Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Nov 27, 2024
1 parent c991219 commit daf5cdd
Show file tree
Hide file tree
Showing 3 changed files with 119 additions and 104 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -165,3 +165,18 @@ bec2384e7b8281d935df749a25b4f514
418ac41bdd896add625bb728bbe91f1b
1c9279f6e4c0d04dc82337a6801548a9
3badffb5333069f2db5ad689ce6f97c4
98169601742c73a14d0da9b8826e93d1
54f35987d8927c409b18d6a2066987b5
a538437a8c076b60c2e538369c913566
2c196a970c6d262dcdc0595a969551b1
0995e3725554f5ef9c2c12685a333249
46b44d37b489b3e6a1af23be0f6ac9d7
880d68d2cd619577da80239267f5e966
0f8ad78442591cc1cb20b77afaa16598
2fe3c27e92ff89b25bb24fa920909226
b97351135df869a5f8fd677a240fc3c6
c2f4d330485abc217f6f409565c879db
2d742fdb3dc1499ae3f48dc7149547e7
70f05a07e97f58f46832e1d4fcbabb19
5224b97219e6a11b7862ce0d996f712d
2e5a87cf7da9edfd55c79f753626c14d
Binary file modified data/cves.db
Binary file not shown.
208 changes: 104 additions & 104 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-11-26 15:27:26 -->
<!-- RELEASE TIME : 2024-11-27 03:37:15 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>e07bc2c33b3c45eb1fe555e936e1f44f</td>
<td>CVE-2024-11664</td>
<td>2024-11-25 09:15:06 <img src="imgs/new.gif" /></td>
<td>2024-11-25 09:15:06</td>
<td>A vulnerability, which was classified as critical, has been found in eNMS up to 4.2. Affected by this issue is the function multiselect_filtering of the file eNMS/controller.py of the component TGZ File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 22b0b443acca740fc83b5544165c1f53eff3f529. It is recommended to apply a patch to fix this issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-11664">详情</a></td>
</tr>

<tr>
<td>d2aaafa108cdeddab6eab316968d3f28</td>
<td>CVE-2024-11663</td>
<td>2024-11-25 09:15:06 <img src="imgs/new.gif" /></td>
<td>2024-11-25 09:15:06</td>
<td>A vulnerability classified as critical was found in Codezips E-Commerce Site 1.0. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument keywords leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-11663">详情</a></td>
</tr>

<tr>
<td>17400c831ef3066f86e7e8c3813a506b</td>
<td>CVE-2022-33862</td>
<td>2024-11-25 08:54:39 <img src="imgs/new.gif" /></td>
<td>2024-11-25 08:54:39</td>
<td>IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-33862">详情</a></td>
</tr>

<tr>
<td>9c4fcb1bac12f13476b88489e06bea12</td>
<td>CVE-2024-11661</td>
<td>2024-11-25 08:15:09 <img src="imgs/new.gif" /></td>
<td>2024-11-25 08:15:09</td>
<td>A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file profile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The researcher submit confuses the vulnerability class of this issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-11661">详情</a></td>
</tr>

<tr>
<td>b32fce327f1088af29d9a77211082940</td>
<td>CVE-2024-10492</td>
<td>2024-11-25 08:15:08 <img src="imgs/new.gif" /></td>
<td>2024-11-25 08:15:08</td>
<td>A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10492">详情</a></td>
</tr>

<tr>
<td>b899d342ec994e31ea7d20f69831c44e</td>
<td>CVE-2024-10451</td>
<td>2024-11-25 07:37:05 <img src="imgs/new.gif" /></td>
<td>2024-11-25 07:37:05</td>
<td>A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10451">详情</a></td>
</tr>

<tr>
<td>fd1c6ff78239ee5f70c92bf0ec3420c8</td>
<td>CVE-2024-10270</td>
<td>2024-11-25 07:37:04 <img src="imgs/new.gif" /></td>
<td>2024-11-25 07:37:04</td>
<td>A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10270">详情</a></td>
</tr>

<tr>
<td>6a21b3419e5329a7330f496f9e844fd5</td>
<td>CVE-2024-9666</td>
<td>2024-11-25 07:29:52 <img src="imgs/new.gif" /></td>
<td>2024-11-25 07:29:52</td>
<td>A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-9666">详情</a></td>
</tr>

