diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 5dba2f23f64..f289f7cc8ac 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -129,3 +129,18 @@ acb4443750c13606208de3579f79756a eafc6f1559ea6dd5a923ac84b7d76d45 30e6bf9ab3014fcafe8d5e938765b9b5 8ba83b01f81b3ed70e39ebaf901a92a4 +28cc3dae3c03376da17c9bb7060c1282 +e28d48b8f9df615887b581b1fa751ea7 +13e1a06bc9c06674606025643d5af02f +43cb17205625ab7f87a3eb6fd8cc3df5 +987256edf55b674bcb923997bc188156 +473a470afbd91faa255482dbbec2455e +e2db3089d55484cccd38f934c4dd3000 +b1645281b8267c111393e037299ebfd6 +aefc3173c07994d9cf48490477569369 +6a84db31e3ff61f90e61e7252f37c8c0 +880c1d46570b63c14a2004d9c9fd3f83 +a9be3c1b2c737e77d87e964eeb17da12 +ac7e56012c3e808b148b09f588138c87 +e00d9454956d93d948646c10c686d769 +169534c7f9e5070265b57d9122f7a1bc diff --git a/data/cves.db b/data/cves.db index 6696589359d..80f3aeec494 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index 3ef51b8f93a..0a028f813ae 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-03-30 14:15:07 A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/search.php of the component Search Request Page. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258684. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-03-30 13:15:45 A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/add-ambulance.php of the component Add Ambulance Page. The manipulation of the argument Ambulance Reg No/Driver Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258683. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-03-30 12:15:07 A vulnerability has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/manage-ambulance.php of the component Manage Ambulance Page. The manipulation of the argument del leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258682 is the identifier assigned to this vulnerability. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-03-30 12:15:07 The Essential Addons for Elementor plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.9.13 via deserialization of untrusted input from the 'error_resetpassword' attribute of the "Login | Register Form" widget (disabled by default). This makes it possible for authenticated attackers, with author-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-03-30 11:15:50 A vulnerability, which was classified as critical, was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. This affects an unknown part of the file /admin/forgot-password.php of the component Forgot Password Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258681 was assigned to this vulnerability. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-03-30 11:15:50 A vulnerability, which was classified as critical, has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this issue is some unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258680. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-03-30 10:15:07 The PowerPack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the *_html_tag* attribute of multiple widgets in all versions up to, and including, 2.7.17 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-03-30 09:15:22 A vulnerability classified as problematic was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected by this vulnerability is an unknown functionality of the file ambulance-tracking.php of the component Ambulance Tracking Page. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258679. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-03-30 09:15:22 A vulnerability classified as critical has been found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258678 is the identifier assigned to this vulnerability. