From 44b486790fdff857eca941a988b31983086c5006 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sat, 7 Oct 2023 01:22:26 +0000 Subject: [PATCH] Updated by Github Bot --- cache/NVD.dat | 10 ++ cache/Tenable (Nessus).dat | 10 ++ data/cves.db | Bin 43274240 -> 43286528 bytes docs/index.html | 344 ++++++++++++++++++------------------- 4 files changed, 192 insertions(+), 172 deletions(-) diff --git a/cache/NVD.dat b/cache/NVD.dat index d2a80cbee4f..2d52249e2de 100644 --- a/cache/NVD.dat +++ b/cache/NVD.dat @@ -172,3 +172,13 @@ f81410852cf82a139403ba1fc63cf243 6129a269aceb76d38f840431b1d9a20a 0f239882ed6dbae6e0529e01dec8c648 0486cbb05c34f3a4fd8fce5e5401d44d +a66088352c52a7edcfa7a8332841740f +d8dae8102674ea962818f8d36572be58 +965244ebe85adfde78781d463b69419d +81b935f928b2b997b6fc9cc58f2db370 +fc4f7dfa657e3f5bf049777fc61cb976 +401c41411354b1b74ceb3821a722ef06 +641189385f33bb1b91751ea0043b6275 +122e8a08fbae0b948c74ba348ea9b038 +1d8d4e2f26089891b78362dd762a8558 +d3d952f6dc8655117121015f600086a5 diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 24dbd4ec740..9dfe0ad8a5f 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -190,3 +190,13 @@ b7cd828c20f2ec48441517a5d9cb9539 7126c63f2dfe3b0a76d3e6d332caccaf 33d427c1dd782d342c194fc5cf16636d 8196d85b4375094ccc4503f1b70c83e1 +b420af749341f0985c0391242f2a7eee +0359e809ed760bf1cfd6e2e873743fb9 +d212ffc62a6f1938e7ffc645aa73dba8 +5d4f2ee95f09a75eda98ea36d49f182d +2c37d65c6b60767f73f3c47c62d1f07f +ada2ce153991a9d03f0562fd7049ff32 +95be21550cfa0a19a596719816369000 +9321f8c5f9a9ddfda5fb6b9adfe7027f +77ed8050318a06c4b5f767d2cb9f0882 +98b89c0aeaeb24b9e9e7f5575c163282 diff --git a/data/cves.db b/data/cves.db index 0b6645837595677c675ddfbec8dbac5647b769c7..3304cf87815a5c6d98c98ccfe238ed2e944119d0 100644 GIT binary patch delta 7670 zcmeI$d3+T0-3M@Ha*z-L1i~c&21PSUK)z56O_&j}lUf611&mYep?_YMa zvoqiQ?eF-^uD*U>;p)}<3pWnRdb3NHlF6HtvC^9@#3V7vOc_j>Oj%6XOkJ6Bm~xrA zG37CJXUb>l!PJwf7gGUKZ>By>g-m^!