Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 9, 2024
1 parent 4e63979 commit e6e5ca7
Show file tree
Hide file tree
Showing 3 changed files with 21 additions and 11 deletions.
10 changes: 10 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -169,3 +169,13 @@ f79fcade520a056e99af54d1cc1e8ed2
69380c582a6c8bb15ec37ff17ad1d800
9270956a00b3bee98011fa016b97e600
8f65f74e3eddbf147058721469dd6cb8
697cd3a3f7852b93abc90430044d8026
5b5c48c9f275d1479bc61eccdec84180
4d29704b181ea1c1193988acda793857
04ca01a31f3c0593678e1c940ca63ae1
1602031d15f8786b9685d1463cfa3b48
7bad9320fbfae073e684f502ec4efd9d
9deb8f9af8c095374d59f239c77d710f
1a9886e410975dc0e92a1d12fec6487d
25c375e23192fa23f01b9de779b8794d
9cb8a118a086ec97c3a1f296fb3fb521
Binary file modified data/cves.db
Binary file not shown.
22 changes: 11 additions & 11 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-08 23:24:15 -->
<!-- RELEASE TIME : 2024-04-09 02:30:30 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>93dd0369eae4bcea64811d3481dda1b5</td>
<td>CVE-2024-3428</td>
<td>2024-04-07 18:15:13 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:13</td>
<td>A vulnerability has been found in SourceCodester Online Courseware 1.0 and classified as problematic. This vulnerability affects unknown code of the file edit.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259600.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3428">详情</a></td>
</tr>

<tr>
<td>5bdaad99079d0bd6b78cb220f492778b</td>
<td>CVE-2024-31349</td>
<td>2024-04-07 18:15:13 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:13</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MailMunch MailMunch – Grow your Email List allows Stored XSS.This issue affects MailMunch – Grow your Email List: from n/a through 3.1.6.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31349">详情</a></td>
</tr>

<tr>
<td>d23663b48f5d29aa9cd2ba59ac88e890</td>
<td>CVE-2024-31348</td>
<td>2024-04-07 18:15:13 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:13</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themepoints Testimonials allows Stored XSS.This issue affects Testimonials: from n/a through 3.0.5.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31348">详情</a></td>
</tr>

<tr>
<td>0eb2b923b164a1d18aa874473ff5b811</td>
<td>CVE-2024-31346</td>
<td>2024-04-07 18:15:12 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:12</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Blocksmarket Gradient Text Widget for Elementor allows Stored XSS.This issue affects Gradient Text Widget for Elementor: from n/a through 1.0.1.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31346">详情</a></td>
</tr>

<tr>
<td>07032626ff056060e31105d464abdaef</td>
<td>CVE-2024-31345</td>
<td>2024-04-07 18:15:12 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:12</td>
<td>Unrestricted Upload of File with Dangerous Type vulnerability in Sukhchain Singh Auto Poster.This issue affects Auto Poster: from n/a through 1.2.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31345">详情</a></td>
</tr>

<tr>
<td>4e182befdb9a68117d0620c95c33b1d5</td>
<td>CVE-2024-31344</td>
<td>2024-04-07 18:15:12 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:12</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Phpbits Creative Studio Easy Login Styler – White Label Admin Login Page for WordPress allows Stored XSS.This issue affects Easy Login Styler – White Label Admin Login Page for WordPress: from n/a through 1.0.6.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31344">详情</a></td>
</tr>

<tr>
<td>d9b9f84eb54c6fd61eeef29c848aa448</td>
<td>CVE-2024-31308</td>
<td>2024-04-07 18:15:12 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:12</td>
<td>Deserialization of Untrusted Data vulnerability in VJInfotech WP Import Export Lite.This issue affects WP Import Export Lite: from n/a through 3.9.26.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31308">详情</a></td>
</tr>

<tr>
<td>20bcf172618e2af057ec2ad31724bf04</td>
<td>CVE-2024-31306</td>
<td>2024-04-07 18:15:12 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:12</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPDeveloper Essential Blocks for Gutenberg allows Stored XSS.This issue affects Essential Blocks for Gutenberg: from n/a through 4.5.3.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31306">详情</a></td>
</tr>

<tr>
<td>b67f27af951f9a41befbb990dabe7d1b</td>
<td>CVE-2024-31296</td>
<td>2024-04-07 18:15:11 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:11</td>
<td>Authorization Bypass Through User-Controlled Key vulnerability in Repute Infosystems BookingPress.This issue affects BookingPress: from n/a through 1.0.81.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31296">详情</a></td>
</tr>

<tr>
<td>fb589e94e464f0fa8a0eeee28df875e6</td>
<td>CVE-2024-31292</td>
<td>2024-04-07 18:15:11 <img src="imgs/new.gif" /></td>
<td>2024-04-07 18:15:11</td>
<td>Unrestricted Upload of File with Dangerous Type vulnerability in Moove Agency Import XML and RSS Feeds.This issue affects Import XML and RSS Feeds: from n/a through 2.1.5.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31292">详情</a></td>
</tr>
Expand Down

0 comments on commit e6e5ca7

Please sign in to comment.