Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 25, 2024
1 parent 0b7a597 commit c5f80df
Show file tree
Hide file tree
Showing 4 changed files with 147 additions and 130 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -118,3 +118,18 @@ ccd7987217a20bda9f9333c1db94d2be
7ee640c65d71b60d05b02f7adf8a4cc3
2d0823fb3af70cad015ef58321a5a58a
cb6827f79cbe1787d002b5b7a54dbf3e
567431a4283ad2e12a5cb7067f11a11d
67647d5cc7c09321f72d76467021df0d
aebf558e9b1c37fa58d780f32a2a7872
f144fc6630219bd878236954bf3f120f
d46a0c52521c49bd5d4df38b4340b2d2
580e58ed6e6bd1cb9e3154a51237daca
6c79fb1e6662b1c1ae0f3a02e4ef24f5
b7f30643afbdb1d7df0a609ccc2784d8
f8376b05f122a5cbe12439eea01499e8
512981509e4442909ecd75932ce0f3ce
aacd0b4a71126b2e578f5f1a3a78445a
321a3076fa689cc83bd15db10929cba7
da34fd1cce20f9eb618bace073265b22
aff24424388dbbe3da897958bd9ade53
2e86c3c1241581e57ae5041ebe7f1e94
2 changes: 2 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -185,3 +185,5 @@ c1708e318e4cf50a03bbb97a5c8c16f4
ec1c20ff4fe9797d50b9624a96ee2e9e
012058838fb9d41e034b3172eea09ed4
2bd624d7c9fbde8abd5c5abd1f77079a
2be320f27ffd475c6901362f5c7ae06e
5c5046d790aeb22b8bcd71dfaa25128f
Binary file modified data/cves.db
Binary file not shown.
260 changes: 130 additions & 130 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-24 23:26:09 -->
<!-- RELEASE TIME : 2024-04-25 03:24:28 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -294,71 +294,71 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>f049ed359656e4e3680f60c27e0342fb</td>
<td>CVE-2024-4075</td>
<td>2024-04-23 23:15:49 <img src="imgs/new.gif" /></td>
<td>2024-04-23 23:15:49</td>
<td>A vulnerability classified as problematic has been found in Kashipara Online Furniture Shopping Ecommerce Website 1.0. This affects an unknown part of the file login.php. The manipulation of the argument txtAddress leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261801 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4075">详情</a></td>
</tr>

<tr>
<td>f2a74e88fe079dfd3da34375264be37e</td>
<td>CVE-2024-4074</td>
<td>2024-04-23 23:15:49 <img src="imgs/new.gif" /></td>
<td>2024-04-23 23:15:49</td>
<td>A vulnerability was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file prodInfo.php. The manipulation of the argument prodId leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261800.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4074">详情</a></td>
</tr>

<tr>
<td>679081a1f4a307a7db3fb96bf23967c7</td>
<td>CVE-2024-4073</td>
<td>2024-04-23 23:15:49 <img src="imgs/new.gif" /></td>
<td>2024-04-23 23:15:49</td>
<td>A vulnerability was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file prodList.php. The manipulation of the argument prodType leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261799.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4073">详情</a></td>
</tr>

<tr>
<td>5e269ee38b0fe8b082603254602fe56d</td>
<td>CVE-2024-4072</td>
<td>2024-04-23 23:15:49 <img src="imgs/new.gif" /></td>
<td>2024-04-23 23:15:49</td>
<td>A vulnerability was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0. It has been classified as problematic. Affected is an unknown function of the file search.php. The manipulation of the argument txtSearch leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-261798 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4072">详情</a></td>
</tr>

<tr>
<td>46f5b5da2a7a3953efe6aa21c1586969</td>
<td>CVE-2024-4071</td>
<td>2024-04-23 22:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-23 22:15:07</td>
<td>A vulnerability was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0 and classified as critical. This issue affects some unknown processing of the file prodInfo.php. The manipulation of the argument prodId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261797 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4071">详情</a></td>
</tr>

