diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 07d46729cd7..c16aa839510 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -113,3 +113,18 @@ c15fc945e35579b80b95f28647877c53 dd3dbb4b0dc5711d9f37791bf906db50 1e2aad5e80ce9133a3c2b3ecb132c912 862a89742d6954387d39cbbc0081ea23 +4662a1748bfb85feeeddf8e893063653 +dc195cc9c4c4e360282a5ed50116a092 +f36ebcf6f85b724942b36921a80c93f5 +c8d2b3ed196270e069ecbf90787011d4 +096bc66de86be11d2dccee630f4021e7 +01ca13108a9c120c7e760afa311561b7 +51663aaa468c6e58e13f0f64b5459034 +5788760d184ef14482c35dae3d756e56 +cd6d40bc3ce86af8ffb5ee561580c06b +81058c7f45820b04b6ef6b6d72cfb306 +4f3953e13f56205c65900f7628e162f4 +e1dad3811521f73d6a1c6647028a0987 +6e122ed3c1b85bc4253d7bb1fa25ec8a +3335bb323287482f3b8d0cf7c8964515 +b0b258ce5b2ba52b1010c482bbed5e66 diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 3359d1be340..9cca11d3e88 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -142,3 +142,9 @@ d701099b8259413de8fbd24544e20ae3 e1301cab30338f72830ce1113966111a 21c87cd561d7f8e03e2363e3d8cccb6e 91d2bf707499754a12bf01c96ac98441 +1df461a4ae4e544766920af8d13c4b30 +44c244380788f88d1e6563cdfd59e866 +02d64bb6b0a61d6c93fa8770a6ac3b83 +ea1f94da4ec2e0d47a93326626a96eeb +4d32c1041c95349ba27e671171c3d18a +736494e88bdf0b937801515f5b5f34f4 diff --git a/data/cves.db b/data/cves.db index 4d99d6eb55b..adfe1f14502 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index c90b73c2846..7680429a840 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,54 @@

眈眈探求 | TITLE URL + + 1df461a4ae4e544766920af8d13c4b30 + CVE-2024-9328 + 2024-09-29 23:15:13 + A vulnerability was found in SourceCodester Advocate Office Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /control/edit_client.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + 44c244380788f88d1e6563cdfd59e866 + CVE-2024-9327 + 2024-09-29 11:15:11 + A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forgot.php. The manipulation of the argument useremail leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + 02d64bb6b0a61d6c93fa8770a6ac3b83 + CVE-2024-9326 + 2024-09-29 08:15:02 + A vulnerability classified as critical was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /shopping/admin/index.php of the component Admin Panel. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + ea1f94da4ec2e0d47a93326626a96eeb + CVE-2024-9325 + 2024-09-29 08:15:02 + A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\Program Files (x86)\Intelbras\Incontrol Cliente\incontrol_webcam\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20. + 详情 + + + + 4d32c1041c95349ba27e671171c3d18a + CVE-2024-9324 + 2024-09-29 07:15:02 + A vulnerability was found in Intelbras InControl up to 2.21.57. It has been rated as critical. Affected by this issue is some unknown functionality of the file /v1/operador/ of the component Relatório de Operadores Page. The manipulation of the argument fields leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was informed early on 2024-07-19 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20. + 详情 + + + + 736494e88bdf0b937801515f5b5f34f4 + CVE-2024-9323 + 2024-09-29 07:15:02 + A vulnerability was found in SourceCodester Inventory Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/action/add_staff.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. + 详情 + + 79aaa806fe78dcebac32d2a0db19285a CVE-2024-9322 @@ -475,54 +523,6 @@

