From daf5cdd01880a6484be3da7618ff1b46aa433ee4 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Wed, 27 Nov 2024 03:37:16 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 ++++ data/cves.db | Bin 50282496 -> 50286592 bytes docs/index.html | 208 +++++++++++++++++++++++----------------------- 3 files changed, 119 insertions(+), 104 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 9a2475401e9..0e35b1e52ce 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -165,3 +165,18 @@ bec2384e7b8281d935df749a25b4f514 418ac41bdd896add625bb728bbe91f1b 1c9279f6e4c0d04dc82337a6801548a9 3badffb5333069f2db5ad689ce6f97c4 +98169601742c73a14d0da9b8826e93d1 +54f35987d8927c409b18d6a2066987b5 +a538437a8c076b60c2e538369c913566 +2c196a970c6d262dcdc0595a969551b1 +0995e3725554f5ef9c2c12685a333249 +46b44d37b489b3e6a1af23be0f6ac9d7 +880d68d2cd619577da80239267f5e966 +0f8ad78442591cc1cb20b77afaa16598 +2fe3c27e92ff89b25bb24fa920909226 +b97351135df869a5f8fd677a240fc3c6 +c2f4d330485abc217f6f409565c879db +2d742fdb3dc1499ae3f48dc7149547e7 +70f05a07e97f58f46832e1d4fcbabb19 +5224b97219e6a11b7862ce0d996f712d +2e5a87cf7da9edfd55c79f753626c14d diff --git a/data/cves.db b/data/cves.db index ca60bd8f79d7ef0cbb61c2213656917835f32f80..e53c5b96be8f075866578627e247967cfb4eef8f 100644 GIT binary patch delta 4597 zcmajhd6>=R8^>{TFj)pkWzP}PHu)~+yJD52B(!kKT~QiTrj0{s z-}ePgyY^N4rp8i{q_imf-rwohFVuDY=DJ?@b)ECa`8?14JkNd2v}s%0PFuLO?d*n(o&_B%I+$yRrXM6 zqq3*UUMhR5v{h-R(q5&5N=KDWDxFpKQR$)*SLv#W4Nq)JL9t&&m6s)Q=1tBh8uP&q^8OqDSzXQ_-;sZ=>zWt>Wt%6OFtD(9$7 zR5@2=lFDS2DJtiwoUd|$%7rRZRi>%rR4!7vSY^73s$8OSsmf(4GgM}(T&{A3$}E*D zRjO5HtIScEt8$gf)hgGh%u}gRxmM*mmFrb*P`OcMzRCiXyvjnAMJhL`+^n)#&@-cWf{%BRo+o~S7n9D zdn)g%e4z57%10_6t9+vJsmf<6pR0VKvQp(sm9JFlR9301R#~I6R^@AzZ&bcjS*NmI z`X6EsCLG)ECype0&iceKVHXoEem7xqS5v_pGzKu2^!XY7M6h@&g^MK^Ru5A27Y z*dGVrKpcdFQH(>-3kFPBu#tcR7an{B=#4{h7!Jn~=!3rKha=G+15koe48&158iQ~Q z2BQqe;y4V!P#lkPoPc2%juAK!BXJT&;bfeGQ*j!i{wI+_8X05};&hBg1ew$cm~hnIXsUS@FJGuCA^GR@G4%z>v#ii;w`+5 zcknJ&;61#L5AY#A!pHaopW-uojxVqhU*ap&VHH+m4c6joe1mVX4(st9HsE_~#1Ghn zAMq15<7fPWU-28Z;CK9it=NX`1v4bZ^G6H~(Fl!Eh~3ZxP0kJo5uMN(`=ATr=!$*O4c*ZL`=KZH#{oDH2jO58;}G z2Oj}?<4_!i!*K-qpfCF2Nc6`5l%Ny?aTJcmARL3iD8sQh4nr^$$DJsD1Wv?A zoP<$08K>Y>oQA0XNu-cQ23dqS9ivf!GjJxx;4F+qCCn1b_g zJ}$t8n2Kr0;UZj&=}=sPOK}-yU?wid6_|x9QH|M{gSog0SK}JYLk+IQb+{fk;6}{H z0_3p}i*OTe#$w!pTX7q1#~rv6cj0c_gL`ow?#Bao5D(#DJc38@7#_zHcoIvn6wB}w zYVkCl!LxV{&*KHWh~;<*FXI)wir4Tu-oTr93vc5cyo(ih5AWjxe29?TSr=Pe-DGLQ`3<6fUTceHuZvA=7;CY*cKTK8Vm+GG zw7$Reh{nBs(z^cD>*ueFQPxN0yQpl4%J)&(7?mHQvMDM*M&+ldY>vv$QTZh*zeeS^ zsBDSK?