Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 10, 2023
1 parent 4d7604b commit 14bf7ba
Show file tree
Hide file tree
Showing 3 changed files with 29 additions and 27 deletions.
2 changes: 2 additions & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -188,3 +188,5 @@ b95b9e70cb6800ca35fe741b43ec3125
6f158425cbcecf25b03a1e6a982fbf55
6f6501d87401a3e4c6520a7fe54cd29f
382b80b4e9916920027cd6bc06f93ff4
add7d3a6eeb12c794c74dd3e9e6da963
b784ffad3e8ff5657315285c2aac5c17
Binary file modified data/cves.db
Binary file not shown.
54 changes: 27 additions & 27 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-10-09 23:22:21 -->
<!-- RELEASE TIME : 2023-10-10 05:25:48 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -30,15 +30,15 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>eda03759afadd28c4c20c32a96a80e34</td>
<td>CVE-2023-42824</td>
<td>2023-10-08 08:38:21 <img src="imgs/new.gif" /></td>
<td>2023-10-08 08:38:21</td>
<td>CVE-2023-42824:Apple iOS/iPadOS 本地权限提升漏洞通告</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=65226a7d22adc884abcd7ff9">详情</a></td>
</tr>

<tr>
<td>8ea293b8aa141400cf62a6e7f7c46390</td>
<td></td>
<td>2023-10-08 06:08:55 <img src="imgs/new.gif" /></td>
<td>2023-10-08 06:08:55</td>
<td>安全事件周报 2023-09-25 第39周</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=6522477522adc884abcd7ff4">详情</a></td>
</tr>
Expand Down Expand Up @@ -430,79 +430,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>c421b166824ac794122c3601ff58ff72</td>
<td>CVE-2023-40654</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40654">详情</a></td>
</tr>

<tr>
<td>f6f53942ccc0f6b43db5baeb0613d884</td>
<td>CVE-2023-40653</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40653">详情</a></td>
</tr>

<tr>
<td>5e908bfd9d682bf67801aec5e26ec88c</td>
<td>CVE-2023-40652</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In jpg driver, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with System execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40652">详情</a></td>
</tr>

<tr>
<td>f1a8a8c06f6012a179937d6dfa068162</td>
<td>CVE-2023-40651</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40651">详情</a></td>
</tr>

<tr>
<td>91598c2b35e7bbb99ece06ee394566ff</td>
<td>CVE-2023-40650</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In Telecom service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40650">详情</a></td>
</tr>

<tr>
<td>827d1cc832cf6d1d12c1e5af38954be6</td>
<td>CVE-2023-40649</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40649">详情</a></td>
</tr>

<tr>
<td>a5e948821ad2daf0b63577713c2d6e19</td>
<td>CVE-2023-40648</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40648">详情</a></td>
</tr>

<tr>
<td>6798b7d895d33d2276b0158c65f5c116</td>
<td>CVE-2023-40647</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40647">详情</a></td>
</tr>

<tr>
<td>6c2b9e64e9347cf4c76a64c2677f6832</td>
<td>CVE-2023-40646</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40646">详情</a></td>
</tr>

<tr>
<td>43c4e7ed6b722898be080a6a1784d763</td>
<td>CVE-2023-40645</td>
<td>2023-10-08 04:15:00 <img src="imgs/new.gif" /></td>
<td>2023-10-08 04:15:00</td>
<td>In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-40645">详情</a></td>
</tr>
Expand Down Expand Up @@ -1766,47 +1766,47 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>45e6ab7c45a8b322e60be68c72db9897</td>
<td>CVE-2023-40376</td>
<td>2023-10-08 20:09:46 <img src="imgs/new.gif" /></td>
<td>2023-10-08 20:09:46</td>
<td>IBM URBANCODE_DEPLOY Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=41b151f8076241b6834206ab8178a194">详情</a></td>
</tr>

<tr>
<td>1d7d4444a2bb46bd7224b30cddb64f43</td>
<td>CVE-2023-30737</td>
<td>2023-10-08 20:09:44 <img src="imgs/new.gif" /></td>
<td>2023-10-08 20:09:44</td>
<td>SAMSUNG HEALTH Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=b1e6bf7091734321bd76a0e92bae9fb9">详情</a></td>
</tr>

<tr>
<td>6f4cc5ef12382cee972b31fbbf49f63d</td>
<td>CVE-2023-5377</td>
<td>2023-10-08 20:09:44 <img src="imgs/new.gif" /></td>
<td>2023-10-08 20:09:44</td>
<td>GPAC GPAC Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=8a581b231d1345e7accc1b40040e53a0">详情</a></td>
</tr>

<tr>
<td>345a17b5fc2e38ed9351e6846ebbba88</td>
<td>CVE-2023-31042</td>
<td>2023-10-08 20:08:46 <img src="imgs/new.gif" /></td>
<td>2023-10-08 20:08:46</td>
<td>PURESTORAGE PURITY Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=51afda5d317e49329da33ae125f6b2c5">详情</a></td>
</tr>

<tr>
<td>63a1fcbde91714000d021e6aa278cec5</td>
<td>CVE-2023-5215</td>
<td>2023-10-08 20:08:45 <img src="imgs/new.gif" /></td>
<td>2023-10-08 20:08:45</td>
<td>REDHAT Multiple product Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=f174635ee71d42f38d25408e39aa9509">详情</a></td>
</tr>

<tr>
<td>f629147b778cec9b8ba3801d78f556d3</td>
<td>CVE-2023-33029</td>
<td>2023-10-08 20:08:45 <img src="imgs/new.gif" /></td>
<td>2023-10-08 20:08:45</td>
<td>QUALCOMM Multiple product Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=71fd0b7dbefb4d43a24c130bc13b3bb7">详情</a></td>
</tr>
Expand Down Expand Up @@ -2371,6 +2371,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5357">详情</a></td>
</tr>

<tr>
<td>add7d3a6eeb12c794c74dd3e9e6da963</td>
<td>CVE-2023-5291</td>
<td>2023-10-04 02:15:10 </td>
<td>The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'AWL-BlogFilter' shortcode in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5291">详情</a></td>
</tr>

<tr>
<td>81b935f928b2b997b6fc9cc58f2db370</td>
<td>CVE-2023-44974</td>
Expand Down Expand Up @@ -2459,14 +2467,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5353">详情</a></td>
</tr>

<tr>
<td>2163b52e84eff53f1afc650506929b1b</td>
<td>CVE-2023-5351</td>
<td>2023-10-03 12:15:11 </td>
<td>Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm prior to 7.14.1.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5351">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 14bf7ba

Please sign in to comment.