From ad3aae5a3e74c87aadffdfe069698f4f1037de4d Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sat, 9 Nov 2024 18:28:17 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 ++ data/cves.db | Bin 50032640 -> 50036736 bytes docs/index.html | 212 ++++++++++++++++++------------------- 3 files changed, 116 insertions(+), 106 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 3dbfea61a2a..93ba8a07830 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -152,3 +152,13 @@ d93887194d87e136fd99ff01f2a012ad a0358b53fefd8a9f3d0ae8a1a77cf023 25715653071e7c2363dc1d124774cb0c d136c3a44dc497b760ed58a6191ce636 +8acae6675b2cd95a5ab08aa2a45e6efa +01a18ae828c51cfa6e05ccf9d37bd6ff +a89524063ca3b41c880ff4f2f9d09b62 +60a90e99a537b98120e1f5ab9610e6e8 +06db9891eee9dd23bbbd82c6db567680 +de738c57d6c8fcf4fb8f60f1268828f4 +c6194bae065b996647f147c162a38fb7 +59dd43a4cb2d1bda0017821f878a41c6 +a3e31e3b9e87bc6b56ff361c4b1016bc +d20e5030155fed12656c82a4a1a7d386 diff --git a/data/cves.db b/data/cves.db index e29b2c2c99741cb5421914e8c5be6ab7636068f6..34ea5a3427262697667ef80178bb18a32444810c 100644 GIT binary patch delta 5391 zcmciEcXU+M76x$Uq|iby0YVu-nwT(m%AFZR6c9w|1OxOh2m(^9&-YD$xAckYt)=h1KYlyOnVBAU24C#6jXA36MlcMMxz`Wk?lBRY($~8l*a;2BapW z7Nj<$4x}!m9;7}b8PWjK5Yh;e0%;6s0%;0q2C+k$Ls~#uLaufH)u;#0hah+z<~$hj<}Ah#%4say6tAAO?L%KtH zKyHBagxmTP2l6gtBV-fg zJ;-Lr7RXk}Hpq6!`;ZSHJ0LqDA3{EY?1Joud<@wG*$XL!?1Suwd;<9tQU*ByIS4rf zISly>@;T%S$d`~Kkgp&|Azwp|LB4?;hn#?X3poin1vw4*4sr%^7IF@99`Zfp2gr|* zpCCU&eu4Z0^6M0_O%od_ilcZ+phT)jm8ddRp{kTb)u=kvpqf;RYEvDmOZBKeB~t@x zNR23k8dDQ$O3lbl&8Y>oq${WuwWc=ImfF#k)Sj-QR7#@`P=JCIB9p>2iZUpZMpG7LQx4@)9_3R3MJP&zG=|2~IJ%w2(*(MM z?xefuZkk9%G>IltF_jSL9=ezAqbW3%?xzQ68cnAeG?Ql0gY*zROpnl`G@Bly$LR^0 zLr>CNnnxBrMf2%tdWIIzv-BK2PYY=gy+AM0OSG6?rX{qLmeDJ;oL;5Z=yh5_E9nh- zlUC7Nw3^n?T3SczX#>4Y@6fxnkv7qLw3)WhR@z3}>3#ZucF<1xkUpYaw3|MrJ+zlf zX&>#UPv}!BqXTr14$)!yj6SC?=u0|6U(r$envT&obevAmw{((D(P{dQ&d^ypN9XB# z`hk9=pXg`$h5kXm+NOx&@h3%b6i*41NEN9PRi-Lbm6E6$Ri_$MlWI|IszY_D9@VF0 zYCsLC5v5RLYC=t^8QG~hwV;-C1+}8q)P~wpJGzqE(^Zs8Y1Dxnq>+QxCd~Kk82dXdtE2AR0_J(-0a; z!{`@1oQkX_j24&J{%A#z_pr_tJedg{IQ|^Z-qx=`@38(kyzA9-@co5qgwn(_{2F zJwbEmNt#RZ$fBocK0Qs(&;ojvo}=e!AuXa8=tX*o7SqeLgqG4WdWDwLtMnSZPAh07 zy+Lo%Dte1n(;8Y!>u5b~pttEAdY3lRCVG!H(-zuF+h{wzPan_@+DRYMN3@G})5o-j z_EIVBqy6*=eM)6?fDY0jI!vF@=kx`ANk`}_I!a%w)pATNm{Dm`+}sMWe_od)%{->! zRE^1Nt3Py1&8f1YR?%boZ3!J#plsBPDb_K?@J%cnkA)Ml@NF!djD=INa5@&gi-j|> za5fgs#lrbm_&yeXP-~}HKdL*{)vRc1QK5Q%Qtis?Dh`Z47?-r7=5?d0+fs{7eqEJ5 zsqH4`xF+WqA=B&f1wG!79`uESVRty-3+s-s=G1*Yr_UO2&sLQZ@6mLZHEVC0@-#Lg zQG0qY!_3XH4>Y6sdAZTdv8KI8c4jauVp$E&s5EQ%cl%V;#EV1g8=g^3to-!DD!