From fade5dde385cae0f7eca6caf8466b1b777d77af3 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 20 Sep 2024 09:27:53 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 49377280 -> 49381376 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index cd4032841c..7603a17325 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -119,3 +119,18 @@ c1e2dd93d00a931ec82dd244cde4175f 60f9dab1ba4f98aeac7ae8e34a02bff4 a8e0579981125021136b8bcf63ba8ffb b1ceb4de49b3dccde66a86ae603335a0 +9c0ae096f388c82eb7faf76ed0c8d372 +dc3fde14de7481140f79399ab73b5a33 +48a36ee635176f162204c1b448ae1af9 +8c58ed60075db55f589cffee2b86883d +53ccc9a7abd26488c929536e9a07f61e +392f822b5b7c80ec4111644991de4220 +cea6b67a894c22ddc253c315d47a2a71 +9c054bd6b9423aa0214036acd5ed5e4b +a98663232623219ca5df99697d0c2ac6 +02dcb40de006a8500b26748a1a4360f6 +191eca5c949f672078d37022295f9f34 +12aed07bad36e0f8d37ce83c38787d7f +d7fb50ad574eefdc3ab5e1c24db5bff1 +92f54b211c471aff0afdba05f6ce43e0 +537bae0272bcf245f2a09d5627563c11 diff --git a/data/cves.db b/data/cves.db index 2f40fae522e65904bf9853df948f7bcb79fa3c02..fb5f3fc1a12d65165a8a5413fc57428721d89e50 100644 GIT binary patch delta 4633 zcmb8xca&4*_Qr80Fcbk5K@m}i1wjQlIY~|u6#?lgO{$8zPfkvT(P0KNgMgJ$9~BkB zI#vekVgnm0>R1qaLC0Ref`};Sz24q_-;6(<>$vV(_pX)C`6DYU&%5{g?l)Pm@%iox z7Od;Oq-W{)R;>o^etC3o$@p56mB=Ep*0MITQdwJBJ6U^K2iXp?j5N>niIe+f}xkth;P?Sr6GBvYxU%WqZkb$$HD8vb|;d$o7@(C+j2IU)ERFPj-Op zK-odE{;~nGgJlC{jw~i~WpP&RY#>*ziCd!VHO_EKPO_5ENO_NQR9V;&0~ zvXf-=$CqVgfh;ErWqDbdY^JPScCzdgS%qwttWs7bn=Lz4R*+T8YGiX{r^)8Z=E>&E zPM4h_J5zR+>}=UNvIVkQ*}1awWarByyFhlK>>}Ah*~PL;WS7bo$u5&EmMxK8F1tc@ zrR*x%)v{}3b+T(^*U7Gz-5|SBc9U$WtX{TEwp@0z>=xOrvfE_0%kGffDZ5LyLUy<8 z9@)LJ`(*daR?1e%9*{jKdr0=M>=D^&*`u<@WRJ_%$exfrDSJxRAbVQ&jOr`A7sCi{a*H?><_X( z%Kjw#v+OUjzsmk5`@8HPvVY3{wa`iySqUO&jW#GnTeL%abifYih)(E?9kCO3Mi=aY zuIPqcu^YN$cl5v>=!reC7kZ&LqSzbzU|;NqKG+|9(GLgUKpcer7=VK@5DsE+5k~?^ zct|0Q3=YAeI1GbuI0j<~hT;ee!*GniNQ}a0jKPsO3P)os#$h}rU?PseBuvH>OvN-z z$FVpL$72Rgz==2s#s2%qB0vry@+iYhl;dQaf(pz+C8{tRr=oyr)L;%y!(7b6e4LIm za3;>e**FIaP>XYM9?pkw0WQQvScr>p2`*Wx-{j~j3! zZo*R3V;Pp?X54~XaT{*O9k>&BVFm8SJ-8S5;eM>dDm;J(@em%yBUp_`@faS*8a#m~ z@e~^HG@ik;cn)jvJl5d_yoi_ZGG4)}cnz=P4ZMl_!yty zQ*6LSe1^~Q1-`^4e1*;U8e8xUw&GiShi%x7@9_hEhu`Bz`~iQ&pYUh=1%Jig@OS(J z|HQva7FvYyM+B|W2Bm0=c4&_d*a02U37xSccEZl+f?d!R-LNZmLwD?s9@qmtu_yLI zFZ4zfdt)E$i~Z0C`=c-V;Q$5_#4(tJ$(Vwvn1<;%7RTXu%)kja5htP8e;-){ z$RR`?WtfR_oQzXYfmx_T6=vg96i|&C%)x1xi+Pxj({TpQ#925S=U@S9aW2lo`4BF^ zg}4X{aWO8zrC5Z^uoz2lIj+E!xC&R}8r0!hT!-s%18&4kSc-Zq!*bk=TW~9G!|k{O zcj7Lrz}>h9_u@X>kCj-32k;;s!ozq3tMMov!{bUiQMWb1 zMiP^vBWz+MM3{t=9b_^Gn_>iM6Wh z^8K}y<7#{JHSNdt=vx-=JjHQyK{ny!LdWs^bkcFMu9r%r{g|JKdrsclyryCE4fVsO zju_xNZel>vNhPOM6><{_VRdzM?(6|!{rcddNVlaM)fGI*Y;B5uwqt7Rwi(giEPfxW)g1P_Z>HuaN?dHsQ{tBC=P#vvzx=H1hw2Wt+khwFj#4h+^1Tgax7RWxbT2&LjfY z&E*0&84u#IWG<2NT|X6T5tek*ZgXL@(9h?~E6V+vaKP*ezb0Qlen!_w@A{2fw>8He z*A$zq?W4w_#n@_M;~6)fcHL|;n+noS7$jn`7(L5mV!1Hkx=zbjC+++yHXIwy%7%sd zi5*{#^l5JAiA_;n?Y?RpQjDr1ih6<|?rh{ZU%y|xHEtgFu^T~83$mhe* z&8EF{I-YA0M?>SyasORI&uOYMT{}{Zhj*aL+Bju$>?tbr;>lRb%f~#Lm&5@Aqhl(o!$M88st_GPTXWH&g_`nU4jURqhgDV9gq1a$7OmQH-Cdhkt=Y8n zlKR(H)kfOa+d*q1J(_!eQq!t3wJ|jgYFbqXR+S6l`CJ%FQB^iSI%&3FxA#}eyVWOG<;x5c3ml^UyC*$SgYj?r(DA>1pNFxvE*C$PO!`lM7Xq zL50sXQC<=Hh06Nn?`?}je;%Z^O^LCFsbxPzRy5iv@`kry}q8`CQg_l6fx(6Y;R++<8vQ`{i`j ze>QGQq*vXK6B~Q}dINq+N*9wx|B{qT<+Dl0&m~idFwAof{A@Ce1#W_=$ma9EDbYza zUo8JIX;f29nOaYcqneVsQd7+J*;g8xV*s3daesp_%`KKrrBf`U#a<^93AcXPO&3PG zckLgYRKai;s{2PL6soH7<&|YEFX*2}+$oOu$e%}?(-!gz5M&aWyq9vFR58+VUG9~9 aCLd3<40O}6Uz%9_+4(Q-%%&6O#QqNpww8VX delta 2844 zcmWmGQ zSUIg+R&FbgmDkE=<+lo01+79>VXKH$)GB5bw@O$)SS77eR%xq@Rn{tJmA5Kb6|G8E zWvhx+)v9Jyw`y25ty)%XtBzIIs%O==8dwdjMpk31iPh9B~X=Syx+E{I^ zc2;|SY54dR(Gq1)zj)_^|tz0eXV|0e`|m>&>Cb7wuV?ktzp)1YlJn@ z8fA^P##m!5TjQ+p)&y&!HOZQ6O|hn0)2!)Mh&98SY0a``TXU?r);w#zwZK|vEwUC{ zORS~VGHbcD!dhvqvQ}GbthLrUYrVC>+GuUEHd|Y)t=2YcyS2mGY3;IhTYId%);?>$ zb-+4k9kLEvN35e(sCCRbZk@1BTBoej)*0)pbX&AM*gux?tn ztlQQd>#lXrx^F$O9$JsA$JP_;srAfyZoRNxTCc3v)*I`s_0D>4eXu@SpRCW;7wfC_ z&H8TrX#HgUZ2e;WYW-&YZvA2XY5isWZT(~YYyCG-;ioD*0*HW!h=j-pLKH+rG(<-X z#6&E_MjXUNJj6!=Bt#+vBQcU7DUu;MQXnN#AvMwC&f7VXd;9ncY-&>3CO72VJsJMZw z7yZy5127PSFc?EH6vHqaBQO%9FdAbp7RES?#{^8oBuvH>OvN-zM+jzMCT3wa=3p-7 zVLldMAr@gVmS8ECVL4V{C01cI)?h8xVLdirBQ{|(wqPr^VLNtUCw5^s_FymeVLuMw zAP(U$j^HRlaSX?C0w-|_r*Q^naSrEk0T*!zmvIGGaShjT12=ICw{Zt|aS!+L01xp9 zkMRUg@eI%L0x$6juki+N@ec3t0Uz-RpYa7>@eSYcBYwiq_yxb>H~fx2@F)Jl-}ndr z;=k|{72y04KmKAwCiyArc`NiID_JkqpU^0x6LS zsgVY0kq+sR0U41AnUMuqkqz0A138fkxseBXkq`M%00mJ9g;4}WQ4GaV0zaT6N})8$ zpe)LvJSw0fDxor}pem}NI%=RMYN0mjpf2j6J{q7Q8lf?opedT6Ia;74!uD^4)@Xya zXovRbfR5;d&gg=!=!Wj-fu87v-spqA=!gCofPol3~(fsq)6(HMiVFvej# zCSW2aVKSy*DyCsNLNEg}F$=RX2XiqG^RWO6u?UN?1WU0D%drA0u?nlP25Yen>#+eF zu?d^81zWKV+pz;Xu?xGg2Yay(`*8pVaR`TT1V<5yV>pfzIEhm@jWallb2yI+xQI)* zj4QZ`Yq*XZxQSc1jXSuDd$^AWc!)=Mj3;=CXLybmc!^hdjW>9UcX*Evfg}1DSUo*T z@t|hm!alE|F+x5D1_t)U>p8GW_ + @@ -1979,6 +1979,126 @@

眈眈探求 | TITLE URL + + 9c0ae096f388c82eb7faf76ed0c8d372 + CVE-2024-6738 + 2024-09-20 09:25:45 + WisdomGarden Tronclass ilearn访问控制错误漏洞 + 详情 + + + + dc3fde14de7481140f79399ab73b5a33 + CVE-2024-6742 + 2024-09-20 09:25:45 + AguardNet Technology Space Management System跨站脚本漏洞 + 详情 + + + + 48a36ee635176f162204c1b448ae1af9 + CVE-2024-5630 + 2024-09-20 09:25:45 + WordPress Insert or Embed Articulate Content危险类型文件不受限上传漏洞 + 详情 + + + + 8c58ed60075db55f589cffee2b86883d + CVE-2024-5283 + 2024-09-20 09:25:45 + WordPress wp-affiliate-platform Plugin跨站脚本漏洞 + 详情 + + + + 53ccc9a7abd26488c929536e9a07f61e + CVE-2024-6289 + 2024-09-20 09:25:45 + WordPress WPS Hide Login Plugin信息泄露漏洞 + 详情 + + + + 392f822b5b7c80ec4111644991de4220 + CVE-2024-5080 + 2024-09-20 09:25:45 + WordPress wp-eMember Plugin任意文件上传漏洞 + 详情 + + + + cea6b67a894c22ddc253c315d47a2a71 + CVE-2024-5282 + 2024-09-20 09:25:45 + WordPress wp-affiliate-platform Plugin跨站脚本漏洞 + 详情 + + + + 9c054bd6b9423aa0214036acd5ed5e4b + CVE-2024-6398 + 2024-09-20 09:25:45 + Trellix Secure Web Gateway信息泄露漏洞 + 详情 + + + + a98663232623219ca5df99697d0c2ac6 + CVE-2024-5644 + 2024-09-20 09:25:45 + WordPress Tournamatch Plugin跨站脚本漏洞 + 详情 + + + + 02dcb40de006a8500b26748a1a4360f6 + CVE-2024-5075 + 2024-09-20 09:25:45 + WordPress wp-eMember Plugin跨站脚本漏洞 + 详情 + + + + 191eca5c949f672078d37022295f9f34 + CVE-2024-5281 + 2024-09-20 09:25:45 + WordPress wp-affiliate-platform Plugin跨站脚本漏洞 + 详情 + + + + 12aed07bad36e0f8d37ce83c38787d7f + CVE-2024-5442 + 2024-09-20 09:25:45 + WordPress Photo Gallery, Sliders, Proofing Plugin跨站脚本漏洞 + 详情 + + + + d7fb50ad574eefdc3ab5e1c24db5bff1 + CVE-2024-6072 + 2024-09-20 09:25:45 + WordPress wp-cart-for-digital-products Plugin跨站脚本漏洞 + 详情 + + + + 92f54b211c471aff0afdba05f6ce43e0 + CVE-2024-6076 + 2024-09-20 09:25:45 + WordPress wp-cart-for-digital-products Plugin跨站脚本漏洞 + 详情 + + + + 537bae0272bcf245f2a09d5627563c11 + CVE-2024-6743 + 2024-09-20 09:25:45 + AguardNet Technology Space Management System跨站脚本漏洞 + 详情 + + 6e6736ceb6fd9c2513a8a4bfe40c922f CVE-2024-4486 @@ -2099,126 +2219,6 @@