`Z4uq8o)G==@_O#OhrtCnT9Y8Wm1@iF&)cv z9Mf>7+Gb45q0})0n0+RWZ$An#nYaX*Saw zrZbu5GR*v%5mPNw9aBA1 zoT-6nF;gQ`6H|hznP~~rQl@20%b8X%ozHXu(@LgQOcye(W@=$-WolzeGBMK{rnOA# zm@Z@8`F=OZfClK=}xA*n0~^vm1!H(Pnqs!`We$bOxu}u zFx|^^AJhFz4>0XydXVWMrd>?Cnf5U4W%@bO!%V+mdW7khOph}Cis>=@q6| znOVS1P8J*M}W{=)PD(}zqQOdm1*mFZ)qPniD3^eNM4 zOrJA-!Sv-tB&{b2WXOO_$bxL>3OSGq-5?LTLq7C?p3n;lpf~h^Lg)+qpg#^ACVHqrk6>vUW04re? zTnMY71zMpElEAPA*1|ft2rh<8;8Iu*m%#?u2%DfCE{7}NO1KJA@B_FSHp4aWL%0^M z0|D2=7Wfg|05`%-a5LNjx591kW4ImefIHzX_z7%` z_!vHczrm;Q8GH_3z?afRBxCx63>lCKS&$7~AqR4y8{|QE$cG-#6M8`b^oBlA2z{X+ z^oId35RQRCPy~Zv2n+=UhQYCL91Mr!VFVPzNGO35;6x~eGAM@%P(cG73^2ih0N41&F0VcvEm<&_kG&mj3fT=JIrb89XfSE80X2Tpf6XwD^ zI1A2(b6`H43kzT&`2Fud7$Oh_7d)tj8i>Jpun20Q4(cHe4X_v*p$QVu3`<}sEQ95+ z0?vmEU?r@A3t=_1Kr6ICQhtzFzHvj&l8kG+_#tUm_l+#SCTI6N(DS*TPwo1+o#k!a zb`-p~Xn>rmQu2EBDVdb)I2T7wOm@t}p9#s1nHydaETdWDH*5W7o!?yKHy8WOC4O_M z->mnW%lu}8-)!`oO@7lZ?|MaCE-Tmf%FAYT$pN@ zm>iVaSpRsIc<0$VxqIqub!witb4sC>oa997V)dO5Q&QF!15;yi?#~fBSGLPSJdEQCWX(!# zdM%^q+r0HwF|POuSgPEUBEw zVQBatC^^(h4sFTRblnX)YS0Tit{M)R!H8{!9m5Rbdkd?gW$p7)g<+Z@Yl73XTp3^E zB$Qch;}W;AREgCqu|$(%lxqr}H^t)hic=p|!mbx@bcJ;83~5ki|3gKKO(mn` z(YoK+NiW$k*Z-EG2 z-q%X@ZOJuNEn;fuMZ+@Df3_KM!$wfo92?``6Eo(X(%FIbchZ5;uXo^44)ZAy%%7te z0OZYW@3nz&&%XgN_Y>e@j&s71{HR+Esai7nfw$rTx< zWr$6+OR;qC{;Xz%IQUw<+)FGNzDah(v@x6HI$6W^UHXLd4X@7^ku%)vGE~Dv?eci@4HlYFSC^B%^hb6V)}{!`H4m0Z+qf=i2@=({dc! zh>G2nhoqt`6NO{J+qnvt-F{VjUorHPSEX#R@zr*@MC^{Nl}meDwh=m#3M@s}MZp`T za``tLFI#qM&w+y@#O|9~<*W)*Z$nk{k5r`^R>%#iAvbCV)Uc;TylBA1rfD0tX?Q}K z|Bf^$U6%2^mSwD)o9sBpFKg{WW9>pGZ0f4x*=EQvHBSu%t%z!bG<1&V2a{CGo$dhf z^auA#S*iBS=00NU!(*gU(J*|mJg|FJdf;K>w##+VVi(JW*KIasLu}l6v*d^acl4D@ zuIpDP^%50tjgs?5Xhy{FFQscy!wUsN5yy$xdNitfRv_Z3(TJ&fPE@>ZxWT!D6&hFa!NeDNSW(~59cC9D-V2?hf0-1O=G;dx(0t;CB1SlOh>@}dfYQg%DHf)7i(-v)FbkgDmC#sx1lCpkB7C0z@7g*@~AEr zjn=xI|6LkyT;y~XR;u_-^EAneZEx}XZl?%4qfoJ zG*R=1EUU?mv(gKHPb=9IaUZv4ri(QKw=tN?NJ2p)fVpgA(G7}WYxYa3Kh#YjO>dV@ z5cNGDmb&)+dhGv4+)wSfePaLA?oXFyJN1gYEP|;JTjJI(My-(Fk@H2xY5$5 zQmSfWzt75&#mSDSzs9#!7;P0!C>X|at2(aZhIKO>azoe>Ez7ndTENhSbITgJDAO=Z zBUQP5OKDNO!L4tK*ET2oTd^6>lJY>gEr#vARGywY5o=D9Ql^}m+Vk;> zLb0=>Qpy=tg}K_KOm*vPUf}8tnYI8K$m@mT0!rKeh4m zd3mXEFD%Uzgx$YT4E{V%%1J$RReS#b5DL&?