眈眈探求 | 详情 - - 70e571ad63d6c69b81eb3b8b2fe61a27 - CVE-2024-47176 - 2024-09-26 22:15:04 - CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. Due to the service binding to `*:631 ( INADDR_ANY )`, multiple bugs in `cups-browsed` can be exploited in sequence to introduce a malicious printer to the system. This chain of exploits ultimately enables an attacker to execute arbitrary commands remotely on the target machine without authentication when a print job is started. This poses a significant security risk over the network. Notably, this vulnerability is particularly concerning as it can be exploited from the public internet, potentially exposing a vast number of systems to remote attacks if their CUPS services are enabled. - 详情 - - - - 87f4f6812239d31979999410d6e78aec - CVE-2024-47175 - 2024-09-26 22:15:04 - CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176. - 详情 - - - - fa873eefdfd0796ea7b9759e14514a87 - CVE-2024-47076 - 2024-09-26 22:15:04 - CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system. - 详情 - - - - 56c41dd919922c7751194ee67d19e30c - CVE-2024-40508 - 2024-09-26 22:15:03 - Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMConference.asmx function. - 详情 - - - - 6991bae713666b6d9107e588820ff514 - CVE-2024-40507 - 2024-09-26 22:15:03 - Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMPersonnel.asmx function. - 详情 - - - - e0565f5ef7a97844e6fde88a32464507 - CVE-2024-40506 - 2024-09-26 22:15:03 - Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMHospitality.asmx function. - 详情 - - @@ -1979,6 +1979,126 @@

眈眈探求 | TITLE URL + + 4662a1748bfb85feeeddf8e893063653 + CVE-2024-22444 + 2024-09-30 09:25:44 + Hewlett Packard Enterprise EdgeConnect SD-WAN Orchestr跨站脚本漏洞 + 详情 + + + + dc195cc9c4c4e360282a5ed50116a092 + CVE-2024-31971 + 2024-09-30 09:25:44 + Adtran NetVanta 3120跨站脚本漏洞 + 详情 + + + + f36ebcf6f85b724942b36921a80c93f5 + CVE-2024-22443 + 2024-09-30 09:25:44 + Hewlett Packard Enterprise EdgeConnect SD-WAN Orchestr服务器端原型污染漏洞 + 详情 + + + + c8d2b3ed196270e069ecbf90787011d4 + CVE-2024-3454 + 2024-09-30 09:25:44 + Connectivity Standards Alliance Matter实施不当漏洞 + 详情 + + + + 096bc66de86be11d2dccee630f4021e7 + CVE-2024-6755 + 2024-09-30 09:25:44 + WordPress Social Auto Poster Plugin未授权数据修改和丢失漏洞 + 详情 + + + + 01ca13108a9c120c7e760afa311561b7 + CVE-2024-3246 + 2024-09-30 09:25:44 + WordPress LiteSpeed Cache Plugin跨站请求伪造漏洞 + 详情 + + + + 51663aaa468c6e58e13f0f64b5459034 + CVE-2024-7027 + 2024-09-30 09:25:44 + WordPress WooCommerce - PDF Vouchers Plugin身份认证绕过漏洞 + 