From f41c2e559d2287fc0a5ac53437313c06243c5453 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Wed, 27 Nov 2024 15:26:46 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 50290688 -> 50298880 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 73fcec2eb17..89051d4ec84 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -132,3 +132,13 @@ a8ad3dd98906e55b62e82236d963840a 2e766aad63d0f28e7b9fbe42a63d0639 1a5fb770f0614bca096124ac0b950cf9 4c211ecdf45a307f58e3f6b0ec8afc3b +2f727bde471b13c1ae2e14076ab3a4c8 +78c73790025e596e2f99c11661f97985 +33b86be4fda888a50ee1a76c72c90638 +1fb8e3c220dcc19f8a44aa1cb777b334 +d768d0b6cf54837815bfaeb67117fc0b +7a72c1f1369688b841eb91926443ca98 +77e99e99cdeb887bc152d7fc043686cb +fda1b5c1d4095322a3e93a9067c98fad +7e01b98183c1a6b72d5cc438a2ceab04 +58ee1c1a3573e58c2cbe62c68b43edef diff --git a/data/cves.db b/data/cves.db index 01a0f358079c50a809fb0552b895bde81bc04ce1..ae92d7a774e6d259078ef2d9a4312aa95e273b89 100644 GIT binary patch delta 6250 zcmd7Wd2|!?76))Lq^vEpEEd^1Sa!Q)GD#*W3Y2}-R@qg0CzDAVNt2R=RkR3~MMa7T zK?Ft=aaTYE6|jg3?kujTtQAm^DxfHmL(!S~1e=lOi^oPO@fNvFwg?%dz~-P7_d z7t+hiFQ!+tN;+PvR_<>L#2%L8(}~H#Brw%xvN9zx)nTg3RFA1XQv;@kOvy|sOpTZt zGo>=6F*RXo%G8XhInz~4=}aw{u4Zb<)QYJ!QyZqXOc_ifQ#+<>m@=8#Gj(9<$kd6c zGgB9)u1wc5Wie$lAlZPpfsTGkm)9-o0*0&4QCp`G?Hl)(`cqK zOt&!I%5)pkSf(N-W->9;ET-8^bC~8b-NSS*(|t_y znC@qq&s4#*faw9Ig-j1JEn-^ClwexI^bpfhriYo9F)e3W!DKK!!nBg?`WOlz6eF}=w264T2}>zOt%y~6Y=(`!r{nKm(P zW_q2el4%Rm8%$f7-eh`<>20QMOxu~>VS1P8J*M}WK4AKg=_95cOgou&G3{phnCTOy zPnkYr`kd(traeqwGJVDLHPc?EeN6kA4lo^LI>c1P^bONtrXx&8nZ9NEj_G@*V@y9V z9cQX$`jP1;rV~sjnNBhN%=8P>X{KM9eq%brbe8EH(|M)~Oc$AcpG%f`WB~zcgB6mX z4%CHuP#+pVLr8`cXatQR71E#yG=*l+9Ik?NXaQG4OK1hHp$)W!3=p9mTmzZV9y&lr z=medi3v`8RAq%o02Xes%64*fo2ROk63b?@odC(26gX^I?^njj_551r_^nt$65BkFZ z7zl%4FbsjAa0A>31yBe#!ObuXhQkOL38P>%jDcI=R=5quLJ^qxSHTM!_&^6g6hjFF z;C2`XK`4a~grN+^Lj>YE z_!ho{@8KBy0LP&keuSUk1e}CZ@H6}Zr{P!l4bH$>I0xt90$haOEpti0_6GrKgB6mX z4%CHuP#+pVLr8`cXatQR71E#yG=*l+9Ik?NXaQG4OK1hHp$)W!3=p9mTmzZV9y&lr z=medi3v`8RAq%o02Xes%64*fo2ROk63b?@odC(26gX^I?^njj_551r_^nt$65BkFZ z7zl%4FbsjAa0A>31yBe#!ObuXhQkOL38P>%jDcI=R=5quLJ^qxSHTM!_&^6g6hjFF z;C2`XK`4a~grN+^Lj>YE z_!ho{?}g2DOjtF)US;j&wanqQGP&ZIFr~IN<@1!CmG>+>CS){7q*V;+lAQZ1R~6%m z(_H19zi;_50pSNT95+L?8GbawPi8n_hLdJEWrm;4@QWEvo8eb8{APwTW;knxb7nYi zh6_UFzU3E%j_cCuS~}NiT-fM|l#2}y)w@0ELCc1;ou`^wvgZ_I4Go57cbOfQXNOhE z?{(|4X1CjXnkIStZq?yXRY~(IisF@x6Qd3bt&BC#oENOkoWn|Vv3EEgis=z?c$s*p ze4%I*jy)@+CyO1$p@Ed9kr;!$rYih!^$Z%FTxQ~ z%C;+_P05p-c{cZd{;8ET`kYYLVsm?(T*y_bd3Q5M%QHu-vg~!cyt>2hQ{8U2>a^*) zq$(~=v1=Zi%aHOn39V|&E{Cxob(YXH@yL%2a7c`Ctl`LW4dU5kRI}tg#)3O z7>MF^I9^;L#=@f4*!#s+OPjkwlf~jlI9~S8FB+qIy@5$$zOOV83PfWOH5QIUyJU&_ zBuy`inSWVxc~p#*s4-EE=%OzWRlPyoCx#(=Di$Mn43U5q!