From 1d2c22192e9bd872381552b361cb1afa36243b7a Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Mon, 18 Sep 2023 07:22:09 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Cert 360.dat | 1 + cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 42811392 -> 42815488 bytes docs/index.html | 258 ++++++++++++++++++++++----------------------- 4 files changed, 145 insertions(+), 129 deletions(-) diff --git a/cache/Cert 360.dat b/cache/Cert 360.dat index aa46c6974be..e9fefa40b53 100644 --- a/cache/Cert 360.dat +++ b/cache/Cert 360.dat @@ -109,3 +109,4 @@ a77b40143ed9a718e06e3dc84d5a6e05 f59b37492089e7dabfefe20fdf76ba30 b01c750520c239718c36520a80069835 94ff42c9ba5ec0e98e01522ef3b80c5e +90c81d0ff5a3e9ce595ebd560dc5d25e diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 82daaec2948..d1dff697d3b 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -180,3 +180,18 @@ aa59055cfc2f23f6d4cafa17a421b795 d29d82787c2da193123e4d040ee03992 04b55bd10751bcc91cfd0b94a4387fea c40978a5190426452e38a2539d387922 +cb941c538f70e09fb78b773be89d51fb +8ecba32dbfef2d8973f668bc11f1a385 +06d7e2ba70b7bd0b1fbabe332f2e346d +d16b66c1e1605f77ef7e4b175c8e6a84 +498fb080153240c0ac0563e2900f006e +880d51fcf2a7a5066fe4a6a921988757 +a7a091a2bd4e5a3b852ede7ef595e1f2 +3799be0904da892dec49ad2cbbc5132b +48b85fe24ba567ec2d155e7cd88711af +81cb0c8f6ad4b141b4d773bb58fb41db +5a7ded38347c1c65963513bd24d71353 +83840beb7ed03b10477f4599a205a7bc +f29419a9f961ac2518bffbc7b367d4e4 +afb625aedd81891c198f84d4099c4025 +5146b49d6f4b436eac2840e8a5ac5202 diff --git a/data/cves.db b/data/cves.db index c1088965505b664028bc8faa176100217f8eceec..48fb9ab47249e2e1a6775b2c9002731c98c0d3e1 100644 GIT binary patch delta 4251 zcmZwJcXU+M76x$U0+ALV6zLGKP$Rb&P$7mY1nEUl_pKOdF@Or9W?()#0v2MwSV2Xx zcLjSd*n0=;WA9JjH}ARDdw_rZ&L3H8&X=?I*=MG<_Kr5So9<|{zEi`G>ecJ@>W0!m znUAsp$v_lHeMkdHLr4+i07xT9V@MN7Q%EyNF{C-91*9dU1kwu98qx;R7IGk@9i%;^ z1EeFQ6Qnbw3#2Qg8>AG{9nu4G5aeLUA&^5MJt4gyy&-)deIflIWst)l{UItugXjJfGmcb2{{XLHl!Akg)D(A zh2$WBEQ2hEtbnY9tb(kDtbweBoC8@0Sr6F&ITvys(WK|Y6k0r?X0736D39`X(3TgZ2i?;$@xeuVr4`5E#Hh{!6Y|$e z$*h$ODO8^tP(v!B1E>)-rY6*sno%(|rxw(bN~jgJrZ&`;4y1O}o;pxR>O`HX3w5P# zR7%~c2OUHQ(;;*y^`u_ZoBB{+>PKaC81*NWG}6f+lPt2yA(uQFKm+M;I)aX*K{S}k z=_sn8AvBbR(Qq0;Bk5=wMWd;b#?Ub|md4R|nm`k25>2KlG?k{&v2+|wr{n1aI*|(X z_bH%|B8n-Y8FUg=(aAKEX3=b#LvyK`PN5o_NAqa`ol2+C>9mj*(HXRu&ZM*GY^tR! zEup29BhWHhPAh07t)kVmhSt(Kw2s!(20E9{qx0zk+DLVDAzefl(KDwVCpa*F? z?VyL~VS0ofrN`)TdV-#$r|4;VhMuM8=y`g9UZkD$61_~X(5v(sy-sh?oAegFP4CdV z^d7xWAJB*N5q(Ub&@S3dd+1a8j6SC?=u7&FzNS2VL*LSO^gaDRKhjV1GyOup(r@%T z{XzetKk2W`N>Moeq)>foKnoLW#zDxp@?n%YoXI*{5?d+I