详情 + + + + 5788760d184ef14482c35dae3d756e56 + CVE-2024-6836 + 2024-09-30 09:25:44 + WordPress Funnel Builder Plugin未授权数据修改漏洞 + 详情 + + + + cd6d40bc3ce86af8ffb5ee561580c06b + CVE-2023-32466 + 2024-09-30 09:25:44 + Dell Edge Gateway BIOS 3200和5200越界写入漏洞 + 详情 + + + + 81058c7f45820b04b6ef6b6d72cfb306 + CVE-2024-3896 + 2024-09-30 09:25:44 + WordPress Photo Gallery, Images, Slider in Rbs Image Galler跨站脚本漏洞 + 详情 + + + + 4f3953e13f56205c65900f7628e162f4 + CVE-2024-6327 + 2024-09-30 09:25:44 + Progress Software Telerik Reporting不受信数据反序列化漏洞 + 详情 + + + + e1dad3811521f73d6a1c6647028a0987 + CVE-2024-39345 + 2024-09-30 09:25:44 + Adtran NetVanta 3120操作系统命令注入漏洞 + 详情 + + + + 6e122ed3c1b85bc4253d7bb1fa25ec8a + CVE-2024-39702 + 2024-09-30 09:25:44 + OpenResty拒绝服务漏洞 + 详情 + + + + 3335bb323287482f3b8d0cf7c8964515 + CVE-2024-6896 + 2024-09-30 09:25:44 + WordPress AMP for WP – Accelerated Mobile Pages Plugin跨站脚本漏洞 + 详情 + + + + b0b258ce5b2ba52b1010c482bbed5e66 + CVE-2023-45249 + 2024-09-30 09:25:44 + Acronis Cyber Infrastructure远程命令执行漏洞 + 详情 + + 4966eb50a7c846062b18eb1e4877f31d CVE-2024-40502 @@ -2099,126 +2219,6 @@

眈眈探求 | 详情 - - b296d3fd2d93724e0d5a88f3c8e5776e - CVE-2024-34919 - 2024-09-29 03:30:28 - SourceCodester Pisay Online E-Learning System任意文件上传漏洞 - 详情 - - - - b58ee10aa79ef9629bffa6e75b87a87b - CVE-2024-34982 - 2024-09-29 03:30:28 - LyLme Spage任意文件上传漏洞 - 详情 - - - - cad12feee1b60ee530ed7bf3fd3a24c3 - CVE-2024-5042 - 2024-09-29 03:30:28 - Submariner Operator访问控制权限错误漏洞 - 详情 - - - - b32ca4bb12d1ff7277420b429175653f - CVE-2024-5051 - 2024-09-29 03:30:28 - Mayuri K. Gas Agency Management System SQL注入漏洞 - 详情 - - - - fda7506156aa9b46ef8c95063389ba2c - CVE-2024-22429 - 2024-09-29 03:30:28 - Dell BIOS输入验证错误漏洞 - 详情 - - - - 3c4de0a749f035e28b352cf1befa6073 - CVE-2024-31974 - 2024-09-29 03:30:28 - Solarized FireDown Browser & Downloader任意代码执行漏洞 - 详情 - - - - c15fc945e35579b80b95f28647877c53 - CVE-2024-34241 - 2024-09-29 03:30:28 - Rocketsoft Rocket LMS跨站脚本漏洞 - 详情 - - - - 3397959ab19a17d6b37905df64d1f95f - CVE-2024-5072 - 2024-09-29 03:30:28 - Devolutions Server输入验证错误漏洞 - 详情 - - - - 60e1dd7b22402bef5d04b51673a2a3eb - CVE-2023-5597 - 2024-09-29 03:30:28 - Dassault Systèmes 3DEXPERIENCE存储型跨站脚本漏洞 - 详情 - - - - 0d55339e9187a3af3b107e5b41d43773 - CVE-2024-3291 - 2024-09-29 03:30:28 - Tenable Network Security Nessus Agent权限升级漏洞 - 详情 - - - - 7a824b23cfdc66097432207d11081bab - CVE-2024-3292 - 2024-09-29 03:30:28 - Tenable Network Security Nessus Agent竞争条件漏洞 - 详情 - - - - 045727b827309669c4496dfbf96228b6 - CVE-2021-22508 - 2024-09-29 03:30:28 - OpenText Operations Bridge Reporter SQL注入漏洞 - 详情 - - - - dd3dbb4b0dc5711d9f37791bf906db50 - CVE-2024-34997 - 2024-09-29 03:30:28 - joblib反序列化漏洞 - 详情 - - - - 1e2aad5e80ce9133a3c2b3ecb132c912 - CVE-2024-5064 - 2024-09-29 03:30:28 - PHPGurukul Online Course Registration System SQL注入漏洞 - 详情 - - - - 862a89742d6954387d39cbbc0081ea23 - CVE-2024-34959 - 2024-09-29 03:30:28 - Desdev DedeCMS跨站脚本漏洞 - 详情 - -