Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Mar 5, 2024
1 parent 6d221c3 commit 208152e
Show file tree
Hide file tree
Showing 3 changed files with 67 additions and 61 deletions.
6 changes: 6 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -193,3 +193,9 @@ eb0ed3dba54a0f4922c91421559574f4
10debfb0324d6cb28ba4a12cddb0ac43
1cef0d48341152875afec7e57a14d6a0
c20e2ce331bfe0642d662fb2182b265e
f10cc92671d553ddef8223a3c268a399
ec667bc2ae50b825e50e709f0a13f4c2
bcbd9f17c1044d124feefcde88ec7f68
81d654e3790f24e95ae01827ed5921f4
8e6fbe86ac5457552786fe2b03b16957
2c1ce4b09b78c6ee77783da94c48cd3c
Binary file modified data/cves.db
Binary file not shown.
122 changes: 61 additions & 61 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-03-04 23:23:18 -->
<!-- RELEASE TIME : 2024-03-05 03:24:48 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,95 +366,95 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>2187e14abdef7f98b3c63bdb9aaf67de</td>
<td>CVE-2024-28084</td>
<td>2024-03-03 21:15:49 <img src="imgs/new.gif" /></td>
<td>2024-03-03 21:15:49</td>
<td>p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28084">详情</a></td>
</tr>

<tr>
<td>af78a91b46f2df24813fdf66f66108bb</td>
<td>CVE-2019-25210</td>
<td>2024-03-03 21:15:49 <img src="imgs/new.gif" /></td>
<td>2024-03-03 21:15:49</td>
<td>An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values).</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2019-25210">详情</a></td>
</tr>

<tr>
<td>441d178f5afcf29063848f26054ea317</td>
<td>CVE-2024-2150</td>
<td>2024-03-03 18:15:10 <img src="imgs/new.gif" /></td>
<td>2024-03-03 18:15:10</td>
<td>A vulnerability, which was classified as critical, has been found in SourceCodester Insurance Management System 1.0. This issue affects some unknown processing. The manipulation of the argument page leads to file inclusion. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255503.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2150">详情</a></td>
</tr>

<tr>
<td>59c2e156dd125fa2b8b4252068b5542e</td>
<td>CVE-2024-2149</td>
<td>2024-03-03 18:15:10 <img src="imgs/new.gif" /></td>
<td>2024-03-03 18:15:10</td>
<td>A vulnerability classified as critical was found in CodeAstro Membership Management System 1.0. This vulnerability affects unknown code of the file settings.php. The manipulation of the argument currency leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-255502 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2149">详情</a></td>
</tr>

<tr>
<td>13d90b0775fa0a08729c52345907ae9d</td>
<td>CVE-2024-2148</td>
<td>2024-03-03 17:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-03 17:15:07</td>
<td>A vulnerability classified as critical has been found in SourceCodester Online Mobile Management Store 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-255501 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2148">详情</a></td>
</tr>

<tr>
<td>302979b9cf2fdcd68a5dcee93ce2962d</td>
<td>CVE-2024-2147</td>
<td>2024-03-03 17:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-03 17:15:07</td>
<td>A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255500.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2147">详情</a></td>
</tr>

<tr>
<td>b8b879b1e5e65a5de7d453a5c210bda1</td>
<td>CVE-2023-28512</td>
<td>2024-03-03 16:15:49 <img src="imgs/new.gif" /></td>
<td>2024-03-03 16:15:49</td>
<td>IBM Watson CP4D Data Stores 4.6.0, 4.6.1, and 4.6.2 could allow an attacker with specific knowledge about the system to manipulate data due to improper input validation. IBM X-Force ID: 250396.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-28512">详情</a></td>
</tr>

<tr>
<td>4776e0f537d367bbce4d1bc6824faead</td>
<td>CVE-2023-27291</td>
<td>2024-03-03 16:15:49 <img src="imgs/new.gif" /></td>
<td>2024-03-03 16:15:49</td>
<td>IBM Watson CP4D Data Stores 4.6.0, 4.6.1, 4.6.2, and 4.6.3 does not encrypt sensitive or critical information before storage or transmission which could allow an attacker to obtain sensitive information. IBM X-Force ID: 248740.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-27291">详情</a></td>
</tr>

<tr>
<td>8769c2a1fbf6fb61b001e7fbd78070e3</td>
<td>CVE-2022-43880</td>
<td>2024-03-03 16:15:49 <img src="imgs/new.gif" /></td>
<td>2024-03-03 16:15:49</td>
<td>IBM QRadar WinCollect Agent 10.0 through 10.1.2 could allow a privileged user to cause a denial of service. IBM X-Force ID: 240151.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-43880">详情</a></td>
</tr>

<tr>
<td>418d5a0399cbf83f956de7bf585feb26</td>
<td>CVE-2024-2146</td>
<td>2024-03-03 15:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-03 15:15:07</td>
<td>A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /?p=products. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-255499.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2146">详情</a></td>
</tr>

