Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 26, 2024
1 parent f191a2b commit d50143d
Show file tree
Hide file tree
Showing 3 changed files with 146 additions and 131 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -108,3 +108,18 @@ dbd4c473777ec38bbee8ffc487a0b3d4
1938695484b752d95385a8074fe688f5
0cc5d2332f9f86c1646068ec78244a65
10bf73589aecf96421e80e8f3765ef9f
9ec813549ba3f618cdc08acbbe7fd27b
76c9d55611436289e0ca7cf480ac7e52
17f7c839c2284c85451f432cc0466258
ecd5408a500ba109a6d2682f5314a78e
a3dcac0e28c0a7ff3be67f4c04b566c1
85fb67ab9749a5c359c70b6015971b14
b3e930f070b12040a1fdaff8c906df42
68641d1194284edf66fe39907a509721
32dd8ae83bf5535bfa7420c20feef5dd
d6ab038604fd4f556e31d1222a09064c
58e8bf78583018912a54f496a4443053
6b221298e17d642fe13bb1b56015372b
381b4edd5b4665d42a26b32a2adb84ac
79f502561fabb0fe2ceb41cb78da3cf7
eeb7ad500cf01ce29d668962caebb99b
Binary file modified data/cves.db
Binary file not shown.
262 changes: 131 additions & 131 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-09-25 15:27:03 -->
<!-- RELEASE TIME : 2024-09-26 03:29:18 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -286,79 +286,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>cb4a266a4203b354953e8dd6f35f06d3</td>
<td>CVE-2024-8942</td>
<td>2024-09-24 11:51:49 <img src="imgs/new.gif" /></td>
<td>2024-09-24 11:51:49</td>
<td>Vulnerability in Scriptcase version 9.4.019 that consists of a Cross-Site Scripting (XSS), due to the lack of input validation, affecting the “id_form_msg_title” parameter, among others. This vulnerability could allow a remote user to send a specially crafted URL to a victim and retrieve their credentials.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8942">详情</a></td>
</tr>

<tr>
<td>d586aafdb48aa180d364ce934f8f6611</td>
<td>CVE-2024-8941</td>
<td>2024-09-24 11:50:58 <img src="imgs/new.gif" /></td>
<td>2024-09-24 11:50:58</td>
<td>Path traversal vulnerability in Scriptcase version 9.4.019, in /scriptcase/devel/compat/nm_edit_php_edit.php (in the “subpage” parameter), which allows unauthenticated remote users to bypass SecurityManager's intended restrictions and list and/or read a parent directory via a “/...” or directly into a path used in the POST parameter “field_file” by a web application.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8941">详情</a></td>
</tr>

<tr>
<td>de6a1eb21c679bb4242106067f162b13</td>
<td>CVE-2024-8940</td>
<td>2024-09-24 11:48:36 <img src="imgs/new.gif" /></td>
<td>2024-09-24 11:48:36</td>
<td>Vulnerability in the Scriptcase application version 9.4.019, which involves the arbitrary upload of a file via /scriptcase/devel/lib/third/jquery_plugin/jQuery-File-Upload/server/php/ via a POST request. An attacker could upload malicious files to the server due to the application not properly verifying user input.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8940">详情</a></td>
</tr>

<tr>
<td>ef7216cbfcf12e1e25435c88e8d29eb1</td>
<td>CVE-2024-8801</td>
<td>2024-09-24 11:00:45 <img src="imgs/new.gif" /></td>
<td>2024-09-24 11:00:45</td>
<td>The Happy Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.12.2 via the Content Switcher widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including private, draft, and pending Elementor templates.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8801">详情</a></td>
</tr>

<tr>
<td>648c6ca74eabfb861677e1d05fc69227</td>
<td>CVE-2024-9141</td>
<td>2024-09-24 10:50:25 <img src="imgs/new.gif" /></td>
<td>2024-09-24 10:50:25</td>
<td>Cross-Site Scripting (XSS) vulnerability in the Oct8ne system. This flaw could allow an attacker to embed harmful JavaScript code into the body of a chat message. This manipulation occurs when the chat content is intercepted and altered, leading to the execution of the JavaScript payload.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9141">详情</a></td>
</tr>