#VU z;dG~JTB^fu*W4X7Pe;u<)O)FNH|hP?XKm+ujwrSHaumZRrB6>rn6f@vL;r&+fQBWgxmPPe^>X%vo$m?3-r zyl7!8*+^b?wl%BYN!6y#WnQx8Z(XD6*K>N({w%$}JGW(STBX`*%+u{H$w8SJ%d>cl zt9Xo|I}E?W^!p8u%gcl{r^D339wXq_HHT>(JhMkNiPLo5YTj(QYHXeKo>b}9j7c?Z z2`R=nGhk0I923gSvvzMa{c@R} z8vKLGwWf3K#J@4OwQEVbYGoC<_o;*qy0at`WufwH3tYtohT-#joNkBi3L36}TMPPp zjxa0M8TN-9{(!Y?`X?7^Rkuz>$EeQp__U6OT_Y^bs1e9E?Z5dooENcjx0I@6YwpOc zs%iCqduiY1QgubLp62oYX|8``Vx_0e);{{6^`$&rC4Ep9EYEYWt9Y>C& zS>0VS3}u1xqzzXw_tpp+rmlNE0cSAe_ZX~VhtDvahTCK6=IldTyIo8=PS-C!kafP- zP}SP1H)0`cM)e-58d+zXE?0FLxYE47%WT|#_*fi2X3c-4RJBQnJ)m!Ge(q0drmaRb zcJKJawiT-7R(ZKnr^L0jYF4%-$E~pQW{XQLse!Vr@+^{F#mPp9C(z??IW&(aY=+oH zJ?yK@!O#qE$YmM&rVAzNv;K_Vez+agu(fXeAwTiVCrz_T4Mwe$&-dYTo z>C#MBz;F7zfuPRD84kO2E$9wt4$X3OI-wfJ@pIOI$OhG99!k|fPcOp^vB=Dby-Rst z>6Vw1Z$vVqdAau9nT4j^h>fNO|23ML%~7j)`!lL-QmhYMdcU=J!BN$yzAMdrnN74} z>0UV7|K%^VxvVbFZ&z&{vE}gMYLsQhmZPMbtE8LZ;XUGZ8SY@f8PWnF!{N}pKBpG; zd3}au49VsRD!)+Tbl#ff$E9EQ3F9xEzKe%1YX9TN?~kWFeSEag%(>W#?M8NX-ngj! z`hI;()tgRUUmv==iYNX4*B)Zs47XnyK&2x&)RW*pVIpNVXpuC1IBKY zcI6B1Lp79TlrMNaS4ll1sB372Zjickm(tx*(hZ8v^YG36 zzQ*{+*kNJMlZ4%VmSkdz$gLwp$hmD&+L9ry2g?ev0#-yTk`>vCVnwy0S<$T+R!l3F z72686;#hI5cvgHXftAooWF@weSV^s9R&pzamC{OOrMA*oX{~ftdMktVjg`^LWM#I# zwX#@Qt!&nJR(30gmD9>)<+k!zd98d_eyf00&?;mVwu)FqtzuSjtAth3DrJ?n%2;Ks za#ne(f>qI~WPNW{wyIcFt!h?vtAnrItxi^FtBcju>Sq0Hb+>w0zgRu3URH0bkJZ=e zXZ5!RSOcv=R+u%|8e$E#hFP|TTO+KI)+lSVHO3lijkCsE6Re5WBx|xY#hPmUYE83# zv!+`!teMsX&t+Uo!8?24i zCTp{`#oB6Zv$k8mTRW_s)-G$ewZ{s#_FDU_{ni2NpmoSPY#p(VTF0#8)(PvRb;>$z zow3eZe^`H7=dAPA1?!@9$+~P^v94Oztn1bd>!x+fx^3OD?ppV(`_=>NFYBT8$a-u& zv7TCgThFZL)(h*U^~!o}y|La}@2vOM2kWEt$@*-4vHr3CwZ2;ajZ(-sg&=^4h=j<9 zf~bgw=!k)sh=te)MI6LMJj6!=Bt#-4MiL}NG9*U|q(myDMjE6=I;2Mie1nY0gv|IB zS&$Xk@Ex)v2XZ18aw8A&A|LXj01BcI3Zn>$q8N&!1WKY5N}~+Qq8!Sj0xF^szDH$L zK~+>kb<{vj)WQ#_jXJ1{dZ>>EXow&26B?m0nxH9y`!_>#v_MO=LTj`^TeL%abU;UR zLT7YAS9HVA=#C!v1wGLVz0n7K(GUGG00S`yVHk`d7>Z#qhGPUqViZPW48~#{#$y5| zViG1}3Z~*$Ov7)Ojv1JVS(uGEn2ULsj|EtWMOcg_Sc+v>julvmRalKRSc`R7j}6#} zP1uYr*otk~j^D8ZJFyG9u?OMUi+$LS12~97IE*7WieosA6F7-eIE^zni$Cxu&fz>R z;36*JGOpk%uHiav;3jV2Htygq?%_Tj;4eJHBRs|vJjLI5hUa*Jmw1KOc!Rfihxhn^ zkNAYo_=11%FTUcxkWmV7{se247Fft<*N+{lBx$cOwWfPyH5!YG2G zD2C!Ffs!bN(kO$nD2MW>fQqPu?@<|5P!-is9W_uBweSOKqYmn#9_ph38sbO%ghptL zCTNP_{>{)FEzlCJ&>C&f7VXd;9ncY-&>3CO72WVNx}yhvK~MBTZ}dT5^h19Pz(5Q_ z7zSeqhGH0u;TVCD7=_UogRvNg@tA;#n1sogf~oiw)9@RnV+Lko7G`4(=3*Y^V*wUo z5f)_Is8VjuS701o01 z4&w-p;uwzO1Ww`sIV W_V%KXXi?S$pGe_dJAVmG4EZ0iXk~5y diff --git a/docs/index.html b/docs/index.html index f9acddcbe46..9ef453792cf 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 8acae6675b2cd95a5ab08aa2a45e6efa + CVE-2024-51668 + 2024-11-09 14:15:18 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mark