SQc#!m^^UtSl_63d?F``_heTl2>~!+s z|E+JwbjQ>+O5+3eN*KcgE34=7lN(od=$S2MgyDEz5UZYQM!xImQ5>3{AL(HbgqCLL zdmo4Yv~8Icv*s>{l39LD`pvaa+LY|R`_|p*d6P!&x@F1k6&rWmy*Vvims8p|+4p>- znQmvB=JJyY=NrUu-|wHF;;n|usx+*w*_AEW^ zKJl^4{uv{g;ba@-@)HXgUZG#E8d+KrCOXqB)wYw^^ljhMHIG%aoP9D()z$6l#5_4I zH&-eh8|~eqQQY3mmgMpi3fqq=w8&%MRaez4LpRk>^+VONjac_oHBnVN-gkRVRjq1& zMm)2sF7xET4(X10tM~1a%RRm9VY&QxcByx^K2svi4s1KrV$D{q#9@V;n77ZdLN~U3 z*Zglv`oJY6pNYQ8_GblAkPr4!5aoAA)%UwQw(e@9{W&u#PV%efq&six`VY_1B#xPy z?UBnLS4f%7ltkwx@_aAhJHz8xnj0iZ5ITWjJA9%3p0dB6cB4!;EzK&gnO_z9rDOd$ z(cBupbXfZB>r0eF(-;5Z+%@>$+g`~qE!!-YKeiB7&M?)w;z%_DO*I`SF)h#Y zb=C5nAl$2dh3^r|Q7dW|R?nZ?w{My~a<$TF@3B^ypl2KB^3w_l0}CDUohXhB*D#$> n3vJ7@4L<2Xr1Kj~GpzL6?yHs7is{ttxb2;e|1`r5xTW!Le*D*e delta 2446 zcmWmG^>-Hp7=>~6g$)LyM~)a>14eguch{x6yGLALgfxh>V$h92j8eK06%>?434>Hn zpZ)N8{(yVVd(IoPZf|%@%--+?5y6)eB*=etVPut{%Tr_pSph4dmBdufY1Oi7TXn3uRz0h})xc_KHL@C8O{}I?Gpo7P!fI)?vRYehthQD=tG(61>S%Sc zI$K>V_UUSMv$|V7te#dctGCt1>TC70`db66fz}{vurSZl3y)_Uth>mzG}^|AGd^{Mrlwb9ySZML>pTdi%@c58>V z)7oY2w)R+it$o(#))&^7)>qbk>wtC8I%LIJhpi*lQR|p>-1^%3#yVl0v`$&4tuxkH z>zsAox?o+jE?JkYE7n!(TkD$jo%Ox-gLU1yVf|?RWZkrGSwCC9ShuY^)?MqKb>Dhm zJ+vNKzgoXpkF6)xQ|p=ayY+|lr}dZh+z(zl^zr0$Gq1*^nKP$bp>5h1|%4 zyvT?AD1d?}geVk75fnuY+XwpdlKeF`A$$nxQ#bpe0(NHQJyp+Mzu?!849oF8R^S7y#44=D8mz@StjCA=2pjM*KEbE>3>&cto3RC3u?^d? z13R$`yRip*u@9f)3w(*Mupb9-5Qh+l!#IMYIELf+8sFdqPT~|!;|$K?9M0ncF5(g{ z;|i|gTU^6;_#QvtI&R=c{Dhmhg`e>YZsQK_;vVkf0UqKJe#LKij3;=CXZRg|;7|O8 z=Ximac!k$^gTL_)-r^np#eYGu3UK}iAR!VV7$HcEBnU-PBtsaIBLz|-6;dM&(jpw` zkRBP35t)z~5y*n9$cF5QL=NOcF62fYAw;1til8W>Q4GaV0wqxjrBMcD zQ4Zx%0TodRl~Dy%Q4Q5m12s_#wNVFkQ4jUe01eRyjnM>6(G1Pe0xi)BtLL@)G4AM`~(^v3`U#2^gD5DdjI495tJ#3+o$7>va@jK>5_ z#3W2c45nZzreS*Epd8pRKS_s>X$j(=q`0sJ4(toWrHL6CG&JGTrpcPm_c8~_jQGrq z&#d^w#%FeX<^ + @@ -27,6 +27,14 @@

眈眈探求 | TITLE URL + + 90c81d0ff5a3e9ce595ebd560dc5d25e + + 2023-09-18 07:04:38 + 安全事件周报 2023-09-11 第37周 + 详情 + + b01c750520c239718c36520a80069835 CVE-2023-38146 @@ -259,14 +267,6 @@

眈眈探求 | 详情 - - de81200cf6bb59604da0b1817b29cd54 - - 2023-07-17 08:26:35 - 安全事件周报 2023-07-10 第28周 - 详情 - - @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + cb941c538f70e09fb78b773be89d51fb + CVE-2022-44215 + 2023-09-18 07:19:58 + Titan FTP Server开放重定向漏洞 + 详情 + + + + 8ecba32dbfef2d8973f668bc11f1a385 + CVE-2023-39578 + 2023-09-18 07:19:58 + 跨站脚本漏洞 + 详情 + + + + 06d7e2ba70b7bd0b1fbabe332f2e346d + CVE-2023-39708 + 2023-09-18 07:19:58 + Inventory Management System跨站脚本漏洞 + 详情 + + + + d16b66c1e1605f77ef7e4b175c8e6a84 + CVE-2023-23772 + 2023-09-18 07:19:58 + Motorola MBTS Site Controller加密签名验证错误漏洞 + 详情 + + + + 498fb080153240c0ac0563e2900f006e + CVE-2023-41005 + 2023-09-18 07:19:58 + pagekit任意代码执行漏洞 + 详情 + + + + 880d51fcf2a7a5066fe4a6a921988757 + CVE-2023-40826 + 2023-09-18 07:19:58 + pf4j路径遍历漏洞 + 详情 + + + + a7a091a2bd4e5a3b852ede7ef595e1f2 + CVE-2023-39615 + 2023-09-18 07:19:58 + Libxml2越界读取漏洞 + 详情 + + + + 3799be0904da892dec49ad2cbbc5132b + CVE-2023-0654 + 2023-09-18 07:19:58 + Cloudflare WARP Mobile Client渲染UI层或帧限制错误漏洞 + 详情 + + + + 48b85fe24ba567ec2d155e7cd88711af + CVE-2022-47069 + 2023-09-18 07:19:58 + p7zip堆缓冲区溢出漏洞 + 详情 + + + + 81cb0c8f6ad4b141b4d773bb58fb41db + CVE-2022-48065 + 2023-09-18 07:19:58 + GNU Binutils内存泄露漏洞 + 详情 + + + + 5a7ded38347c1c65963513bd24d71353 + CVE-2022-48547 + 2023-09-18 07:19:58 + Cacti跨站脚本漏洞 + 详情 + + + + 83840beb7ed03b10477f4599a205a7bc + CVE-2022-48570 + 2023-09-18 07:19:58 + Crypto++越界写入漏洞 + 详情 + + + + f29419a9f961ac2518bffbc7b367d4e4 + CVE-2023-24515 + 2023-09-18 07:19:58 + Artica Pandora FMS服务器端请求伪造漏洞 + 详情 + + + + afb625aedd81891c198f84d4099c4025 + CVE-2023-36281 + 2023-09-18 07:19:58 + LangChain代码注入漏洞 + 详情 + + + + 5146b49d6f4b436eac2840e8a5ac5202 + CVE-2023-37426 + 2023-09-18 07:19:58 + Aruba Networks EdgeConnect SD-WAN Orchestrator硬编码凭据使用漏洞 + 详情 + + 971a81fba778ecec14671a555e020494 CVE-2020-36761 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - f355e297672e1c43d23b211d3ee872e8 - CVE-2023-39094 - 2023-09-15 05:23:24 - studentmanager跨站脚本漏洞 - 详情 - - - - 92c4d99e42aaa6770c0aa8b804603cf8 - CVE-2023-39618 - 2023-09-15 05:23:24 - TOTOLINK X5000R命令注入漏洞 - 详情 - - - - 6dcd57fbec36752207d28ce3547ac6cc - CVE-2023-39748 - 2023-09-15 05:23:24 - TP-LINK TL-WR1041N拒绝服务漏洞 - 详情 - - - - 82912a526bead89a1262ca4df6e77b95 - CVE-2023-3936 - 2023-09-15 05:23:24 - WordPress Blog2Social Plugin跨站脚本漏洞 - 详情 - - - - a6308d7d80c80498ec4f18b973115d8e - CVE-2023-39543 - 2023-09-15 05:23:24 - LuxSoft LuxCal Web Calendar跨站脚本漏洞 - 详情 - - - - 333270f771cf0ab67524113092468f02 - CVE-2023-40173 - 2023-09-15 05:23:24 - social-media-skeleton凭据保护错误漏洞 - 详情 - - - - 2f91bce98680f4cb6e556273b9f4b953 - CVE-2023-2915 - 2023-09-15 05:23:24 - Rockwell Automation ThinManager Thinserver输入验证错误漏洞 - 详情 - - - - 70ae374c2fb4044b473a5b22d537f000 - CVE-2023-38911 - 2023-09-15 05:23:24 - CSZ CMS跨站脚本漏洞 - 详情 - - - - fc9f740d816626dcb4224fb31cbfdaf5 - CVE-2023-39741 - 2023-09-15 05:23:24 - lrzip堆缓冲区溢出漏洞 - 详情 - - - - 6a040d615cfebd7a2d44e74fc61f4322 - CVE-2023-39455 - 2023-09-15 05:23:24 - ELECOM Wireless LAN Routers操作系统命令注入漏洞 - 详情 - - - - f4ac603a62f20e4c455f68a461fddf89 - CVE-2023-36106 - 2023-09-15 05:23:24 - powerjob访问控制错误漏洞 - 详情 - - - - b2f58e8f62b4e9339bbb478150ec06c3 - CVE-2023-38132 - 2023-09-15 05:23:24 - ELECOM LAN-W451NGR访问控制错误漏洞 - 详情 - - - - 915db4f34909051e3f6c1c7a5cb386e4 - CVE-2023-31941 - 2023-09-15 05:23:24 - Online Travel Agency System文件上传漏洞 - 详情 - - - - 72f83f5a2a24b29878dd4011390f438c - CVE-2023-2316 - 2023-09-15 05:23:24 - Typora路径遍历漏洞 - 详情 - - - - ec4502947e25e47010f7d4710347b8c0 - CVE-2023-39809 - 2023-09-15 05:23:24 - N.V.K.INTER iBSG命令注入漏洞 - 详情 - -