<+qw|MOOI>^8e2 zTe>pwp8Q1Sw(ZRm1*2|G`WtUr`x|cBuyorhWZUszUCOK|SCLr}JXPkYs^ZoZS@GCx zcBk(2xOBVUv-MO*s^T8P`^GNPrNJ`R(%PnA2&B_>lLAH z>K_lplP7!f98zM}^o`dhh(}ugi(hLsejNCfCDUPkxyz-@Oy{a1Gd(jhlyS%Iegry=qbFl#=XOozU!SDlS*%TvgF+lGo#w+-5pm zUd8TnYMMiKt9DISy+*s>8KJdRvP&Lg(vdSl+*s3MsU>N}?CwH+qw)Lag-(W;a!^Q0 z6DI`Jn!FV2v7$h!T5P||DCfvcykzD1kDW)QMMv;oHD|wxoNxElr#nBfa>bsOMn;deLWji8*2AoZXt~B>9gK%xs)p2Jy;L`QXh;l%W2)FY zM-AX03YpcW#!zo+5ap-F{NYHc=#PX;MJdOYV?(ykT+wmuIZ}>nOy8ev>1eE9G~Lp? zftkxo`_V|<@u<)&?T@W^IZyw?1+Bq?S{hqAZ5LWgHOZMdj;r*VtVZP-QB_fNj|V@R zPxrdridVx`KEd#Ug4ODAdh(66b$45a{I`;s*z)w4dMo-b!Ez7G z9A>d*sA8WXLqtC&fj{llOF8|!S7T8VIj^41UU3w&OAeATXBt=e%rwqPlIJ9;ii#mX z@=LPI<8r&bZil3MJ(9=nayVpTe3x8{c?_HttaT*C9DIy5QwoKy>7C6Q(<8yj;)p;r zj=Jj|E-ed3jnvlXgpo}q`ocwJID2sn7sbqTIclg+ZWd(2rY{oiGs-ahEKa@h3|9W4 zPhNuo=#^Z>IjcTbX*I1UP3AP!r?}ico7biJoesCGxFx68uj*cxB1tG1V}WOr(7Kn+ z>9(0O*noI67SwB|y1u1qASe!1BjfZK?j=hcqN|uD^pK8`1p6&Zys-?wh-Qfe;j(y{ zp^mo+P9xKmBBUjzbW5ZedI3mBqcmK(qvn-@GvTr^>lBBAQwH-z=};70XNPdT)GJ<3Qhyf;AZ_Gh4qU`9Q7Y z$~64nX@_NlSTVP{{)V1Cd$qJ=&1%I}B{k0>Q|3(7>BiiN?k_tPS$DcMyXMthcFpDX zI%GW|y}7ex1G53y+_G5@(^obYnj1!^RTj}$)3jRXljX>fFkQI+I08n7BfbL6c~Mad zV+f4uYD6m${kj^9M~rrRYg@V*6~n8AdPe!$=Y$4E&)^+GQew-IDM?P$YV7j(h;dQJ zIjx7ToEUNTmIR7R^hkD4pP&b8W?U5UfQgo?jPiYjg0<AF9Zt3ps?$-Bwc-|kd zX7u~J#7tu$6zE1i|z`q9c@ zWwbI`nXN2VRx6v8-O6G8WaYGSS-Gt|R$eQgmES606|@Rjg{>l1QLC8svsK(GVU@H> zS*5KqR#~f@Ro<##{bE(LDp{4SDppminpNGZVb!#1S+%V?R$Z%}Ro`l0HMAO8jjbjY z`!uzhS3H`R!ggu)!J%fwYAz=?X3=0N2`<7+3I3-wYpi|tsYiStC!W=>SOh_ z`dR(00oL!fohc(z5V%ZvM{b>!ehFc@7k=7_{v^B;WYmKwUTNA8_)+B4PHN~20 zO|$;8rdu$b-+4k9kLEvN35gPzt%D9 zxOKuhX`Ql8TW74Z);a6Eb-}u5U9v7)SFEenHS4-{!@6nRvTj>%R5CdT2ee z9$QbWr`9v;x%I+&X}z*uTW_ql);sIH^}+gReX>4VU#zdzH|xLQ3O`!m5kLe)L?lGU zcZhzr3$h{`vLgq6LQdpDZsb8;j0r(vQF$jNPFowVwia#+7!!ZIQF$$wG24gV} z<1qmfF$t3~1yeB%e_=XiU?xH_3$rl?b1@HpV?GvOAr|2uEXEQn#WF0%3arE`ti~Fw z#X79V25iJ8Y{nLB#Wrlm4uoMRc40U6U@!JzKMvp^4&gA4;3)pZF&xJUoWv=d#u=Q& zIh@A@T*M_@#uZ$}HC)FH+{7*1#vR16wJj5eB#uGfnGd#x&yu>TK#v8oFJG{pS ze8eYw#ut3WH~bfVxB{F%0*HW!h=j=a4p9&l(GVRm5EHQw8*va9@$fz3BLNa35fUQ_ zk|G(BBL#jyN`xR4QX>u0A|2A>M`S=oWI|?SK~`i#cI3cM$cbFYjXcPUe8`UiD2PHR zj3OwCV)z-wQ354V3Z+p7Wl;|0Q31c8A}XOWs-P;Wp*m`yCTgKJ>Yy&_p*|X*AsV4E znjpA;Q#3V2o4AGBxP!a6hx>Sd zhjljFyC!OcnBT(1 mt`=)i%#EpXB)b|23%L;*Xd5{!BqUAv#Sz24HTo|Q2>cKH@p^&) diff --git a/docs/index.html b/docs/index.html index 1f9e9285be8..da0c15d8a8b 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 2f727bde471b13c1ae2e14076ab3a4c8 + CVE-2024-52323 + 2024-11-27 09:54:07 + Zohocorp ManageEngine Analytics Plus versions below 6100 are vulnerable to authenticated sensitive data exposure which allows the users to retrieve sensitive tokens associated to the org-admin account. + 详情 + + + + 78c73790025e596e2f99c11661f97985 + CVE-2024-11667 + 2024-11-27 09:39:41 + A directory traversal vulnerability in the web management interface of Zyxel ATP