Tilly MyCurator Content Curation allows Stored XSS.This issue affects MyCurator Content Curation: from n/a through 3.78. + 详情 + + + + 01a18ae828c51cfa6e05ccf9d37bd6ff + CVE-2024-51664 + 2024-11-09 14:15:18 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mark Kinchin Beds24 Online Booking allows Stored XSS.This issue affects Beds24 Online Booking: from n/a through 2.0.25. + 详情 + + + + a89524063ca3b41c880ff4f2f9d09b62 + CVE-2024-51663 + 2024-11-09 14:15:17 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bricksable Bricksable for Bricks Builder allows Stored XSS.This issue affects Bricksable for Bricks Builder: from n/a through 1.6.59. + 详情 + + + + 60a90e99a537b98120e1f5ab9610e6e8 + CVE-2024-51662 + 2024-11-09 14:15:17 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Modernaweb Studio Black Widgets For Elementor allows Stored XSS.This issue affects Black Widgets For Elementor: from n/a through 1.3.6. + 详情 + + + + 06db9891eee9dd23bbbd82c6db567680 + CVE-2024-51647 + 2024-11-09 14:15:17 + Cross-Site Request Forgery (CSRF) vulnerability in Chaser324 Featured Posts Scroll allows Stored XSS.This issue affects Featured Posts Scroll: from n/a through 1.25. + 详情 + + + + de738c57d6c8fcf4fb8f60f1268828f4 + CVE-2024-51630 + 2024-11-09 14:15:17 + Cross-Site Request Forgery (CSRF) vulnerability in Lars Schenk Responsive Flickr Gallery allows Stored XSS.This issue affects Responsive Flickr Gallery: from n/a through 1.3.1. + 详情 + + + + c6194bae065b996647f147c162a38fb7 + CVE-2024-51629 + 2024-11-09 14:15:16 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MetricThemes Header Footer Composer for Elementor allows DOM-Based XSS.This issue affects Header Footer Composer for Elementor: from n/a through 1.0.4. + 详情 + + + + 59dd43a4cb2d1bda0017821f878a41c6 + CVE-2024-51628 + 2024-11-09 14:15:16 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in EzyOnlineBookings EzyOnlineBookings Online Booking System Widget allows DOM-Based XSS.This issue affects EzyOnlineBookings Online Booking System Widget: from n/a through 1.3. + 详情 + + + + a3e31e3b9e87bc6b56ff361c4b1016bc + CVE-2024-51627 + 2024-11-09 14:15:16 + Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kaedinger Audio Comparison Lite audio-comparison-lite allows Stored XSS.This issue affects Audio Comparison Lite: from n/a through 3.4. + 详情 + + + + d20e5030155fed12656c82a4a1a7d386 + CVE-2024-51623 + 2024-11-09 14:15:16 + Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mehrdad Farahani WP EIS allows SQL Injection.This issue affects WP EIS: from n/a through 1.3.3. + 详情 + + ffb28ce8cc9e5f6f5c4556e8fd2a2945 CVE-2024-50592 @@ -366,7 +446,7 @@