@{?9DqCZ<>*sHawVT_fX@jW^nt!|7r-c(6w`=%SY)Zi=1^L!}rxlDIlCxMv z)3WwGbIt7*!;+5eCu}e2rwz|dxklQ`@{R2V>AyB(v*8YIg$#fE-?F7D;@dL|CCyXFv`WZKA8LrE>DQB0=gkkvJ@QN{&@v`jr(eV)# zr4{+kGoOfc&(Hp7YphY>4r!z6)4W^=~OH56ZRDy5piHmas&6p7gzR=&`VDCd@ca z+6zL@v0ckev*2Bq=voP*f904l$<&03iTQCQKgZhVH?-d#D{S~z+lNO>GZMMZT6b)e zl8oAJS&3BOS!R%Rlct&SeAh~6jZ6@@p=VnENC_;{=vS2Pl{GVoFr7-KQf9F0jx5J_ zY8F-Y?NIYVx9;uo@#dRjg-y9h?%y}*`1%+(x3|^}j$+EA#$`CwFq5(~v?&OZSvySl znY70TC*ftionowF%Vx_X%PYeP@$!D9B}4NMblD#3TDU_9Tc&SbZg;IaCJGryNZJY$ z8QV4zzLQL)Ez=9#kW1^hPTKc^OwF8DkF+Ur&A)%QruD4eZ59-6i#6Txr~hn|AGK-F zUv1(zY{%rGWkTN#l1}J{8Q1fYoNt)6)4RUD1Z}eaPn*i>cM#;-Y2DGp^c)$rDa_hw zi^H(O&<|3UlS)~MFd0}zU<8)6Ym6WG#^8!DTa}!gA3JbUtb4QQQSZ>Dp;3lu($uL4cneqGtYYfbE+DxY`BgIz2WYTnb?K>SsqBvo@KF@4YMK<2Qs&Z^i*UQh} zt7hJYKCS*cLUu^2Z=7jHjT`t^<9y%9xPHb;XIwLIJRXj3Sax8!T(@lSkFgasF7baF zS6;sXHyFM9@zki*?#;PSt)=aNnGw)J{^Vjz+SzSGE_1r5~U$*d@>lUwBTD|7s1@)8s zU*~ipnw$foCP$N#{J>2Ho{@GlmTP6wnY7^qPBL%<$1zj?GC2ct=gFCWdwDL_DZeqs MY}&B_e@;&4KL<>Gga7~l delta 2918 zcmWmGWwR9o6op|pmy#}Nq(hYM?rufMx^#m`H(VN&?(UTC4&U?Pd4Ir~ z*)zNU+%F0H_y3Y`T+)d9!-dQGdVI>F;r9=a72XP1Ayxz{q7})CY(=rYv!Ytjtmsw@ zE2b68ifzTQ;#%>n_}2GU0xO}F$VzM_v65QJtmM`YRthVnmC8zOrLodl>8$it1}mfW zqm{|}$@sTG_1ZRt_ttmCMR)<+1Ww`KT__qE*SNY*n$UTGg!TRt>AB^^5hZRm-Yv{btp%>RR=z`c?z0q1DJ@ zpT<@b>v!u9tEtt@YHqc#T3W5F)>a#TdP0dRo1# z-c}#0uhq}$Zw;^pT7#^?maQSyP-~bq+!|qxv_@H@tufYEYn(OSnqW<|CRvlMDb`eL znl;^;Va>E=S)tZ!YmPP7nrF?o7FY|dMb=_#iM7;PW-Yf?SSzi+tX0g}kLFy&lcI%A!+&ROTJ3)V&Jl6Bd-VqLYaS=X%_)=le{b=$gQ-L>vn_pJxkf7V0m zk@eVmVm-BSMrLF|R%AnVk zLSrUV>H3<_ybMR49(F3Ezt_C(FSeN z4(-ta9nlGYqBFXnE4raOdY~tIp*Q-VFZ!WB24EltVK9s#7>Z#Sju9A%Q5cOe7>jWj zj|rHFNtlc&n2Kqbjv1JVSqQ~!%)wmD!+b2jLM*~!EWuJN!*Z;^O8kXY_#3OS25Yen z>#+eFu?d^81zWKV+pz;X5r$pZjXl_leb|o!IEX{|2mj(Qj^HSc;W$pMCT`(2?%*!&;XWSVKRm=EJjN3|#WOs|3%tZDyv7^6#XG#m z2YkdQe8v}i#kcUo72y04KnNlrA|fF&qToA3MKnZ548%k%#6}#%MLfjE_eg+*NQA^l zf}}`>5v{7kP$y36Mn+a$c!w=ifqV^9LR}W$c;S6i+sqB0w{<= zD2yT~iee~^5-5pMD2*~Gi*hKB3aE%msEjJ8ifX8i8mNh1@GEMeHhx1L)I~kiM*}oO zBLw$vj3)RUf1oLvp*dQhC0e01+Mq4kp*=dFBRb(vbVe6+MK^Ru5A;MY^hO`_ML+b% z01U(+42CfTLop1)F#;no3ZpRwV=)fnF#!`X36n7eQ!x$GF#|I(3!#{eIhc!in2!Zm zh(%b8C0L4OSdJA~iNCN4e`7V)U@g{RJvLw?HeoZiU@Nv^J9c0v!mtawu?Ksx5BqTd z2XP4h;9nfZ5gf%a9LEWq#3`J{8JxvAoW})R#3fwD6 + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-11-25 09:15:06 A vulnerability, which was classified as critical, has been found in eNMS up to 4.2. Affected by this issue is the function multiselect_filtering of the file eNMS/controller.py of the component TGZ File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 22b0b443acca740fc83b5544165c1f53eff3f529. It is recommended to apply a patch to fix this issue. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-11-25 09:15:06 A vulnerability classified as critical was found in Codezips E-Commerce Site 1.0. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument keywords leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-11-25 08:54:39 IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-11-25 08:15:09 A vulnerability was found in Codezips Free Exam Hall Seating Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file profile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The researcher submit confuses the vulnerability class of this issue. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-11-25 08:15:08 A vulnerability was found in Keycloak. A user with high privileges could read sensitive information from a Vault file that is not within the expected context. This attacker must have previous high access to the Keycloak server in order to perform resource creation, for example, an LDAP provider configuration and set up a Vault read file, which will only inform whether that file exists or not. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-11-25 07:37:05 A flaw was found in Keycloak. This issue occurs because sensitive runtime values, such as passwords, may be captured during the Keycloak build process and embedded as default values in bytecode, leading to unintended information disclosure. In Keycloak 26, sensitive data specified directly in environment variables during the build process is also stored as a default values, making it accessible during runtime. Indirect usage of environment variables for SPI options and Quarkus properties is also vulnerable due to unconditional expansion by PropertyMapper logic, capturing sensitive data as default values in all Keycloak versions up to 26.0.2. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-11-25 07:37:04 A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-11-25 07:29:52 A vulnerability was found in the Keycloak Server. The Keycloak Server is vulnerable to a denial of service (DoS) attack due to improper handling of proxy headers. When Keycloak is configured to accept incoming proxy headers, it may accept non-IP values, such as obfuscated identifiers, without proper validation. This issue can lead to costly DNS resolution operations, which an attacker could exploit to tie up IO threads and potentially cause a denial of service. The attacker must have access to send requests to a Keycloak instance that is configured to accept proxy headers, specifically when reverse proxies do not overwrite incoming headers, and Keycloak is configured to trust these headers. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-11-25 07:00:18 A vulnerability was found in code-projects Farmacia 1.0. It has been classified as problematic. This affects an unknown part of the file usuario.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-11-25 06:15:12 A flaw was found in OpenShift Console. A Server Side Request Forgery (SSRF) attack can happen if an attacker supplies all or part of a URL to the server to query. The server is considered to be in a privileged network position and can often reach exposed services that aren't readily available to clients due to network filtering. Leveraging such an attack vector, the attacker can have an impact on other services and potentially disclose information or have other nefarious effects on the system. The /api/dev-console/proxy/internet endpoint on the OpenShit Console allows authenticated users to have the console's pod perform arbitrary and fully controlled HTTP(s) requests. The full response to these requests is returned by the endpoint. While the name of this endpoint suggests the requests are only bound to the internet, no such checks are in place. An authenticated user can therefore ask the console to perform arbitrary HTTP requests from outside the cluster to a service inside the cluster. 详情 @@ -1987,6 +1987,54 @@

眈眈探求 | TITLE URL + + 98169601742c73a14d0da9b8826e93d1 + CVE-2024-40088 + 2024-11-27 03:35:03 + Vilo Mesh WiFi System目录遍历漏洞 + 详情 + + + + 54f35987d8927c409b18d6a2066987b5 + CVE-2024-40087 + 2024-11-27 03:35:03 + Vilo Mesh WiFi System访问控制错误漏洞 + 详情 + + + + a538437a8c076b60c2e538369c913566 + CVE-2024-7782 + 2024-11-27 03:35:03 + WordPress插件Contact Form by Bit Form任意文件删除漏洞 + 详情 + + + + 2c196a970c6d262dcdc0595a969551b1 + CVE-2024-40091 + 2024-11-27 03:35:03 + Vilo Mesh WiFi System信息泄露漏洞 + 详情 + + + + 0995e3725554f5ef9c2c12685a333249 + CVE-2024-7777 + 2024-11-27 03:35:03 + WordPress插件Contact Form by Bit Form任意文件读取和删除漏洞 + 详情 + + + + 46b44d37b489b3e6a1af23be0f6ac9d7 + CVE-2024-9677 + 2024-11-27 03:35:03 + Zyxel USG FLEX信息泄露漏洞 + 详情 + + f0947cfa9600689a6fffb0d0618e8caa CVE-2024-41930 @@ -2108,123 +2156,75 @@

