Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 4, 2024
1 parent 6dd44b4 commit 2d34daf
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 17 deletions.
2 changes: 2 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -143,3 +143,5 @@ a7c8ba9e1efdf69182e53ab35dbaadc5
bf94c95275afbe033c5d92f9c478ba8e
3eca057ed05195e95208d16b37862758
9ad47dbe86f8e1da8e64befd81104687
9325a212074dcd1ed8cedff411405fa7
92eedd2dbd259e45bc287d800463557d
Binary file modified data/cves.db
Binary file not shown.
34 changes: 17 additions & 17 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-04 12:35:34 -->
<!-- RELEASE TIME : 2024-02-04 13:24:26 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -363,6 +363,22 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-43183">详情</a></td>
</tr>

<tr>
<td>9325a212074dcd1ed8cedff411405fa7</td>
<td>CVE-2024-23550</td>
<td>2024-02-03 06:15:48 <img src="imgs/new.gif" /></td>
<td>HCL DevOps Deploy / HCL Launch (UCD) could disclose sensitive user information when installing the Windows agent.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23550">详情</a></td>
</tr>

<tr>
<td>92eedd2dbd259e45bc287d800463557d</td>
<td>CVE-2024-0909</td>
<td>2024-02-03 06:15:48 <img src="imgs/new.gif" /></td>
<td>The Anonymous Restricted Content plugin for WordPress is vulnerable to information disclosure in all versions up to, and including, 1.6.2. This is due to insufficient restrictions through the REST API on the posts/pages that protections are being place on. This makes it possible for unauthenticated attackers to access protected content.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-0909">详情</a></td>
</tr>

<tr>
<td>9f22b8f6a172a1855368cd2004242e0b</td>
<td>CVE-2024-1200</td>
Expand Down Expand Up @@ -507,22 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22901">详情</a></td>
</tr>

<tr>
<td>2c4e03bc24b0a262b8aef609cae4d88b</td>
<td>CVE-2024-22900</td>
<td>2024-02-02 02:15:18</td>
<td>Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the setNetworkCardInfo function.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22900">详情</a></td>
</tr>

<tr>
<td>09c4f1d46d4e1dfe81bfc4eeb8388cbd</td>
<td>CVE-2024-22899</td>
<td>2024-02-02 02:15:18</td>
<td>Vinchin Backup & Recovery v7.2 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the syncNtpTime function.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22899">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 2d34daf

Please sign in to comment.