眈眈探求 | + 2024-11-07 14:15:16 A flaw was found in moodle. A local file may include risks when restoring block backups. 详情 @@ -374,7 +454,7 @@

眈眈探求 | + 2024-11-07 14:15:16 A flaw was found in Feedback. Bulk messaging in the activity's non-respondents report did not verify message recipients belonging to the set of users returned by the report. 详情 @@ -382,7 +462,7 @@

眈眈探求 | + 2024-11-07 14:15:16 A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators. 详情 @@ -390,7 +470,7 @@

眈眈探求 | + 2024-11-07 14:15:16 The bulk message sending feature in Moodle's Feedback module's non-respondents report had an incorrect CSRF token check, leading to a CSRF vulnerability. 详情 @@ -398,7 +478,7 @@

眈眈探求 | + 2024-11-07 14:15:15 A vulnerability was found in Moodle. Insufficient capability checks made it possible to delete badges that a user does not have permission to access. 详情 @@ -406,7 +486,7 @@

眈眈探求 | + 2024-11-07 14:15:15 To address a cache poisoning risk in Moodle, additional validation for local storage was required. 详情 @@ -414,7 +494,7 @@

眈眈探求 | + 2024-11-07 14:15:15 A flaw was found in pdfTeX. Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available, such as those with TeX Live installed. 详情 @@ -422,7 +502,7 @@

眈眈探求 | + 2024-11-07 14:15:15 A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions. 详情 @@ -430,7 +510,7 @@

眈眈探求 | + 2024-11-07 13:15:03 The Prime Slider – Addons For Elementor (Revolution of a slider, Hero Slider, Ecommerce Slider) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Blog widget in all versions up to, and including, 3.15.18 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 详情 @@ -438,91 +518,11 @@

眈眈探求 | + 2024-11-07 12:15:24 Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available. 详情 - - 79d49ef2f313af6919e109f93a01feed - CVE-2024-10915 - 2024-11-06 14:15:05 - A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. - 详情 - - - - a4e15b9b37cf8a02674c23e131c47b4e - CVE-2024-10914 - 2024-11-06 14:15:05 - A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been declared as critical. Affected by this vulnerability is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument name leads to os command injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. - 详情 - - - - 1f5ed7070d858b5aa1919172fe9d2259 - CVE-2020-11859 - 2024-11-06 14:15:04 - Improper Input Validation vulnerability in OpenText iManager allows Cross-Site Scripting (XSS). This issue affects iManager before 3.2.3 - 详情 - - - - d81e24fcf3fc784cd82ae503d550e16a - CVE-2024-10186 - 2024-11-06 13:15:03 - The Event post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's events_cal shortcode in all versions up to, and including, 5.9.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 5c14ac8ca0b71cf5099809ead136b4a5 - CVE-2024-8323 - 2024-11-06 12:15:03 - The Pricing Tables WordPress Plugin – Easy Pricing Tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘fontFamily’ attribute in all versions up to, and including, 3.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - d6199c3917ceccb46b833c759d0e3ed4 - CVE-2024-10168 - 2024-11-06 12:15:03 - The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woot_button shortcode in all versions up to, and including, 1.0.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - ceed1404a28bd4eda818d878edf1022f - CVE-2024-10715 - 2024-11-06 11:15:03 - The MapPress Maps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Map block in all versions up to, and including, 2.94.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 5f32614d5e657a2c2ccd46c1900ba570 - CVE-2024-9902 - 2024-11-06 10:15:06 - A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner. - 详情 - - - - 987a8a67383c6f0c755899642b53119f - CVE-2024-8615 - 2024-11-06 09:15:04 - The JobSearch WP Job Board plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jobsearch_location_load_excel_file_callback() function in all versions up to, and including, 2.6.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - 详情 - - - - fef53f315f6566aae46121c475b1d36b - CVE-2024-8614 - 2024-11-06 09:15:04 - The JobSearch WP Job Board plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jobsearch_wp_handle_upload() function in all versions up to, and including, 2.6.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. - 详情 - - @@ -2102,7 +2102,7 @@

眈眈探求 | + 2024-11-07 09:22:22 WordPress Preloader Plus – WordPress Loading Screen Plugin跨站脚本漏洞 详情 @@ -2110,7 +2110,7 @@

眈眈探求 | + 2024-11-07 09:22:22 WordPress Customizer Export/Import Plugin任意文件上传漏洞 详情 @@ -2118,7 +2118,7 @@

眈眈探求 | + 2024-11-07 09:22:22 WordPress Preloader Plus – WordPress Loading Screen Plugin跨站脚本漏洞 详情 @@ -2126,7 +2126,7 @@

眈眈探求 | + 2024-11-07 09:22:22 WordPress Forminator Plugin跨站脚本漏洞 详情 @@ -2134,7 +2134,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Backup & Replication远程代码执行漏洞 详情 @@ -2142,7 +2142,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Service Provider Console代码注入漏洞 详情 @@ -2150,7 +2150,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Backup & Replication证书验证错误漏洞 详情 @@ -2158,7 +2158,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Service Provider Console输入验证错误漏洞 详情 @@ -2166,7 +2166,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Service Provider Console代码注入漏洞 详情 @@ -2174,7 +2174,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Service Provider Console代码注入漏洞 详情 @@ -2182,7 +2182,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Backup & Replication不受信数据反序列化漏洞 详情 @@ -2190,7 +2190,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Backup & Replication路径遍历漏洞 详情 @@ -2198,7 +2198,7 @@

眈眈探求 | + 2024-11-07 09:22:22 Veeam Backup & Replication服务器端请求伪造漏洞 详情 @@ -2206,7 +2206,7 @@

眈眈探求 | + 2024-11-07 09:22:22 WordPress Opti Marketing Plugin SQL注入漏洞 详情 @@ -2214,7 +2214,7 @@

眈眈探求 | + 2024-11-07 09:22:22 WordPress WP MultiTasking WordPress Plugin跨站脚本漏洞 详情