Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 27, 2024
1 parent a670b2b commit cc7a0c8
Show file tree
Hide file tree
Showing 3 changed files with 22 additions and 21 deletions.
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -108,3 +108,4 @@ cb576d9c0707ffe805884008040c7538
66a6ab40e7e4b7a630abbbf1ebf255dd
7e78adf418c46bbe657eabc821e06513
e2e896d6dfc05308f0434390a875f278
799ce86ee3c0c565d9df8f3d1e46778e
Binary file modified data/cves.db
Binary file not shown.
42 changes: 21 additions & 21 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-26 23:23:12 -->
<!-- RELEASE TIME : 2024-04-27 03:27:03 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -326,39 +326,39 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>b85204ab61164bbbea71be1be077589c</td>
<td>CVE-2024-0916</td>
<td>2024-04-25 23:15:46 <img src="imgs/new.gif" /></td>
<td>2024-04-25 23:15:46</td>
<td>Unauthenticated file upload allows remote code execution. This issue affects UvDesk Community: from 1.0.0 through 1.1.3.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-0916">详情</a></td>
</tr>

<tr>
<td>039b66811d5fa56e26df7ee0a647f104</td>
<td>CVE-2024-3265</td>
<td>2024-04-25 22:15:09 <img src="imgs/new.gif" /></td>
<td>2024-04-25 22:15:09</td>
<td>The Advanced Search WordPress plugin through 1.1.6 does not properly escape parameters appended to an SQL query, making it possible for users with the administrator role to conduct SQL Injection attacks in the context of a multisite WordPress configurations.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3265">详情</a></td>
</tr>

<tr>
<td>e1b455f9593bd816c307679a43d85fcd</td>
<td>CVE-2024-31610</td>
<td>2024-04-25 22:15:08 <img src="imgs/new.gif" /></td>
<td>2024-04-25 22:15:08</td>
<td>File Upload vulnerability in the function for employees to upload avatars in Code-Projects Simple School Management System v1.0 allows attackers to run arbitrary code via upload of crafted file.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31610">详情</a></td>
</tr>

<tr>
<td>6f88cdb25822c2c2fff7af07253fd82a</td>
<td>CVE-2024-31609</td>
<td>2024-04-25 22:15:08 <img src="imgs/new.gif" /></td>
<td>2024-04-25 22:15:08</td>
<td>Cross Site Scripting (XSS) vulnerability in BOSSCMS v3.10 allows attackers to run arbitrary code via the header code and footer code fields in code configuration.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31609">详情</a></td>
</tr>

<tr>
<td>6d309a8480978e80d45aa41aea1e6da9</td>
<td>CVE-2022-36029</td>
<td>2024-04-25 21:15:46 <img src="imgs/new.gif" /></td>
<td>2024-04-25 21:15:46</td>
<td>Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-36029">详情</a></td>
</tr>
Expand Down Expand Up @@ -2094,119 +2094,119 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>875bb675a73e20aec42cee75dbb1f37c</td>
<td>CVE-2024-1328</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>WordPress Newsletter2Go Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94078">详情</a></td>
</tr>

<tr>
<td>efd6f912f8f0e243c68474c554260dd1</td>
<td>CVE-2023-6814</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>Hitachi Cosminexus信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94077">详情</a></td>
</tr>

<tr>
<td>084a3a7b8b9865afef22f7d5273bbea9</td>
<td>CVE-2024-25331</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>D-Link DIR-822和DIR-822-CA远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94076">详情</a></td>
</tr>

<tr>
<td>24654bc968df520e4b1692c088b6c059</td>
<td>CVE-2024-26521</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>CE Phoenix Cart HTML注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94075">详情</a></td>
</tr>

<tr>
<td>ea4315593bc948451349a62db9c939ae</td>
<td>CVE-2024-28163</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>SAP NetWeaver Process Integration(PI)信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94074">详情</a></td>
</tr>

<tr>
<td>45404f0733a972ab85c7d16a74aea708</td>
<td>CVE-2023-49453</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>Racktables跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94054">详情</a></td>
</tr>

<tr>
<td>96194b3303a1bd3cec052c4ee74b8b0c</td>
<td>CVE-2024-21584</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>Pleasanter跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94053">详情</a></td>
</tr>

<tr>
<td>bf3d800e80ff3a32bc332871d7701c3f</td>
<td>CVE-2024-25999</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>PHOENIX CONTACT CHARX SEC输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94052">详情</a></td>
</tr>

<tr>
<td>f693c98a214f024dd5eb11ae320121b9</td>
<td>CVE-2024-25996</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>PHOENIX CONTACT CHARX SEC源验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94051">详情</a></td>
</tr>

<tr>
<td>b7eda7b8fd169d557c1b1fb0883d6709</td>
<td>CVE-2024-25998</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>PHOENIX CONTACT CHARX SEC输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94050">详情</a></td>
</tr>

<tr>
<td>a97f54c3568e80c9601eb00213a2e682</td>
<td>CVE-2024-25995</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>PHOENIX CONTACT CHARX SEC身份认证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94049">详情</a></td>
</tr>

<tr>
<td>c7d45539f7ed70cd01366f66bfc9f8b9</td>
<td>CVE-2024-25994</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>PHOENIX CONTACT CHARX SEC输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94048">详情</a></td>
</tr>

<tr>
<td>42e392f592288339f51cb33f1eaf21bc</td>
<td>CVE-2024-27121</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>Omron Machine Automation Controller NJ Series和NX Series路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94047">详情</a></td>
</tr>

<tr>
<td>a1ec46fcb6ef79449d1f85c80f4e456b</td>
<td>CVE-2024-21805</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>SKYSEA Client View访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94046">详情</a></td>
</tr>

<tr>
<td>6f5d25a12e9b936c12438e3cb3649b95</td>
<td>CVE-2024-0906</td>
<td>2024-04-25 07:21:26 <img src="imgs/new.gif" /></td>
<td>2024-04-25 07:21:26</td>
<td>WordPress fx Private Site Plugin信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/94045">详情</a></td>
</tr>
Expand Down

0 comments on commit cc7a0c8

Please sign in to comment.