<tr>
<td>dd085a1fb8a511c140a3a06e95554a4a</td>
<td>CVE-2024-4070</td>
<td>2024-04-23 22:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-23 22:15:07</td>
<td>A vulnerability has been found in Kashipara Online Furniture Shopping Ecommerce Website 1.0 and classified as critical. This vulnerability affects unknown code of the file prodList.php. The manipulation of the argument prodType leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261796.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4070">详情</a></td>
</tr>

<tr>
<td>272bff879aaa3496118eec16a1589f82</td>
<td>CVE-2024-4069</td>
<td>2024-04-23 22:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-23 22:15:07</td>
<td>A vulnerability, which was classified as critical, was found in Kashipara Online Furniture Shopping Ecommerce Website 1.0. This affects an unknown part of the file search.php. The manipulation of the argument txtSearch leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261795.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4069">详情</a></td>
</tr>

<tr>
<td>b4276f8e76a4b5f796add6232ecad276</td>
<td>CVE-2024-31616</td>
<td>2024-04-23 22:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-23 22:15:07</td>
<td>An issue discovered in RG-RSR10-01G-T(W)-S and RG-RSR10-01G-T(WA)-S routers with firmware version RSR10-01G-T-S_RSR_3.0(1)B9P2, Release(07150910) allows attackers to execute arbitrary code via the common_quick_config.lua file.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31616">详情</a></td>
</tr>

<tr>
<td>0412f7e086f1a77f801f7543c17d0e67</td>
<td>CVE-2024-30886</td>
<td>2024-04-23 22:15:07 <img src="imgs/new.gif" /></td>
<td>2024-04-23 22:15:07</td>
<td>A stored cross-site scripting (XSS) vulnerability in the remotelink function of HadSky v7.6.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30886">详情</a></td>
</tr>
Expand Down Expand Up @@ -1971,6 +1971,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>567431a4283ad2e12a5cb7067f11a11d</td>
<td>CVE-2023-50933</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>IBM PowerSC HTML注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94027">详情</a></td>
</tr>

<tr>
<td>67647d5cc7c09321f72d76467021df0d</td>
<td>CVE-2023-51506</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress plugin WPCS跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94026">详情</a></td>
</tr>

<tr>
<td>aebf558e9b1c37fa58d780f32a2a7872</td>
<td>CVE-2023-6223</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress Plugin LearnPress身份验证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94025">详情</a></td>
</tr>

<tr>
<td>f144fc6630219bd878236954bf3f120f</td>
<td>CVE-2023-51695</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Everest Forms跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94024">详情</a></td>
</tr>

<tr>
<td>d46a0c52521c49bd5d4df38b4340b2d2</td>
<td>CVE-2023-47144</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>IBM Tivoli Application Dependency Discovery Manager跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94023">详情</a></td>
</tr>

<tr>
<td>580e58ed6e6bd1cb9e3154a51237daca</td>
<td>CVE-2023-6582</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress ElementsKit Elementor addons plugin信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94022">详情</a></td>
</tr>

<tr>
<td>6c79fb1e6662b1c1ae0f3a02e4ef24f5</td>
<td>CVE-2023-47143</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>IBM Tivoli Application Dependency Discovery Manager HTTP标头注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94021">详情</a></td>
</tr>

<tr>
<td>b7f30643afbdb1d7df0a609ccc2784d8</td>
<td>CVE-2023-6875</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress POST SMTP Mailer不合理授权漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94020">详情</a></td>
</tr>

<tr>
<td>f8376b05f122a5cbe12439eea01499e8</td>
<td>CVE-2023-51509</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress plugin RegistrationMagic跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94019">详情</a></td>
</tr>

<tr>
<td>512981509e4442909ecd75932ce0f3ce</td>
<td>CVE-2023-6561</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress Plugin Featured Image from URL跨站脚本执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94018">详情</a></td>
</tr>

<tr>
<td>aacd0b4a71126b2e578f5f1a3a78445a</td>
<td>CVE-2024-22096</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>Rapid Software Rapid SCADA路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94017">详情</a></td>
</tr>

