Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 23, 2024
1 parent 8556ace commit c1c0f17
Show file tree
Hide file tree
Showing 3 changed files with 21 additions and 6 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -173,3 +173,18 @@ c1f82cc207c1bacda44d76fed261b269
9d6f4bd25ac3a51101f36fa3e5c90b3f
e71f533d61672a5310dac3e43d22f66e
d138f3eb68dabd241690cb7614530ca4
afd38de51162a913a8393bc9a5a860cd
e6c21f8cd0a916c2e68a4e8a79ac4048
175747cf1b0cee970286e18d9dca3514
cca49cf7672a19c7479e1ac57d174c24
f9b75a21ef05f55d80992d52ffcbab8f
7246381127cc373623901c8739ee1230
476ad84c40d246be743cbbac7a21266f
ac7ff9e7113ecfe0431f3932c943eff8
2e1a207b1a24027f12cff163ae6dd941
59bb175ebae02618d6d13b4f4c517f3c
d6c5c294d48a46d68f8b7b82114744b3
1e96fe6ebfccedc83b42b6379b34e18d
ecb3931117c18f588d59321497d5ab03
3a1461afb1f7210c872c26397f023bdc
683bb70b842a85f8d42f09138e262e48
Binary file modified data/cves.db
Binary file not shown.
12 changes: 6 additions & 6 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-22 23:23:55 -->
<!-- RELEASE TIME : 2024-04-23 03:24:12 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -286,39 +286,39 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>63b2ecda32a2b2f3c9eef5daed4af627</td>
<td>CVE-2015-10132</td>
<td>2024-04-21 20:15:45 <img src="imgs/new.gif" /></td>
<td>2024-04-21 20:15:45</td>
<td>A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin up to 3.8.6.1 on WordPress. This vulnerability affects unknown code of the file spreadplugin.php. The manipulation of the argument Spreadplugin leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 3.8.6.6 is able to address this issue. The name of the patch is a9b9afc641854698e80aa5dd9ababfc8e0e57d69. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-261676.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2015-10132">详情</a></td>
</tr>

<tr>
<td>d3a9c1e1e66da685f6ee39ce0895fc87</td>
<td>CVE-2024-29733</td>
<td>2024-04-21 18:15:45 <img src="imgs/new.gif" /></td>
<td>2024-04-21 18:15:45</td>
<td>Improper Certificate Validation vulnerability in Apache Airflow FTP Provider. The FTP hook lacks complete certificate validation in FTP_TLS connections, which can potentially be leveraged. Implementing proper certificate validation by passing context=ssl.create_default_context() during FTP_TLS instantiation is used as mitigation to validate the certificates properly. This issue affects Apache Airflow FTP Provider: before 3.7.0. Users are recommended to upgrade to version 3.7.0, which fixes the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-29733">详情</a></td>
</tr>

<tr>
<td>4a7d9d99b370064af68fe259cf425b20</td>
<td>CVE-2024-29217</td>
<td>2024-04-21 16:15:47 <img src="imgs/new.gif" /></td>
<td>2024-04-21 16:15:47</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: before 1.3.0. XSS attack when user changes personal website. A logged-in user, when modifying their personal website, can input malicious code in the website to create such an attack. Users are recommended to upgrade to version [1.3.0], which fixes the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-29217">详情</a></td>
</tr>

<tr>
<td>165f0c684de86af2eda83cde2eb21612</td>
<td>CVE-2024-4022</td>
<td>2024-04-21 11:15:33 <img src="imgs/new.gif" /></td>
<td>2024-04-21 11:15:33</td>
<td>A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /version.js of the component Version Data Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-261674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4022">详情</a></td>
</tr>

<tr>
<td>22310242af8a93113a73f8f4b95ba8ca</td>
<td>CVE-2024-4021</td>
<td>2024-04-21 10:15:06 <img src="imgs/new.gif" /></td>
<td>2024-04-21 10:15:06</td>
<td>A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4021">详情</a></td>
</tr>
Expand Down

0 comments on commit c1c0f17

Please sign in to comment.