Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 14, 2024
1 parent 9d4c61c commit c0ee554
Show file tree
Hide file tree
Showing 3 changed files with 20 additions and 19 deletions.
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -121,3 +121,4 @@ cc96f68cf2bfcf578d886579d983567f
4550e052219e884aaa2d000778b46ec9
c6fc0f1e11b594ee91e2af7ff115c3b6
f8aa964dcb4956c9baacad51d77f32bc
62f2b04710edcb61e6205b457d95317d
Binary file modified data/cves.db
Binary file not shown.
38 changes: 19 additions & 19 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-13 23:25:31 -->
<!-- RELEASE TIME : 2024-04-14 03:21:38 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>4fb231048c1f9f7ab953622d4993218e</td>
<td>CVE-2024-3698</td>
<td>2024-04-12 17:17:23 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:23</td>
<td>A vulnerability was found in Campcodes House Rental Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_payment.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260485 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3698">详情</a></td>
</tr>

<tr>
<td>5d30f28307d99f8ef687efadfb62e609</td>
<td>CVE-2024-3697</td>
<td>2024-04-12 17:17:22 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:22</td>
<td>A vulnerability was found in Campcodes House Rental Management System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_tenant.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-260484.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3697">详情</a></td>
</tr>

<tr>
<td>58fdfb30b9e00e406039bb33f9646df0</td>
<td>CVE-2024-22359</td>
<td>2024-04-12 17:17:22 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:22</td>
<td>IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280897.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22359">详情</a></td>
</tr>

<tr>
<td>74c71451c90b0e77cb78b92df6b9b9a9</td>
<td>CVE-2024-22358</td>
<td>2024-04-12 17:17:22 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:22</td>
<td>IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 280896.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22358">详情</a></td>
</tr>

<tr>
<td>38c60f9603b2952abbdf4bf99d653020</td>
<td>CVE-2024-22339</td>
<td>2024-04-12 17:17:21 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:21</td>
<td>IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 is vulnerable to a sensitive information due to insufficient obfuscation of sensitive values from some log files. IBM X-Force ID: 279979.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22339">详情</a></td>
</tr>

<tr>
<td>f055ab7fbcada08b35fbb3cfaa461b47</td>
<td>CVE-2024-22334</td>
<td>2024-04-12 17:17:21 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:21</td>
<td>IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.20, 7.1 through 7.1.2.16, 7.2 through 7.2.3.9, 7.3 through 7.3.2.4 and IBM DevOps Deploy 8.0 through 8.0.0.1 could be vulnerable to incomplete revocation of permissions when deleting a custom security resource type. When deleting a custom security type, associated permissions of objects using that type may not be fully revoked. This could lead to incorrect reporting of permission configuration and unexpected privileges being retained. IBM X-Force ID: 279974.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22334">详情</a></td>
</tr>

<tr>
<td>3315ff09ef4002882586b280ebba5973</td>
<td>CVE-2024-0157</td>
<td>2024-04-12 17:17:21 <img src="imgs/new.gif" /></td>
<td>2024-04-12 17:17:21</td>
<td>Dell Storage Resource Manager, 4.9.0.0 and below, contain(s) a Session Fixation Vulnerability in SRM Windows Host Agent. An adjacent network unauthenticated attacker could potentially exploit this vulnerability, leading to the hijack of a targeted user's application session.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-0157">详情</a></td>
</tr>

<tr>
<td>d6e69687d570799e00c72934be69ee83</td>
<td>CVE-2024-3707</td>
<td>2024-04-12 14:15:09 <img src="imgs/new.gif" /></td>
<td>2024-04-12 14:15:09</td>
<td>Information exposure vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to enumerate all files in the web tree by accessing a php file.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3707">详情</a></td>
</tr>

<tr>
<td>2294de2743ac043fbc4fa1e30c6c20f7</td>
<td>CVE-2024-3706</td>
<td>2024-04-12 14:15:09 <img src="imgs/new.gif" /></td>
<td>2024-04-12 14:15:09</td>
<td>Information exposure vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to view a php backup file (controlaccess.php-LAST) where database credentials are stored.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3706">详情</a></td>
</tr>

<tr>
<td>19243d5e8ea0ce74eb09c5fc33114ec8</td>
<td>CVE-2024-3705</td>
<td>2024-04-12 14:15:08 <img src="imgs/new.gif" /></td>
<td>2024-04-12 14:15:08</td>
<td>Unrestricted file upload vulnerability in OpenGnsys affecting version 1.1.1d (Espeto). This vulnerability allows an attacker to send a POST request to the endpoint '/opengnsys/images/M_Icons.php' modifying the file extension, due to lack of file extension verification, resulting in a webshell injection.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3705">详情</a></td>
</tr>
Expand Down Expand Up @@ -1974,63 +1974,63 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>05e7572713c0467fb334f2f75a9c3b45</td>
<td>CVE-2022-22399</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>IBM Aspera Faspex HTTP标头注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93405">详情</a></td>
</tr>

<tr>
<td>b934e59552c8702826087b924ad60590</td>
<td>CVE-2024-23225</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93404">详情</a></td>
</tr>

<tr>
<td>4e33ea8aef29c13be04d319b35e70215</td>
<td>CVE-2023-26282</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>IBM Watson CP4D Data Stores文件名称或路径外部控制漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93400">详情</a></td>
</tr>

<tr>
<td>3890256ede4452caf3e677882e696ef7</td>
<td>CVE-2024-2055</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>Artica Proxy身份认证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93399">详情</a></td>
</tr>

<tr>
<td>ba87d30e444276f673f3825261277ee1</td>
<td>CVE-2024-23243</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93398">详情</a></td>
</tr>

<tr>
<td>332c242c828a704ed5f98897a9129ea0</td>
<td>CVE-2024-23296</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93397">详情</a></td>
</tr>

<tr>
<td>c252fd3f15b3d15380ba26dc52a8afc6</td>
<td>CVE-2024-23256</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS逻辑漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93396">详情</a></td>
</tr>

<tr>
<td>5abefba26277d8cee0b9c4c7bf847f09</td>
<td>CVE-2024-1356</td>
<td>2024-04-12 03:23:03 <img src="imgs/new.gif" /></td>
<td>2024-04-12 03:23:03</td>
<td>Aruba Networks ArubaOS命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93395">详情</a></td>
</tr>
Expand Down

0 comments on commit c0ee554

Please sign in to comment.