<tr>
<td>321a3076fa689cc83bd15db10929cba7</td>
<td>CVE-2023-6782</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress AMP for WP Plugin跨站脚本执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94016">详情</a></td>
</tr>

<tr>
<td>da34fd1cce20f9eb618bace073265b22</td>
<td>CVE-2024-1201</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>PanteraSoft HDD Health DLL劫持漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94015">详情</a></td>
</tr>

<tr>
<td>aff24424388dbbe3da897958bd9ade53</td>
<td>CVE-2024-0963</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Calculated Fields Form存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94014">详情</a></td>
</tr>

<tr>
<td>2e86c3c1241581e57ae5041ebe7f1e94</td>
<td>CVE-2024-23895</td>
<td>2024-04-25 03:22:22 <img src="imgs/new.gif" /></td>
<td>Cups Easy跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94013">详情</a></td>
</tr>

<tr>
<td>34e5edcd375e76ccb9a876da1d284514</td>
<td>CVE-2024-1290</td>
Expand Down Expand Up @@ -2091,126 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93940">详情</a></td>
</tr>

<tr>
<td>d44a869f1f9124848e7d045c0ce9eb0b</td>
<td>CVE-2024-25501</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>Winmail任意代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93903">详情</a></td>
</tr>

<tr>
<td>72579810e7f195cdb385f919519e100a</td>
<td>CVE-2024-28089</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>Hitron Technologies CODA-4582跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93902">详情</a></td>
</tr>

<tr>
<td>114e50e70cd10a0834836de3bd59fd8a</td>
<td>CVE-2024-1767</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>WordPress Blocksy theme跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93901">详情</a></td>
</tr>

<tr>
<td>df7e115fa5c7a7c13b06afea54deed61</td>
<td>CVE-2024-28753</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>RaspAP信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93900">详情</a></td>
</tr>

<tr>
<td>7eb62c06ef8ff48d16f9e1544666d3d8</td>
<td>CVE-2023-32264</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>OpenText Documentum D2源验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93899">详情</a></td>
</tr>

<tr>
<td>31b8d828a9e73fd10f5b974831cc68f7</td>
<td>CVE-2024-2339</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>PostgreSQL Anonymizer输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93898">详情</a></td>
</tr>

<tr>
<td>fdef16d6144db285f015307e82f07a9d</td>
<td>CVE-2024-23297</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>Apple多款产品信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93897">详情</a></td>
</tr>

<tr>
<td>39ea8472a0942092df64eba3954bfddf</td>
<td>CVE-2024-1320</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>WordPress EventPrime Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93896">详情</a></td>
</tr>

<tr>
<td>e9b819a96a928c1c8d1fb11fe625c841</td>
<td>CVE-2024-28754</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>RaspAP拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93895">详情</a></td>
</tr>

<tr>
<td>4b15b1b31e332a6ca6ae607e90d532d3</td>
<td>CVE-2024-1125</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>WordPress EventPrime Plugin授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93894">详情</a></td>
</tr>

<tr>
<td>967295d1e563f29a145094c01c1bed83</td>
<td>CVE-2024-28122</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>JWX不受控制的资源消耗漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93893">详情</a></td>
</tr>

<tr>
<td>02aa7712665d545a48955fe1cc272baa</td>
<td>CVE-2024-1124</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>WordPress EventPrime Plugin授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93892">详情</a></td>
</tr>

<tr>
<td>c1e8d3f4847190513e5b33dea94114c3</td>
<td>CVE-2024-28184</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>WeasyPrint信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93891">详情</a></td>
</tr>

<tr>
<td>8a5bb5e975960c79ac61f263d909d0c9</td>
<td>CVE-2024-1123</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>WordPress EventPrime Plugin授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93890">详情</a></td>
</tr>

<tr>
<td>bf581ecb4d714c46e4c834f4b0e96c59</td>
<td>CVE-2023-49340</td>
<td>2024-04-23 03:23:07 <img src="imgs/new.gif" /></td>
<td>Newland Nquire 1000 Interactive Kiosk访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93889">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit c5f80df

Please sign in to comment.