<tr>
<td>2800ad516cea8008688a6e278e8ba939</td>
<td>CVE-2024-38324</td>
<td>2024-09-24 10:24:43 <img src="imgs/new.gif" /></td>
<td>2024-09-24 10:24:43</td>
<td>IBM Storage Defender 2.0.0 through 2.0.7 on-prem defender-sensor-cmd CLI does not validate server name during registration and unregistration operations which could expose sensitive information to an attacker with access to the system.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-38324">详情</a></td>
</tr>

<tr>
<td>c554c2552fb0751135556e07cace2ebd</td>
<td>CVE-2024-9142</td>
<td>2024-09-24 08:47:05 <img src="imgs/new.gif" /></td>
<td>2024-09-24 08:47:05</td>
<td>External Control of File Name or Path, : Incorrect Permission Assignment for Critical Resource vulnerability in Olgu Computer Systems e-Belediye allows Manipulating Web Input to File System Calls.This issue affects e-Belediye: before 2.0.642.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9142">详情</a></td>
</tr>

<tr>
<td>ff2458d88815b9c325b6ba0219aa4b35</td>
<td>CVE-2024-8436</td>
<td>2024-09-24 07:30:46 <img src="imgs/new.gif" /></td>
<td>2024-09-24 07:30:46</td>
<td>The WP Easy Gallery – WordPress Gallery Plugin plugin for WordPress is vulnerable to SQL Injection via the 'edit_imageId' and 'edit_imageDelete' parameters in all versions up to, and including, 4.8.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8436">详情</a></td>
</tr>

<tr>
<td>8e4f8785f0b10a512ed39eaa8824e7fb</td>
<td>CVE-2024-8437</td>
<td>2024-09-24 07:30:45 <img src="imgs/new.gif" /></td>
<td>2024-09-24 07:30:45</td>
<td>The WP Easy Gallery – WordPress Gallery Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions hooked via AJAX like wpeg_settings and wpeg_add_gallery in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify galleries.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-8437">详情</a></td>
</tr>

<tr>
<td>751e37859fc07200503fe96ccad8a928</td>
<td>CVE-2023-5359</td>
<td>2024-09-24 07:30:45 <img src="imgs/new.gif" /></td>
<td>2024-09-24 07:30:45</td>
<td>The W3 Total Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.5 via Google OAuth API secrets stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to impersonate W3 Total Cache and gain access to user account information in successful conditions. This would not impact the WordPress users site in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5359">详情</a></td>
</tr>
Expand Down Expand Up @@ -1979,6 +1979,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>9ec813549ba3f618cdc08acbbe7fd27b</td>
<td>CVE-2024-31394</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>a-blog cms目录遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102150">详情</a></td>
</tr>

<tr>
<td>76c9d55611436289e0ca7cf480ac7e52</td>
<td>CVE-2024-3518</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>WordPress Plugin Media Library AssistantSQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102149">详情</a></td>
</tr>

<tr>
<td>17f7c839c2284c85451f432cc0466258</td>
<td>CVE-2024-21683</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>Atlassian Confluence Data Center and Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102148">详情</a></td>
</tr>

<tr>
<td>ecd5408a500ba109a6d2682f5314a78e</td>
<td>CVE-2024-5040</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>LCDS LAquis SCADA路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102147">详情</a></td>
</tr>

<tr>
<td>a3dcac0e28c0a7ff3be67f4c04b566c1</td>
<td>CVE-2024-34274</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>OpenBD反序列化漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102146">详情</a></td>
</tr>

<tr>
<td>85fb67ab9749a5c359c70b6015971b14</td>
<td>CVE-2024-31756</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>MarvinTest Solutions Hardware Access Driver权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102145">详情</a></td>
</tr>

<tr>
<td>b3e930f070b12040a1fdaff8c906df42</td>
<td>CVE-2024-35061</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>NASA AIT-Core远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102144">详情</a></td>
</tr>

<tr>
<td>68641d1194284edf66fe39907a509721</td>
<td>CVE-2024-35060</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>NASA AIT-Core任意命令执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102143">详情</a></td>
</tr>

<tr>
<td>32dd8ae83bf5535bfa7420c20feef5dd</td>
<td>CVE-2024-3519</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>WordPress Plugin Media Library Assistant跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102142">详情</a></td>
</tr>

<tr>
<td>d6ab038604fd4f556e31d1222a09064c</td>
<td>CVE-2024-0453</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>WordPress plugin AI ChatBot未授权的数据修改漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102141">详情</a></td>
</tr>