series firmware versions V5.00 through V5.38, USG FLEX series firmware versions V5.00 through V5.38, USG FLEX 50(W) series firmware versions V5.10 through V5.38, and USG20(W)-VPN series firmware versions V5.10 through V5.38 could allow an attacker to download or upload files via a crafted URL. + 详情 + + + + 33b86be4fda888a50ee1a76c72c90638 + CVE-2024-36467 + 2024-11-27 07:15:09 + An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. + 详情 + + + + 1fb8e3c220dcc19f8a44aa1cb777b334 + CVE-2024-10895 + 2024-11-27 07:15:08 + The Counter Up – Animated Number Counter & Milestone Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'lgx-counter' shortcode in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + 详情 + + + + d768d0b6cf54837815bfaeb67117fc0b + CVE-2024-10580 + 2024-11-27 07:15:07 + The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to unauthorized form submissions due to a missing capability check on the submit_form() function in all versions up to, and including, 7.8.5. This makes it possible for unauthenticated attackers to submit unpublished forms. + 详情 + + + + 7a72c1f1369688b841eb91926443ca98 + CVE-2024-10175 + 2024-11-27 07:15:07 + The Pricing Tables For WPBakery Page Builder (formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wdo_pricing_tables shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. + 详情 + + + + 77e99e99cdeb887bc152d7fc043686cb + CVE-2024-52959 + 2024-11-27 06:15:19 + A Improper Control of Generation of Code ('Code Injection') vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to perform arbitrary system commands via a DLL file. + 详情 + + + + fda1b5c1d4095322a3e93a9067c98fad + CVE-2024-52958 + 2024-11-27 06:15:18 + A improper verification of cryptographic signature vulnerability in plugin management in iota C.ai Conversational Platform from 1.0.0 through 2.1.3 allows remote authenticated users to load a malicious DLL via upload plugin function. + 详情 + + + + 7e01b98183c1a6b72d5cc438a2ceab04 + CVE-2024-11219 + 2024-11-27 06:15:18 + The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.0.6 via the get_image function. This makes it possible for unauthenticated attackers to view arbitrary images on the server, which can contain sensitive information. + 详情 + + + + 58ee1c1a3573e58c2cbe62c68b43edef + CVE-2024-11083 + 2024-11-27 06:15:17 + The ProfilePress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.15.18 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. + 详情 + + d3af3ba28ea2bfaaa42cb9f59de143c8 CVE-2024-11680 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - 7cf182d7dfaf5be3a714a67d8476d761 - CVE-2024-9941 - 2024-11-23 07:38:07 - The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the MJ_gmgt_add_staff_member() function in all versions up to, and including, 67.