bc9c06674606025643d5af02f</td>
<td>CVE-2023-38623</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92761">详情</a></td>
</tr>

<tr>
<td>43cb17205625ab7f87a3eb6fd8cc3df5</td>
<td>CVE-2023-38618</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92760">详情</a></td>
</tr>

<tr>
<td>987256edf55b674bcb923997bc188156</td>
<td>CVE-2023-39316</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92759">详情</a></td>
</tr>

<tr>
<td>473a470afbd91faa255482dbbec2455e</td>
<td>CVE-2023-39271</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92758">详情</a></td>
</tr>

<tr>
<td>e2db3089d55484cccd38f934c4dd3000</td>
<td>CVE-2023-39272</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92757">详情</a></td>
</tr>

<tr>
<td>b1645281b8267c111393e037299ebfd6</td>
<td>CVE-2023-39273</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92756">详情</a></td>
</tr>

<tr>
<td>aefc3173c07994d9cf48490477569369</td>
<td>CVE-2023-39274</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92755">详情</a></td>
</tr>

<tr>
<td>6a84db31e3ff61f90e61e7252f37c8c0</td>
<td>CVE-2023-39275</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92754">详情</a></td>
</tr>

<tr>
<td>880c1d46570b63c14a2004d9c9fd3f83</td>
<td>CVE-2023-39270</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92753">详情</a></td>
</tr>

<tr>
<td>a9be3c1b2c737e77d87e964eeb17da12</td>
<td>CVE-2023-39235</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92752">详情</a></td>
</tr>

<tr>
<td>ac7e56012c3e808b148b09f588138c87</td>
<td>CVE-2023-39234</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92751">详情</a></td>
</tr>

<tr>
<td>e00d9454956d93d948646c10c686d769</td>
<td>CVE-2023-38657</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92750">详情</a></td>
</tr>

<tr>
<td>169534c7f9e5070265b57d9122f7a1bc</td>
<td>CVE-2023-39444</td>
<td>2024-04-01 03:21:59 <img src="imgs/new.gif" /></td>
<td>GTKWave越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92749">详情</a></td>
</tr>

<tr>
<td>fe11879e182d53cc96cf48b4f1414114</td>
<td>CVE-2023-44379</td>
Expand Down Expand Up @@ -2091,126 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92700">详情</a></td>
</tr>

<tr>
<td>df29a702c229b71a0247387080f8d9d5</td>
<td>CVE-2022-45179</td>
<td>2024-03-29 07:19:38</td>
<td>LIVEBOX Collaboration vDesk跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92685">详情</a></td>
</tr>

<tr>
<td>06ba8c8a2d90fb5e1e6c8b65ba751f9a</td>
<td>CVE-2024-1474</td>
<td>2024-03-29 07:19:38</td>
<td>Progress Software WS_FTP Server跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92684">详情</a></td>
</tr>

<tr>
<td>02240ea3a8bb9acaa0ae596ac4b6a841</td>
<td>CVE-2024-22220</td>
<td>2024-03-29 07:19:38</td>
<td>Terminalfour存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92683">详情</a></td>
</tr>

<tr>
<td>63701fabc4b2e768199358459fee2578</td>
<td>CVE-2024-26482</td>
<td>2024-03-29 07:19:38</td>
<td>Kirby CMS HTML注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92682">详情</a></td>
</tr>

<tr>
<td>aa5031c6baed77f769d67cdcd492251b</td>
<td>CVE-2024-23349</td>
<td>2024-03-29 07:19:38</td>
<td>Apache Answer跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92681">详情</a></td>
</tr>

<tr>
<td>3634d8b6a6fbe76e94aa4fe1d5e06f63</td>
<td>CVE-2024-1708</td>
<td>2024-03-29 07:19:38</td>
<td>ConnectWise ScreenConnect路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92680">详情</a></td>
</tr>

<tr>
<td>c69ad853c0efd0bf180ec9806b4d901c</td>
<td>CVE-2024-26578</td>
<td>2024-03-29 07:19:38</td>
<td>Apache Answer竞争条件漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92679">详情</a></td>
</tr>

<tr>
<td>a18c0474f0ec5a90fe2e1308456fb3be</td>
<td>CVE-2024-26484</td>
<td>2024-03-29 07:19:38</td>
<td>Kirby CMS跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92678">详情</a></td>
</tr>

<tr>
<td>4c019c4da68b58811384d23727a4b7c3</td>
<td>CVE-2024-26491</td>
<td>2024-03-29 07:19:38</td>
<td>Flusity-CMS跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92677">详情</a></td>
</tr>

<tr>
<td>5b7d6e14a25b11f39d523311b5ab4c55</td>
<td>CVE-2023-38694</td>
<td>2024-03-29 07:19:38</td>
<td>Umbraco跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92676">详情</a></td>
</tr>

<tr>
<td>f7cb512cc7c45702492457e64fd4aa01</td>
<td>CVE-2023-28465</td>
<td>2024-03-29 07:19:38</td>
<td>Health Level 7 FHIR Core Libraries路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92675">详情</a></td>
</tr>

<tr>
<td>aeb9f39f231e160ea0bc7b53f74e6127</td>
<td>CVE-2023-6710</td>
<td>2024-03-29 07:19:38</td>
<td>Apache Server跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92674">详情</a></td>
</tr>

<tr>
<td>1448e259fdbac9eb6bc560d88fcf9941</td>
<td>CVE-2023-49279</td>
<td>2024-03-29 07:19:38</td>
<td>Umbraco跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92673">详情</a></td>
</tr>

<tr>
<td>11e7fb1d906e060a362dc33693af8e3f</td>
<td>CVE-2023-49922</td>
<td>2024-03-29 07:19:38</td>
<td>Elastic Agent信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92672">详情</a></td>
</tr>

<tr>
<td>2b4ef4d7c41c4ad1b09604f5451bb4d2</td>
<td>CVE-2023-41337</td>
<td>2024-03-29 07:19:38</td>
<td>h2o加密签名验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92671">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit be69325

Please sign in to comment.