<tr>
<td>1f0bffc6e77b30531a3a5027d13a00f1</td>
<td>CVE-2024-11660</td>
<td>2024-11-25 07:00:18 <img src="imgs/new.gif" /></td>
<td>2024-11-25 07:00:18</td>
<td>A vulnerability was found in code-projects Farmacia 1.0. It has been classified as problematic. This affects an unknown part of the file usuario.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-11660">详情</a></td>
</tr>

<tr>
<td>73c70b14c7658664dabeafc6a043778e</td>
<td>CVE-2024-6538</td>
<td>2024-11-25 06:15:12 <img src="imgs/new.gif" /></td>
<td>2024-11-25 06:15:12</td>
<td>A flaw was found in OpenShift Console. A Server Side Request Forgery (SSRF) attack can happen if an attacker supplies all or part of a URL to the server to query. The server is considered to be in a privileged network position and can often reach exposed services that aren't readily available to clients due to network filtering. Leveraging such an attack vector, the attacker can have an impact on other services and potentially disclose information or have other nefarious effects on the system. The /api/dev-console/proxy/internet endpoint on the OpenShit Console allows authenticated users to have the console's pod perform arbitrary and fully controlled HTTP(s) requests. The full response to these requests is returned by the endpoint. While the name of this endpoint suggests the requests are only bound to the internet, no such checks are in place. An authenticated user can therefore ask the console to perform arbitrary HTTP requests from outside the cluster to a service inside the cluster.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-6538">详情</a></td>
</tr>
Expand Down Expand Up @@ -1987,6 +1987,54 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>98169601742c73a14d0da9b8826e93d1</td>
<td>CVE-2024-40088</td>
<td>2024-11-27 03:35:03 <img src="imgs/new.gif" /></td>
<td>Vilo Mesh WiFi System目录遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106818">详情</a></td>
</tr>

<tr>
<td>54f35987d8927c409b18d6a2066987b5</td>
<td>CVE-2024-40087</td>
<td>2024-11-27 03:35:03 <img src="imgs/new.gif" /></td>
<td>Vilo Mesh WiFi System访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106817">详情</a></td>
</tr>

<tr>
<td>a538437a8c076b60c2e538369c913566</td>
<td>CVE-2024-7782</td>
<td>2024-11-27 03:35:03 <img src="imgs/new.gif" /></td>
<td>WordPress插件Contact Form by Bit Form任意文件删除漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106816">详情</a></td>
</tr>

<tr>
<td>2c196a970c6d262dcdc0595a969551b1</td>
<td>CVE-2024-40091</td>
<td>2024-11-27 03:35:03 <img src="imgs/new.gif" /></td>
<td>Vilo Mesh WiFi System信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106815">详情</a></td>
</tr>

<tr>
<td>0995e3725554f5ef9c2c12685a333249</td>
<td>CVE-2024-7777</td>
<td>2024-11-27 03:35:03 <img src="imgs/new.gif" /></td>
<td>WordPress插件Contact Form by Bit Form任意文件读取和删除漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106814">详情</a></td>
</tr>

<tr>
<td>46b44d37b489b3e6a1af23be0f6ac9d7</td>
<td>CVE-2024-9677</td>
<td>2024-11-27 03:35:03 <img src="imgs/new.gif" /></td>
<td>Zyxel USG FLEX信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106813">详情</a></td>
</tr>

<tr>
<td>f0947cfa9600689a6fffb0d0618e8caa</td>
<td>CVE-2024-41930</td>
Expand Down Expand Up @@ -2108,123 +2156,75 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>a1d7ede1e15bd2cded3fd8fdf13435e4</td>
<td>CVE-2024-8633</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress Form Maker by 10Web Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106570">详情</a></td>
<td>880d68d2cd619577da80239267f5e966</td>
<td>CVE-2024-42584</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Warehouse Inventory System跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106812">详情</a></td>
</tr>