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to create new user accounts with the administrator role. - 详情 - - - - 0af5445422ab6764bf54061a07e955bd - CVE-2024-9659 - 2024-11-23 07:38:07 - The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mj_smgt_user_avatar_image_upload() function in all versions up to, and including, 91.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - 详情 - - - - 5054c6ddf6ddeb68ca5e05444b88ac19 - CVE-2024-9942 - 2024-11-23 07:38:06 - The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the MJ_gmgt_user_avatar_image_upload() function in all versions up to, and including, 67.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - 详情 - - - - e6b8002cb5ae32707c799f07b2d9205e - CVE-2024-9511 - 2024-11-23 07:38:05 - The FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.2.82 via deserialization of untrusted input in the 'formatResult' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. The vulnerability was partially patched in version 2.2.82. - 详情 - - - - 0a29dabfcf6574494793f93d3bfff212 - CVE-2024-9660 - 2024-11-23 07:38:03 - The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mj_smgt_load_documets_new() and mj_smgt_load_documets() functions in all versions up to, and including, 91.5.0. This makes it possible for authenticated attackers, with Student-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. - 详情 - - - - 2d6b9cccf49c2a0bd5fbbf159c3678a9 - CVE-2024-9635 - 2024-11-23 06:54:54 - The Checkout with Cash App on WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the '_wp_http_referer' parameter in several files in all versions up to, and including, 6.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - 详情 - - - - 934bb8c7462f1e55c43359863405ab50 - CVE-2024-11446 - 2024-11-23 06:54:53 - The Chessgame Shizzle plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'cs_nonce' parameter in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - 详情 - - - - ef48c3d67afee75497134f509e35a1bb - CVE-2024-11330 - 2024-11-23 06:54:49 - The Custom CSS, JS & PHP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - 详情 - - - - 5a8bb5df857fa16e7071e4dc822400ff - CVE-2024-11188 - 2024-11-23 05:40:11 - The Formidable Forms – Contact Form Plugin, Survey, Quiz, Payment, Calculator Form & Custom Form Builder plugin for WordPress is vulnerable to POST-Based Reflected Cross-Site Scripting via the Custom HTML Form parameters in all versions up to, and including, 6.16.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - 详情 - - - - b688fdc46d864b07a4ba6049b4bcd0a1 - CVE-2024-11426 - 2024-11-23 04:32:22 - The AutoListicle: Automatically Update Numbered List Articles plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'auto-list-number' shortcode in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - -