Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed May 24, 2024
1 parent d4f3192 commit 09b2349
Show file tree
Hide file tree
Showing 4 changed files with 91 additions and 181 deletions.
100 changes: 0 additions & 100 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
@@ -1,103 +1,3 @@
1d612b5d9b334025f3eb5f91409907e8
d8aae0232e0b189f9ba888fe814922da
372463a94e1d5fe3c343674a3c776bc9
9f4bf542daa34c4c8b2afa766f89f192
72524c352538d4cbd386950538041b79
8324f88bb4fbdeb97913b3f963f38351
c93de76447470170767c38879878171e
442bd060b9017faa5ad9b72586212620
3174e95ce7339a583d0e30ad2108db47
4ef167b6fef6989a2c066b3a7911961e
95f8e1748c3ea75de37e46e40f7fbedd
a6003c22fe3307d7e47259dc427896d8
f97cd10abb522f9515be8deead13986d
fc06e3211796c6af5995436ec9470367
fea55d0044e00bcf781783b24fb975ae
fef48718a95a5b18e7c523d6d900c1a6
9bb7fcd360c05b6a2d09ff6ded2a86c3
69bee8ea0697c8d0ca99a644f77839eb
3c5dbd90e3681988881f26d42bd3de19
d788275437768f6e544faf438e93c333
84ee839ac755c8afce6fe898b70bebc0
cb9b4a749a481528437d5b3c0bb9a459
de60790d65abaf2d9a020e3a49571a64
f91b6dc5f2c2e75a48eea4f6a2bdc07e
98643a962072386497c24f7b7fc5d066
fb46aa5c7c0fc2dae84082848fb93c15
c57b8ad780ac74dbf149c337dd961265
45e3b8a6c019f8452eb6df1b0f705954
e2ca0d0f8d54ae5d8578e943c0eaba77
c824b0f47eed43dbe9ec6cbb6321c6ff
3adddc9f94a3615441d8789d61f7d374
faaf7e6c657c136249491dce25b4ac0a
aecd479845154156ae99d911d2f13bb0
99e34186e21f8725b0e8d774429137a9
925dbdb885a8c175158cda828ef7d6d3
d90f32b63cbf69b7717f9ead350a9650
8f5054d0ca8fc312977bcb9f463d6c71
4554e1a1c0cc628301f85ed05ef9b533
c6b789d2daebdd0107d76ce851412e76
dc752ef1635b22b95445fc0d1ecc2692
d207a4e2d0572b04b1861a9fbf6804de
1d7cef51edf69c03e6b4e298e78c3ad8
6f649462cec69991bac1f59783a79cc7
01496d22597f7f2ba03346c3802da560
7019a605292d20d1e3e0cf86692cd330
fce98552f90d81f41eba51c47e95ee5a
55c03196dff4f6d7036fda85dd09a367
950c630ab689d7dcf08efe2992c3f5c4
033cc38b4bbe36fa945d49ee4fd85f47
5142103950f74d4824886fb69b0cc93e
3808923b5207bd1ef3a5557370544623
e2fff6f2d18fcd198e675b080367997b
8a6393d6a80f5990e8fa5b2c77264df1
1308655751d0b4d62fc37eb8639ca9b3
a55b3cce4b50117387e9511e4cfe0029
e6847d627748ab2383098fb975ef0a0a
0c6405a23b798cf58808495030650d82
e7d481e4a23dda9731f1181803d85c2e
c9bae96904ba5ad6bd1f2c2d4dac14c0
f541941dab2d3e7d66450dd7ebe2b692
1a391ab56e4add3090517ce6a2fa7ec4
83c932e39982965b162d99f938e7306c
68ec1711d8a162236b54788ffcc8c913
1b3a7d31634519023277ca2c2b410ff3
1255766973fe39d5d37c1504c724fe49
a1cdde1f840769cc5b86c8a7ba2b2e29
248124d1809cff6be897bbd26caba51b
4e78bceb96f802c3b022260928abd4e9
dedfd85aaf1436bca249cf8313089538
81f458f8338c86f1575a3257e2e0c0cd
ed806e89a400adf2e5c5d1bb7fab3b3e
270401ba46347583bd94a97a8725fef0
8c8db8e2b2b392cd3b035d64fba368cc
3899014a79a1da5d0c1f672bed93b047
69b891fe128c0dc1e2b88ba7f67d0923
f7c1d17ff66b7e990414e3fc3f8681f9
1102dc6f2bb1f2ff0efc5455b7b2b328
bede3420942a22c910c40880f51661d1
cc1fe8727ca428ef510167a3e432c11a
670973c1a1638765892d45c9a94d6e6a
a22cd5236c06fd4130a3335f5df86458
91db6c7f8a20a831a873ad406a395493
1eb9f5784317727ceef31df037e924e8
0b7fabce5aeb8934dd413b4183258f24
c5069b3acdacdc10e2a9548ea72b44a5
814af62ffac6b324a66cf93a5d68868e
35f49cdb5f417a3d41900839ee213048
49760ffcc671d7b61021f3822d3703f4
a61d325a64a5062305dcbda0e097911b
10c07fb68d3f28be0dae07b776864cba
21004ef49e9809f09284d5926bd3e7b1
2f3cb2238c53a639e0ea9f78ce4f6b86
89058d042aa39b60873646e12bea1870
0fdaa9a83de1365c6a58ff7b793bef64
5078a40bfecfff22d63b729fbd29802d
d42692e98afd2bb62bdd8c38b781b06b
e997b50b35465c41a570e09101c8a20a
9ba029b1d7a9088770e21bf626fbeb5d
7400e52c3f825a24291d4a63f754a42c
6b70537ebbea79ada368b7da9704d900
11ef031ab4f7660270b264b1dea1de8f
6c5628212721fa72c9b52dab3640b64f
642d628a907e05c88b54df143a9e9d28
Expand Down
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -187,3 +187,13 @@ ff2b61015056d648e003d93e248bd310
894d5d9161dea6df0d1bbf00cdbde0d6
2ce48c355a261b41ae64d9c8d853914d
0da7eddf13c3953739e9d3661472af76
63980e84e9a6a05782ca50d4b3984f28
aa0bebdd3b3ffdaf189d51c378f02422
debfeef1d9807a5e7093626d7e47c26b
9304a93de58b2078e71e5cead83086bf
d8fad35e8d05cb565142d21478cf31ec
b7aabb8df29778336badc3207cb0947d
d04c51262bba3b50b37af105eb862484
fc011897f15bd4a27d029bcddcc009e1
f19af93d7c1d7030c96333b968ac6874
c2e1a73c5f37a4b958e0c3ec32e80a1b
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-05-24 09:21:55 -->
<!-- RELEASE TIME : 2024-05-24 12:36:44 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>63980e84e9a6a05782ca50d4b3984f28</td>
<td>CVE-2024-5315</td>
<td>2024-05-24 10:15:11 <img src="imgs/new.gif" /></td>
<td>Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1 and allow SQL injection. These vulnerabilities could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in the database through the parameters viewstatut in /dolibarr/commande/list.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5315">详情</a></td>
</tr>

<tr>
<td>aa0bebdd3b3ffdaf189d51c378f02422</td>
<td>CVE-2024-5314</td>
<td>2024-05-24 10:15:10 <img src="imgs/new.gif" /></td>
<td>Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1 and allow SQL injection. These vulnerabilities could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in the database through the parameters sortorder y sortfield in /dolibarr/admin/dict.php.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5314">详情</a></td>
</tr>

<tr>
<td>debfeef1d9807a5e7093626d7e47c26b</td>
<td>CVE-2024-5310</td>
<td>2024-05-24 09:15:09 <img src="imgs/new.gif" /></td>
<td>A vulnerability classified as problematic has been found in JFinalCMS up to 20221020. This affects an unknown part of the file /admin/content. The manipulation of the argument Title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-266121 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5310">详情</a></td>
</tr>

<tr>
<td>9304a93de58b2078e71e5cead83086bf</td>
<td>CVE-2024-4037</td>
<td>2024-05-24 09:15:08 <img src="imgs/new.gif" /></td>
<td>The WP Photo Album Plus plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.7.02.003. This is due to the plugin allowing unauthenticated users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4037">详情</a></td>
</tr>

<tr>
<td>d8fad35e8d05cb565142d21478cf31ec</td>
<td>CVE-2024-4366</td>
<td>2024-05-24 08:15:09 <img src="imgs/new.gif" /></td>
<td>The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘block_id’ parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4366">详情</a></td>
</tr>

<tr>
<td>b7aabb8df29778336badc3207cb0947d</td>
<td>CVE-2024-5060</td>
<td>2024-05-24 07:15:10 <img src="imgs/new.gif" /></td>
<td>The LottieFiles – JSON Based Animation Lottie & Bodymovin for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.10.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5060">详情</a></td>
</tr>

<tr>
<td>d04c51262bba3b50b37af105eb862484</td>
<td>CVE-2024-4485</td>
<td>2024-05-24 07:15:10 <img src="imgs/new.gif" /></td>
<td>The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘button_custom_attributes’ parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4485">详情</a></td>
</tr>

<tr>
<td>fc011897f15bd4a27d029bcddcc009e1</td>
<td>CVE-2024-4484</td>
<td>2024-05-24 07:15:10 <img src="imgs/new.gif" /></td>
<td>The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘xai_username’ parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4484">详情</a></td>
</tr>

<tr>
<td>f19af93d7c1d7030c96333b968ac6874</td>
<td>CVE-2024-1376</td>
<td>2024-05-24 07:15:10 <img src="imgs/new.gif" /></td>
<td>The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing capability check on the save_bulkdatas function in all versions up to, and including, 5.9.4. This makes it possible for authenticated attackers, with subscriber access or higher, to update post_meta_data.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1376">详情</a></td>
</tr>

<tr>
<td>c2e1a73c5f37a4b958e0c3ec32e80a1b</td>
<td>CVE-2024-1332</td>
<td>2024-05-24 07:15:09 <img src="imgs/new.gif" /></td>
<td>The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1332">详情</a></td>
</tr>

<tr>
<td>246b67011ccbf949b51bffe9222cd19b</td>
<td>CVE-2024-5165</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-6487">详情</a></td>
</tr>

<tr>
<td>d9dc5ae771dc73389d5b3419c30f3e56</td>
<td>CVE-2024-4710</td>
<td>2024-05-21 07:15:09</td>
<td>The UberMenu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ubermenu-col, ubermenu_mobile_close_button, ubermenu_toggle, ubermenu-search shortcodes in all versions up to, and including, 3.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4710">详情</a></td>
</tr>

<tr>
<td>3399efc0630018bd9dc65d218a6be7ef</td>
<td>CVE-2024-4470</td>
<td>2024-05-21 07:15:08</td>
<td>The Master Slider – Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ms_slide_info' shortcode in all versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied 'tag_name' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4470">详情</a></td>
</tr>

<tr>
<td>94db21df623036e3a559745e55a18630</td>
<td>CVE-2024-4442</td>
<td>2024-05-21 07:15:08</td>
<td>The Salon booking system plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 9.8. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4442">详情</a></td>
</tr>

<tr>
<td>94743c24ee9a6e282c61a71742b2f1b1</td>
<td>CVE-2024-4372</td>
<td>2024-05-21 06:15:10</td>
<td>The Carousel Slider WordPress plugin before 2.2.11 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4372">详情</a></td>
</tr>

<tr>
<td>cc602fb919e58f614ab2d6b27dff10fa</td>
<td>CVE-2024-4290</td>
<td>2024-05-21 06:15:09</td>
<td>The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4290">详情</a></td>
</tr>

<tr>
<td>345b189f38bfbf6c7df407b72d35d701</td>
<td>CVE-2024-4289</td>
<td>2024-05-21 06:15:09</td>
<td>The Sailthru Triggermail WordPress plugin through 1.1 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4289">详情</a></td>
</tr>

<tr>
<td>08cd3597b1ac68f7748d30e8be3565d0</td>
<td>CVE-2024-4061</td>
<td>2024-05-21 06:15:09</td>
<td>The Survey Maker WordPress plugin before 4.2.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4061">详情</a></td>
</tr>

<tr>
<td>4c38463727091c98d30199e330a66cb8</td>
<td>CVE-2024-2189</td>
<td>2024-05-21 06:15:08</td>
<td>The Social Icons Widget & Block by WPZOOM WordPress plugin before 4.2.18 does not sanitise and escape some of its Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2189">详情</a></td>
</tr>

<tr>
<td>e8779502d062642aedde6e054ebe7deb</td>
<td>CVE-2024-4943</td>
<td>2024-05-21 03:15:08</td>
<td>The Blocksy theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘has_field_link_rel’ parameter in all versions up to, and including, 2.0.46 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4943">详情</a></td>
</tr>

<tr>
<td>c9b7a081927e55578f5d4fb556e24ff1</td>
<td>CVE-2024-3155</td>
<td>2024-05-21 03:15:08</td>
<td>The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in all versions up to, and including, 2.2.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3155">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 09b2349

Please sign in to comment.