*zLahso)=>p!jG{kbx738Ec-AiZQQr zP4i0+A1OU#=$aRdAO||3C=!)pdEr1fgmC5Bs@Qt*Hb1)HeVx%|*wJ3Kw`SV^R@umC zsZGahA0albxez~Spn$fi$qpx7_#C5kjuW!NuC7^@ieEBRM+-StC}3-$AU62Q z@A1>c1Ok z)waROjs@w`jyGD5cdV%C>8=~H5E~uaa-&#hT*nAR(PLUr6cnwLi)2d|t1-)vAx|D7 YXNvp>R!Nord%iCE=R^N%w3bcn?>{D~0ssI2 delta 2493 zcmWmGWpox~9ENfBG6owX2BT|qcXxMp!%dCu?h!XIYNJD7Q&B<*1Fg3@4ulEWkv zloYS`!|(d=e7w*3pYz1Uor{i3J{z5wFWtp7X-YR=6Vou{;sRMAR=`SYg<9#XFe|;4 z!3wt`tc+HqmC4F%WwEkaQC2o9yA^HauyR_ttlU-}E3cK$%5N303R;D%7^|>V#42hP zvx-|KtddqKtF%?dDr=Rq%3BqzidH47vQ@>ZYE`qUTQ#hjRxPWxRmZAp)wAkb4XlP% zBdf91#A<3avzl8itd>?QtF_g}YHPK#+FKp0j#ekDv(?4wYIU=^TRp6vRxhi!)yL{< z^|Sh01FV4-`wX%MTSKg&)-Ws98g7lSMp~n+(bgDitToOWZ%wc!T9d5F))Z^1HO-oC z&9G)#v#iji6@wcXlbC0WVVi`Gll%hpco73)=Nm$lp4W9_wGvtGCMS^KR6 z)rLw|>uu|hb=W#$y<@#=y=T2|ePA86KD1J-kF1ZaPpnU^&#cd_FRWwMm)3FX zg!Ps6wRO@uWu3OpSZA$s)_LoKb%UABI*ezvYySFLN-b?b(8 z(@M2&S-)7nTEAJpTYp%8TDPq`)?MqK^_TUxb>Dhm{bT)WJ+vNKkF6)xQ|p=apY=Rm zA*&RE0Ma59=@5qW$bfJ}AR{7?37L@vSrLV7$c|{_Ku+XBZsb8;~qXH_T5-Ot#s-haIqXufC7HXpo>Y^U%qX8PC5gMZjnxYw+ zqXk-`6{x}qDpqX&AT7kZ-)`l28DV*mysxc?vw#t;m}FvMaw zMqngHVKl~IEXH9xCSW2aVKSy*DyCsNW?&{}VK(MqF6LoA;;;Yyoz1ejXl_l*YG;_ zVLuMwAl|^6cnfdi5Dw!A-od+g5AWjx9L0x7!AJNQpWst`hR^W@j^Rrj#|eCeuW=Hm za2jWD7Uyst7jO~Z;9Go$@9_hE#3fwDPxu*Ea23~Z9XD_jsknt-@GE}9@Aw0M;x_K! zF7Dwk{Eho~fPe5W9^w%m;|ZSP8UDlbkaz_+e*};gp-6`?q(=sXBLW!_iA>0hEXax| zWJ7jDBL{LK7jh#H@**GdqW}t`5ModmMNkyQP#h&t5~WZYWl$F7P#zUf5tUFGRZtbx zP#rZ;6SYtqbx;@eP#+D@5RK3nP0$q0&>St$60Oi0ZO|6&&>kJo5uMN(UCcO{ z6TQ$Ieb5*E&>sUZ5W)QiVK9bZD25>x!!ZIQF$$wG24gV}<1qmfF$t3~1yeB%(=h`x zF$=RX2XiqG^AU#yScpYf95^Zmb|z$)oOXMf;3p|1GSPw5K+=wNJg01=*&|Y-Ds2m? zA4o_|axhDRSsKi;VB&*W9?XhhRtB>wnAO1~1d|xdnqbxjQc{!F1qvo-3=NA-lWAPU csPGzLDN$FBg>(-biDBl@l-L&Q16#xY2hC@<;Q#;t diff --git a/docs/index.html b/docs/index.html index d94add17b29..a51f40015db 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -363,10 +363,90 @@