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-03-30 08:15:07 A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has been rated as problematic. This issue affects some unknown processing of the component Hire an Ambulance Page. The manipulation of the argument Patient Name/Relative Name/Relative Phone Number/City/State/Message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258677 was assigned to this vulnerability. 详情 @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 28cc3dae3c03376da17c9bb7060c1282 + CVE-2023-39413 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + e28d48b8f9df615887b581b1fa751ea7 + CVE-2023-39317 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + 13e1a06bc9c06674606025643d5af02f + CVE-2023-38623 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + 43cb17205625ab7f87a3eb6fd8cc3df5 + CVE-2023-38618 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + 987256edf55b674bcb923997bc188156 + CVE-2023-39316 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + 473a470afbd91faa255482dbbec2455e + CVE-2023-39271 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + e2db3089d55484cccd38f934c4dd3000 + CVE-2023-39272 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + b1645281b8267c111393e037299ebfd6 + CVE-2023-39273 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + aefc3173c07994d9cf48490477569369 + CVE-2023-39274 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + 6a84db31e3ff61f90e61e7252f37c8c0 + CVE-2023-39275 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + 880c1d46570b63c14a2004d9c9fd3f83 + CVE-2023-39270 + 2024-04-01 03:21:59 + GTKWave整数溢出漏洞 + 详情 + + + + a9be3c1b2c737e77d87e964eeb17da12 + CVE-2023-39235 + 2024-04-01 03:21:59 + GTKWave越界写入漏洞 + 详情 + + + + ac7e56012c3e808b148b09f588138c87 + CVE-2023-39234 + 2024-04-01 03:21:59 + GTKWave越界写入漏洞 + 详情 + + + + e00d9454956d93d948646c10c686d769 + CVE-2023-38657 + 2024-04-01 03:21:59 + GTKWave越界写入漏洞 + 详情 + + + + 169534c7f9e5070265b57d9122f7a1bc + CVE-2023-39444 + 2024-04-01 03:21:59 + GTKWave越界写入漏洞 + 详情 + + fe11879e182d53cc96cf48b4f1414114 CVE-2023-44379 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - df29a702c229b71a0247387080f8d9d5 - CVE-2022-45179 - 2024-03-29 07:19:38 - LIVEBOX Collaboration vDesk跨站脚本漏洞 - 详情 - - - - 06ba8c8a2d90fb5e1e6c8b65ba751f9a - CVE-2024-1474 - 2024-03-29 07:19:38 - Progress Software WS_FTP Server跨站脚本漏洞 - 详情 - - - - 02240ea3a8bb9acaa0ae596ac4b6a841 - CVE-2024-22220 - 2024-03-29 07:19:38 - Terminalfour存储型跨站脚本漏洞 - 详情 - - - - 63701fabc4b2e768199358459fee2578 - CVE-2024-26482 - 2024-03-29 07:19:38 - Kirby CMS HTML注入漏洞 - 详情 - - - - aa5031c6baed77f769d67cdcd492251b - CVE-2024-23349 - 2024-03-29 07:19:38 - Apache Answer跨站脚本漏洞 - 详情 - - - - 3634d8b6a6fbe76e94aa4fe1d5e06f63 - CVE-2024-1708 - 2024-03-29 07:19:38 - ConnectWise ScreenConnect路径遍历漏洞 - 详情 - - - - c69ad853c0efd0bf180ec9806b4d901c - CVE-2024-26578 - 2024-03-29 07:19:38 - Apache Answer竞争条件漏洞 - 详情 - - - - a18c0474f0ec5a90fe2e1308456fb3be - CVE-2024-26484 - 2024-03-29 07:19:38 - Kirby CMS跨站脚本漏洞 - 详情 - - - - 4c019c4da68b58811384d23727a4b7c3 - CVE-2024-26491 - 2024-03-29 07:19:38 - Flusity-CMS跨站脚本漏洞 - 详情 - - - - 5b7d6e14a25b11f39d523311b5ab4c55 - CVE-2023-38694 - 2024-03-29 07:19:38 - Umbraco跨站脚本漏洞 - 详情 - - - - f7cb512cc7c45702492457e64fd4aa01 - CVE-2023-28465 - 2024-03-29 07:19:38 - Health Level 7 FHIR Core Libraries路径遍历漏洞 - 详情 - - - - aeb9f39f231e160ea0bc7b53f74e6127 - CVE-2023-6710 - 2024-03-29 07:19:38 - Apache Server跨站脚本漏洞 - 详情 - - - - 1448e259fdbac9eb6bc560d88fcf9941 - CVE-2023-49279 - 2024-03-29 07:19:38 - Umbraco跨站脚本漏洞 - 详情 - - - - 11e7fb1d906e060a362dc33693af8e3f - CVE-2023-49922 - 2024-03-29 07:19:38 - Elastic Agent信息泄露漏洞 - 详情 - - - - 2b4ef4d7c41c4ad1b09604f5451bb4d2 - CVE-2023-41337 - 2024-03-29 07:19:38 - h2o加密签名验证错误漏洞 - 详情 - -