<tr>
<td>58e8bf78583018912a54f496a4443053</td>
<td>CVE-2024-30420</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>a-blog cms服务器请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102140">详情</a></td>
</tr>

<tr>
<td>6b221298e17d642fe13bb1b56015372b</td>
<td>CVE-2024-33525</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>ILIAS存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102139">详情</a></td>
</tr>

<tr>
<td>381b4edd5b4665d42a26b32a2adb84ac</td>
<td>CVE-2024-31989</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>Argo CD算法加密漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102138">详情</a></td>
</tr>

<tr>
<td>79f502561fabb0fe2ceb41cb78da3cf7</td>
<td>CVE-2024-25724</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>RTI Connext Professional缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102137">详情</a></td>
</tr>

<tr>
<td>eeb7ad500cf01ce29d668962caebb99b</td>
<td>CVE-2024-4154</td>
<td>2024-09-26 03:27:10 <img src="imgs/new.gif" /></td>
<td>Lunary未授权的信息修改漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102136">详情</a></td>
</tr>

<tr>
<td>048b41b4debc34d43a382716cc4931e1</td>
<td>CVE-2024-31979</td>
Expand Down Expand Up @@ -2099,126 +2219,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102088">详情</a></td>
</tr>

<tr>
<td>d13c9d8372201885ca2d58405947956c</td>
<td>CVE-2024-21155</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle ZFS Storage Appliance Kit product信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101999">详情</a></td>
</tr>

<tr>
<td>00d56c1da98b3727cc1a45cba8ed270f</td>
<td>CVE-2024-21169</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle E-Business Suite信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101994">详情</a></td>
</tr>

<tr>
<td>37b4670b5039fe7ed364c15da32774a0</td>
<td>CVE-2024-21168</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle JD Edwards信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101992">详情</a></td>
</tr>

<tr>
<td>bcca318885734383c4e4021f4e0074c7</td>
<td>CVE-2024-21158</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle PeopleSoft Enterprise PeopleTools信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101990">详情</a></td>
</tr>

<tr>
<td>861ac9dc64a16905eaaf9bc9cbd2cc84</td>
<td>CVE-2024-6336</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>GitHub Enterprise Server配置错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101987">详情</a></td>
</tr>

<tr>
<td>b3d7e6b8f6542fbd5bcac3ec81358946</td>
<td>CVE-2024-21153</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle E-Business Suite信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101986">详情</a></td>
</tr>

<tr>
<td>c83f096aedee84264dece6b0d5056e0f</td>
<td>CVE-2024-21152</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle E-Business Suite信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101985">详情</a></td>
</tr>

<tr>
<td>e663bf46007bf121b3bafdbe9970dc1e</td>
<td>CVE-2024-21188</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle Financial Services Applications授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101984">详情</a></td>
</tr>

<tr>
<td>71fe7d10a2c71ac466f96d7cc0190fd3</td>
<td>CVE-2024-3172</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Google Chrome数据验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101983">详情</a></td>
</tr>

<tr>
<td>f97ce115a1164a0a99decf03519ac4f4</td>
<td>CVE-2020-36765</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Google Chrome策略实施不足漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101979">详情</a></td>
</tr>

<tr>
<td>04f1d7d3068b4260c82a634d2ed69975</td>
<td>CVE-2023-7012</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Google Chrome数据验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101978">详情</a></td>
</tr>

<tr>
<td>b8a9a448cb211a1cccdc91ef8e96e4be</td>
<td>CVE-2024-21126</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle Database Server不受控制的资源消耗漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101977">详情</a></td>
</tr>

<tr>
<td>263eafe142b767d88ceccecfb67235a1</td>
<td>CVE-2024-21148</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle E-Business Suite信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101976">详情</a></td>
</tr>

<tr>
<td>0cd63f67f4f5db0084838e142d3e8805</td>
<td>CVE-2024-21136</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>Oracle Retail Applications信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101975">详情</a></td>
</tr>

<tr>
<td>9d345ca82b6a9861a9f1528218904a85</td>
<td>CVE-2024-6395</td>
<td>2024-09-24 12:43:15 <img src="imgs/new.gif" /></td>
<td>GitHub Enterprise Server信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/101974">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit d50143d

Please sign in to comment.