眈眈探求 | 详情 + + b420af749341f0985c0391242f2a7eee + CVE-2015-10125 + 2023-10-05 23:15:00 + A vulnerability classified as problematic has been found in WP Ultimate CSV Importer Plugin 3.7.2 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.7.3 is able to address this issue. The identifier of the patch is 13c30af721d3f989caac72dd0f56cf0dc40fad7e. It is recommended to upgrade the affected component. The identifier VDB-241317 was assigned to this vulnerability. + 详情 + + + + 0359e809ed760bf1cfd6e2e873743fb9 + CVE-2023-45243 + 2023-10-05 22:15:00 + Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. + 详情 + + + + d212ffc62a6f1938e7ffc645aa73dba8 + CVE-2023-45242 + 2023-10-05 22:15:00 + Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. + 详情 + + + + 5d4f2ee95f09a75eda98ea36d49f182d + CVE-2023-45241 + 2023-10-05 22:15:00 + Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. + 详情 + + + + 2c37d65c6b60767f73f3c47c62d1f07f + CVE-2023-45240 + 2023-10-05 22:15:00 + Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. + 详情 + + + + ada2ce153991a9d03f0562fd7049ff32 + CVE-2023-44214 + 2023-10-05 22:15:00 + Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35739. + 详情 + + + + 95be21550cfa0a19a596719816369000 + CVE-2023-44213 + 2023-10-05 22:15:00 + Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 35739. + 详情 + + + + 9321f8c5f9a9ddfda5fb6b9adfe7027f + CVE-2023-44212 + 2023-10-05 22:15:00 + Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31477. + 详情 + + + + 77ed8050318a06c4b5f767d2cb9f0882 + CVE-2023-44211 + 2023-10-05 22:15:00 + Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 31637. + 详情 + + + + 98b89c0aeaeb24b9e9e7f5575c163282 + CVE-2023-43343 + 2023-10-05 22:15:00 + Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Files - Description parameter in the Pages Menu component. + 详情 + + 9ca9792c98ad62b48e370e1aa295fd84 CVE-2023-44390 - 2023-10-05 14:15:00 + 2023-10-05 14:15:00 HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. The vulnerability occurs in configurations where foreign content is allowed, i.e. either `svg` or `math` are in the list of allowed elements. In the case an application sanitizes user input with a vulnerable configuration, an attacker could bypass the sanitization and inject arbitrary HTML, including JavaScript code. Note that in the default configuration the vulnerability is not present. The vulnerability has been fixed in versions 8.0.723 and 8.1.722-beta (preview version). 详情 @@ -374,7 +454,7 @@

眈眈探求 | + 2023-10-05 14:15:00 A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied. 详情 @@ -382,7 +462,7 @@

眈眈探求 | + 2023-10-05 13:15:00 A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation. 详情 @@ -390,7 +470,7 @@

眈眈探求 | + 2023-10-05 11:15:00 1E Client installer can perform arbitrary file deletion on protected files. A non-privileged user could provide a symbolic link or Windows junction to point to a protected directory in the installer that the 1E Client would then clear on service startup. A hotfix is available Q23092 that forces the 1E Client to check for a symbolic link or junction and if it finds one refuses to use that path and instead creates a path involving a random GUID. 详情 @@ -398,7 +478,7 @@

眈眈探求 | + 2023-10-05 05:15:00 ftpd before "NetBSD-ftpd 20230930" can leak information about the host filesystem before authentication via an MLSD or MLST command. tnftpd (the portable version of NetBSD ftpd) before 20231001 is also vulnerable. 详情 @@ -406,7 +486,7 @@

眈眈探求 | + 2023-10-05 01:15:00 An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of a password check, it is possible to obtain credentials to access the management console as a non-privileged user. 详情 @@ -414,7 +494,7 @@

眈眈探求 | + 2023-10-05 01:15:00 An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to enable or disable defensive capabilities by sending a crafted message to a named pipe. 详情 @@ -422,7 +502,7 @@

眈眈探求 | + 2023-10-05 01:15:00 An issue was discovered in WatchGuard EPDR 8.0.21.0002. It is possible to bypass the defensive capabilities by adding a registry key as SYSTEM. 详情 @@ -430,7 +510,7 @@

眈眈探求 | + 2023-10-05 01:15:00 An issue was discovered in WatchGuard EPDR 8.0.21.0002. Due to a weak implementation of message handling between WatchGuard EPDR processes, it is possible to perform a Local Privilege Escalation on Windows by sending a crafted message to a named pipe. 详情 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - b7fd6fc4c3e8c4948273869e8c66879a - CVE-2023-5113 - 2023-10-04 15:15:00 - Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI. - 详情 - - - - 5e7f36df37204fe37d07f6b5ada9e266 - CVE-2023-4380 - 2023-10-04 15:15:00 - A logic flaw exists in Ansible. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability. - 详情 - - - - 6fab12144981d37256ca2c221445242d - CVE-2023-4237 - 2023-10-04 15:15:00 - A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability. - 详情 - - - - 2f5f19fb8937462d8e15e0fbd9ffdad6 - CVE-2023-40559 - 2023-10-04 15:15:00 - Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Dynamic Pricing and Discount Rules for WooCommerce plugin <= 2.4.0 versions. - 详情 - - - - 7f08bbd3f0fe27840639e9fc057e1340 - CVE-2023-3971 - 2023-10-04 15:15:00 - An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise. - 详情 - - - - 72d552c7c785386775e75ec09fdcb0f3 - CVE-2023-3665 - 2023-10-04 15:15:00 - A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code. - 详情 - - - - 77b1d4a5ec2a1bd182ea1262212b1379 - CVE-2023-5374 - 2023-10-04 14:15:00 - A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241255. - 详情 - - - - d406ddaaaac5ed03e6306153aa849528 - CVE-2023-4567 - 2023-10-04 14:15:00 - ** REJECT ** Issue has been found to be non-reproducible, therefore not a viable flaw. - 详情 - - - - 1c6fb3ce0e4b5c62ee1e7d8e47331e77 - CVE-2023-40684 - 2023-10-04 14:15:00 - IBM Content Navigator 3.0.11, 3.0.13, and 3.0.14 with IBM Daeja ViewOne Virtual is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 264019. - 详情 - - - - 22b9dc196821fc9c0e322316be8e10d1 - CVE-2023-40561 - 2023-10-04 14:15:00 - Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Enhanced Ecommerce Google Analytics for WooCommerce plugin <= 3.7.1 versions. - 详情 - - @@ -1766,7 +1766,7 @@

眈眈探求 | + 2023-10-05 20:09:02 SMARTY SMARTY Vulnerability 详情 @@ -1774,7 +1774,7 @@

眈眈探求 | + 2023-10-05 20:09:02 PHPMYFAQ PHPMYFAQ Vulnerability 详情 @@ -1782,7 +1782,7 @@

眈眈探求 | + 2023-10-05 20:09:02 PHPMYFAQ PHPMYFAQ Vulnerability 详情 @@ -1790,7 +1790,7 @@

眈眈探求 | + 2023-10-05 20:08:50 DOLIBARR DOLIBARR_ERP\/CRM Vulnerability 详情 @@ -1798,7 +1798,7 @@

眈眈探求 | + 2023-10-05 20:08:50 PHPMYFAQ PHPMYFAQ Vulnerability 详情 @@ -1806,7 +1806,7 @@

眈眈探求 | + 2023-10-05 20:08:50 GOOGLE ANDROID Vulnerability 详情 @@ -1814,7 +1814,7 @@