<tr>
<td>26f7a311b4a8e0ab9e4141961dfb4e9e</td>
<td>CVE-2024-45981</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Book Review Library主机标头注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106569">详情</a></td>
<td>0f8ad78442591cc1cb20b77afaa16598</td>
<td>CVE-2024-43688</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Vixie Cron基于堆的缓冲区下溢漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106811">详情</a></td>
</tr>

<tr>
<td>ec10fbaa1d99eeabe7ddc046c17856db</td>
<td>CVE-2024-7011</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Sharp NEC Projectors拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106568">详情</a></td>
<td>2fe3c27e92ff89b25bb24fa920909226</td>
<td>CVE-2024-8980</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Liferay Portal跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106810">详情</a></td>
</tr>

<tr>
<td>189bc22c7d51b3cd763ff10bdef1ff81</td>
<td>CVE-2024-8991</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress OSM – OpenStreetMap Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106567">详情</a></td>
</tr>

<tr>
<td>a2949d42f12fbb4da912d5aeddc82178</td>
<td>CVE-2024-9130</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress GiveWP – Donation Plugin and Fundraising SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106566">详情</a></td>
</tr>

<tr>
<td>6bf5b28e6a2cd6378fde12703931f48f</td>
<td>CVE-2024-8681</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress Premium Addons for Elementor Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106565">详情</a></td>
</tr>

<tr>
<td>c32d60e21cd149550d7e052a12f50357</td>
<td>CVE-2024-41605</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Foxit PDF Reader和PDF Editor访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106564">详情</a></td>
</tr>

<tr>
<td>e6356c09cb479df9e7d1913747a2e534</td>
<td>CVE-2024-8922</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress Product Enquiry for WooCommerce Plugin PHP对象注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106563">详情</a></td>
</tr>

<tr>
<td>c181caca36bb108adcc2c040fc5e1898</td>
<td>CVE-2024-9115</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress Common Tools for Site Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106562">详情</a></td>
</tr>

<tr>
<td>1d06a01e4e04faf58f3fe3a464aca23f</td>
<td>CVE-2024-39431</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Google Android越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106561">详情</a></td>
<td>b97351135df869a5f8fd677a240fc3c6</td>
<td>CVE-2024-42583</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Warehouse Inventory System跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106809">详情</a></td>
</tr>

<tr>
<td>228d8af11db1f0c64734f79215202055</td>
<td>CVE-2024-9177</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress Themedy Toolbox Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106560">详情</a></td>
<td>c2f4d330485abc217f6f409565c879db</td>
<td>CVE-2022-23861</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>YSoft SAFEQ跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106808">详情</a></td>
</tr>

<tr>
<td>a64ce7077f43f657d2d0eae5daec1294</td>
<td>CVE-2024-8725</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>WordPress Advanced File Manager Plugin有限文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106559">详情</a></td>
<td>2d742fdb3dc1499ae3f48dc7149547e7</td>
<td>CVE-2022-23862</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>YSoft SAFEQ访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106807">详情</a></td>
</tr>

<tr>
<td>0bb4968eeb955bf74de1e98e9e4f1318</td>
<td>CVE-2024-46327</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Vonets VAP11G-300目录遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106558">详情</a></td>
<td>70f05a07e97f58f46832e1d4fcbabb19</td>
<td>CVE-2024-42585</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Warehouse Inventory System跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106806">详情</a></td>
</tr>

<tr>
<td>8fd6e0987c41583f81e1f14e6fe63efc</td>
<td>CVE-2024-45984</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Blood Bank And Donation Management System跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106557">详情</a></td>
<td>5224b97219e6a11b7862ce0d996f712d</td>
<td>CVE-2024-49210</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Archer Platform反射型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106805">详情</a></td>
</tr>

<tr>
<td>da639f65ffcbb2c59bb77220bf1a3078</td>
<td>CVE-2024-45985</td>
<td>2024-11-25 09:25:51 <img src="imgs/new.gif" /></td>
<td>Blood Bank And Donation Management System跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106556">详情</a></td>
<td>2e5a87cf7da9edfd55c79f753626c14d</td>
<td>CVE-2024-46240</td>
<td>2024-11-26 03:35:03 <img src="imgs/new.gif" /></td>
<td>Collabtive跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/106804">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit daf5cdd

Please sign in to comment.