眈眈探求 | 详情 - - edc749f611df8ee46168dcd8c146052b - CVE-2023-7045 - 2024-09-19 03:24:15 - GitLab CE/EE信息泄露漏洞 - 详情 - - - - 1f9ce89a257d7c17292f3fa5ba074348 - CVE-2024-1815 - 2024-09-19 03:24:15 - WordPress plugin Spectra存储型跨站脚本漏洞 - 详情 - - - - 372297861d97284eb1cc60fd6cf2777f - CVE-2024-5811 - 2024-09-18 03:24:15 - WordPress Simple Video Directory Plugin跨站脚本漏洞 - 详情 - - - - f8c51e5acdaa19b0b4e7be22760cacaf - CVE-2024-5626 - 2024-09-18 03:24:15 - WordPress Inline Related Posts Plugin跨站脚本漏洞 - 详情 - - - - c6e28282acee907e143459d9628e67cb - CVE-2024-39532 - 2024-09-18 03:24:15 - Juniper Networks Junos OS和Junos OS Evolved敏感信息插入日志文件漏洞 - 详情 - - - - c95b0c6e90f216abeb86b132f8fe45d2 - CVE-2024-39537 - 2024-09-18 03:24:15 - Juniper Networks Junos OS Evolved目标端点通信通道限制错误漏洞 - 详情 - - - - 70ea49d3ab0a137a902663295f55ea69 - CVE-2024-39535 - 2024-09-18 03:24:15 - Juniper Networks Junos OS Evolved异常情况检查错误漏洞 - 详情 - - - - 5b9cda29ad3fd50b913a9e86ea93349d - CVE-2024-39543 - 2024-09-18 03:24:15 - Juniper Networks Junos OS和Junos OS Evolved未检查输入大小缓冲区复制漏洞 - 详情 - - - - 976446acefd621a0afa53d38f29956ce - CVE-2024-39542 - 2024-09-18 03:24:15 - Juniper Networks Junos OS和Junos OS Evolved输入句法正确性验证错误漏洞 - 详情 - - - - 02e220d43a4d6354894b188d659f4eb2 - CVE-2024-39549 - 2024-09-18 03:24:15 - Juniper Networks Junos OS和Junos OS Evolved有效生命周期后内存释放缺失漏洞 - 详情 - - - - 65dad71f91b32c0e06d8a04eccca20a6 - CVE-2024-4753 - 2024-09-18 03:24:15 - WordPress WP Secure Maintenance Plugin跨站脚本漏洞 - 详情 - - - - 1eda546bb27d0ab2dbd79f1790d19779 - CVE-2024-6485 - 2024-09-18 03:24:15 - Bootstrap跨站脚本漏洞 - 详情 - - - - 4f2a7f0221f25a37ed9e5481dcb814b1 - CVE-2024-39536 - 2024-09-18 03:24:15 - Juniper Networks Junos OS和Junos OS Evolved有效生命周期后内存释放不足漏洞 - 详情 - - - - 7c28457de014935ef417c939a04fbb0c - CVE-2024-39552 - 2024-09-18 03:24:15 - Juniper Networks Junos OS和Junos OS Evolved异常情况处理错误漏洞 - 详情 - - - - 111cf6ea96b1885fd5f42b0aed0499f4 - CVE-2024-39538 - 2024-09-18 03:24:15 - Juniper Networks Junos OS Evolved未检查数据大小的缓冲区复制漏洞 - 详情 - -