<tr>
<td>898a3ce88e362708bf893ef01a720b9c</td>
<td>CVE-2024-0765</td>
<td>2024-03-03 15:15:07 <img src="imgs/new.gif" /></td>
<td>2024-03-03 15:15:07</td>
<td>As a default user on a multi-user instance of AnythingLLM, you could execute a call to the `/export-data` endpoint of the system and then unzip and read that export that would enable you do exfiltrate data of the system at that save state. This would require the attacked to be granted explicit access to the system, but they can do this at any role. Additionally, post-download, the data is deleted so no evidence would exist that the exfiltration occured.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-0765">详情</a></td>
</tr>

<tr>
<td>9a90584f2f7a3c4c28c4d558263a6074</td>
<td>CVE-2024-2145</td>
<td>2024-03-03 14:15:52 <img src="imgs/new.gif" /></td>
<td>2024-03-03 14:15:52</td>
<td>A vulnerability was found in SourceCodester Online Mobile Management Store 1.0. It has been classified as problematic. Affected is an unknown function of the file /endpoint/update-tracker.php. The manipulation of the argument firstname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255498 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-2145">详情</a></td>
</tr>
Expand Down Expand Up @@ -2115,6 +2115,54 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91051">详情</a></td>
</tr>

<tr>
<td>f10cc92671d553ddef8223a3c268a399</td>
<td>CVE-2023-5877</td>
<td>2024-03-04 03:22:39 <img src="imgs/new.gif" /></td>
<td>WordPress affiliate-toolkit WordPress plugin服务器请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91073">详情</a></td>
</tr>

<tr>
<td>ec667bc2ae50b825e50e709f0a13f4c2</td>
<td>CVE-2023-6000</td>
<td>2024-03-04 03:22:39 <img src="imgs/new.gif" /></td>
<td>WordPress Popup Builder WordPress plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91072">详情</a></td>
</tr>

<tr>
<td>bcbd9f17c1044d124feefcde88ec7f68</td>
<td>CVE-2023-6485</td>
<td>2024-03-04 03:22:39 <img src="imgs/new.gif" /></td>
<td>WordPress Html5 Video Player WordPress plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91071">详情</a></td>
</tr>

<tr>
<td>81d654e3790f24e95ae01827ed5921f4</td>
<td>CVE-2023-6421</td>
<td>2024-03-04 03:22:39 <img src="imgs/new.gif" /></td>
<td>WordPress Download Manager WordPress plugin信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91070">详情</a></td>
</tr>

<tr>
<td>8e6fbe86ac5457552786fe2b03b16957</td>
<td>CVE-2023-6037</td>
<td>2024-03-04 03:22:39 <img src="imgs/new.gif" /></td>
<td>WordPress WP TripAdvisor Review Slider WordPress plugin存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91069">详情</a></td>
</tr>

<tr>
<td>2c1ce4b09b78c6ee77783da94c48cd3c</td>
<td>CVE-2023-6113</td>
<td>2024-03-04 03:22:39 <img src="imgs/new.gif" /></td>
<td>WordPress WP STAGING WordPress Backup Plugin信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91068">详情</a></td>
</tr>

<tr>
<td>658e37d0e3744c18e6fe7ae30cc7a8c7</td>
<td>CVE-2023-46851</td>
Expand Down Expand Up @@ -2163,54 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91008">详情</a></td>
</tr>

<tr>
<td>b95b46e740f8ab84aa8b2319511220f8</td>
<td>CVE-2023-42542</td>
<td>2024-03-01 07:19:01</td>
<td>Samsung Push Service访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91007">详情</a></td>
</tr>

<tr>
<td>f014beea98db150fa6a84cf78b98cbbb</td>
<td>CVE-2023-42543</td>
<td>2024-03-01 07:19:01</td>
<td>Samsung Bixby Voice意图验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91006">详情</a></td>
</tr>

<tr>
<td>d51e0c237df616f7e0c0707e54a353ff</td>
<td>CVE-2023-42546</td>
<td>2024-03-01 07:19:01</td>
<td>Samsung Account敏感通信漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91005">详情</a></td>
</tr>

<tr>
<td>9a77308676f732685fe39e9fcc5150d4</td>
<td>CVE-2023-42547</td>
<td>2024-03-01 07:19:01</td>
<td>Samsung Account敏感通信漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91004">详情</a></td>
</tr>

<tr>
<td>eef48ca9ca59e86e64c1e0420008efde</td>
<td>CVE-2023-42548</td>
<td>2024-03-01 07:19:01</td>
<td>Samsung Account敏感通信漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91003">详情</a></td>
</tr>

<tr>
<td>3e2fc39b67533e3cc57e20adccd38416</td>
<td>CVE-2023-42549</td>
<td>2024-03-01 07:19:01</td>
<td>Samsung Account敏感通信漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91002">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 208152e

Please sign in to comment.