眈眈探求 | - WordPress Form Maker by 10Web Plugin跨站脚本漏洞 - 详情 + 880d68d2cd619577da80239267f5e966 + CVE-2024-42584 + 2024-11-26 03:35:03 + Warehouse Inventory System跨站请求伪造漏洞 + 详情 - 26f7a311b4a8e0ab9e4141961dfb4e9e - CVE-2024-45981 - 2024-11-25 09:25:51 - Book Review Library主机标头注入漏洞 - 详情 + 0f8ad78442591cc1cb20b77afaa16598 + CVE-2024-43688 + 2024-11-26 03:35:03 + Vixie Cron基于堆的缓冲区下溢漏洞 + 详情 - ec10fbaa1d99eeabe7ddc046c17856db - CVE-2024-7011 - 2024-11-25 09:25:51 - Sharp NEC Projectors拒绝服务漏洞 - 详情 + 2fe3c27e92ff89b25bb24fa920909226 + CVE-2024-8980 + 2024-11-26 03:35:03 + Liferay Portal跨站请求伪造漏洞 + 详情 - 189bc22c7d51b3cd763ff10bdef1ff81 - CVE-2024-8991 - 2024-11-25 09:25:51 - WordPress OSM – OpenStreetMap Plugin跨站脚本漏洞 - 详情 - - - - a2949d42f12fbb4da912d5aeddc82178 - CVE-2024-9130 - 2024-11-25 09:25:51 - WordPress GiveWP – Donation Plugin and Fundraising SQL注入漏洞 - 详情 - - - - 6bf5b28e6a2cd6378fde12703931f48f - CVE-2024-8681 - 2024-11-25 09:25:51 - WordPress Premium Addons for Elementor Plugin跨站脚本漏洞 - 详情 - - - - c32d60e21cd149550d7e052a12f50357 - CVE-2024-41605 - 2024-11-25 09:25:51 - Foxit PDF Reader和PDF Editor访问控制错误漏洞 - 详情 - - - - e6356c09cb479df9e7d1913747a2e534 - CVE-2024-8922 - 2024-11-25 09:25:51 - WordPress Product Enquiry for WooCommerce Plugin PHP对象注入漏洞 - 详情 - - - - c181caca36bb108adcc2c040fc5e1898 - CVE-2024-9115 - 2024-11-25 09:25:51 - WordPress Common Tools for Site Plugin跨站脚本漏洞 - 详情 - - - - 1d06a01e4e04faf58f3fe3a464aca23f - CVE-2024-39431 - 2024-11-25 09:25:51 - Google Android越界写入漏洞 - 详情 + b97351135df869a5f8fd677a240fc3c6 + CVE-2024-42583 + 2024-11-26 03:35:03 + Warehouse Inventory System跨站请求伪造漏洞 + 详情 - 228d8af11db1f0c64734f79215202055 - CVE-2024-9177 - 2024-11-25 09:25:51 - WordPress Themedy Toolbox Plugin跨站脚本漏洞 - 详情 + c2f4d330485abc217f6f409565c879db + CVE-2022-23861 + 2024-11-26 03:35:03 + YSoft SAFEQ跨站脚本漏洞 + 详情 - a64ce7077f43f657d2d0eae5daec1294 - CVE-2024-8725 - 2024-11-25 09:25:51 - WordPress Advanced File Manager Plugin有限文件上传漏洞 - 详情 + 2d742fdb3dc1499ae3f48dc7149547e7 + CVE-2022-23862 + 2024-11-26 03:35:03 + YSoft SAFEQ访问控制错误漏洞 + 详情 - 0bb4968eeb955bf74de1e98e9e4f1318 - CVE-2024-46327 - 2024-11-25 09:25:51 - Vonets VAP11G-300目录遍历漏洞 - 详情 + 70f05a07e97f58f46832e1d4fcbabb19 + CVE-2024-42585 + 2024-11-26 03:35:03 + Warehouse Inventory System跨站请求伪造漏洞 + 详情 - 8fd6e0987c41583f81e1f14e6fe63efc - CVE-2024-45984 - 2024-11-25 09:25:51 - Blood Bank And Donation Management System跨站脚本漏洞 - 详情 + 5224b97219e6a11b7862ce0d996f712d + CVE-2024-49210 + 2024-11-26 03:35:03 + Archer Platform反射型跨站脚本漏洞 + 详情 - da639f65ffcbb2c59bb77220bf1a3078 - CVE-2024-45985 - 2024-11-25 09:25:51 - Blood Bank And Donation Management System跨站脚本漏洞 - 详情 + 2e5a87cf7da9edfd55c79f753626c14d + CVE-2024-46240 + 2024-11-26 03:35:03 + Collabtive跨站脚本漏洞 + 详情