眈眈探求 | + 2023-10-05 20:08:50 PHPMYFAQ PHPMYFAQ Vulnerability 详情 @@ -1822,7 +1822,7 @@

眈眈探求 | + 2023-10-05 20:08:49 MICROWEBER MICROWEBER Vulnerability 详情 @@ -1830,7 +1830,7 @@

眈眈探求 | + 2023-10-05 20:08:49 PHPMYFAQ PHPMYFAQ Vulnerability 详情 @@ -1838,7 +1838,7 @@

眈眈探求 | + 2023-10-05 20:08:49 HASHICORP VAULT Vulnerability 详情 @@ -2243,6 +2243,46 @@

眈眈探求 | 详情 + + 401c41411354b1b74ceb3821a722ef06 + CVE-2023-4497 + 2023-10-04 13:15:26 + Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Icon parameter. The XSS is loaded from /users.ghp. + 详情 + + + + 641189385f33bb1b91751ea0043b6275 + CVE-2023-4496 + 2023-10-04 13:15:26 + Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter. + 详情 + + + + 122e8a08fbae0b948c74ba348ea9b038 + CVE-2023-4495 + 2023-10-04 13:15:26 + Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Resume parameter. The XSS is loaded from /register.ghp. + 详情 + + + + 1d8d4e2f26089891b78362dd762a8558 + CVE-2023-4494 + 2023-10-04 13:15:26 + Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine. + 详情 + + + + d3d952f6dc8655117121015f600086a5 + CVE-2023-4493 + 2023-10-04 13:15:25 + Stored Cross-Site Scripting in Easy Address Book Web Server 1.6 version, through the users_admin.ghp file that affects multiple parameters such as (firstname, homephone, lastname, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate, workzip). This vulnerability allows a remote attacker to store a malicious JavaScript payload in the application to be executed when the page is loaded, resulting in an integrity impact. + 详情 + + 310d0d3e9d94763c028edd46af7d0ac8 CVE-2023-4997 @@ -2283,6 +2323,22 @@

眈眈探求 | 详情 + + 81b935f928b2b997b6fc9cc58f2db370 + CVE-2023-44974 + 2023-10-03 21:15:10 + An arbitrary file upload vulnerability in the component /admin/plugin.php of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. + 详情 + + + + fc4f7dfa657e3f5bf049777fc61cb976 + CVE-2023-44973 + 2023-10-03 21:15:10 + An arbitrary file upload vulnerability in the component /content/templates/ of Emlog Pro v2.2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. + 详情 + + 8c5369129e67d9df89ae6b2f5f63a82e CVE-2023-5255 @@ -2299,6 +2355,14 @@

眈眈探求 | 详情 + + d8dae8102674ea962818f8d36572be58 + CVE-2023-4564 + 2023-10-03 16:15:10 + This vulnerability could allow an attacker to store a malicious JavaScript payload in the broadcast message parameter within the admin panel. + 详情 + + 0dbd62539f3b1621d56f1fd2fc9574ec CVE-2023-4886 @@ -2387,6 +2451,14 @@

眈眈探求 | 详情 + + a66088352c52a7edcfa7a8332841740f + CVE-2023-4659 + 2023-10-02 15:15:15 + Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication. + 详情 + + 1ddd7b203d4442582fb039d4e7a6a2e0 CVE-2023-5106 @@ -2395,78 +2467,6 @@

眈眈探求 | 详情 - - 6f5be1920d82e9d6dc530fa7ac54339d - CVE-2023-5329 - 2023-10-02 00:15:10 - A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability. - 详情 - - - - a169821774aed9156ba6a727d2ff6d59 - CVE-2023-5328 - 2023-10-02 00:15:10 - A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability. - 详情 - - - - 8b07a29a4c3b333bc2e2154b7f5a542d - CVE-2023-5327 - 2023-10-01 23:15:08 - A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028. - 详情 - - - - 9d7536185eb3755e189185b4959f0aa1 - CVE-2023-5326 - 2023-10-01 23:15:08 - A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027. - 详情 - - - - 00bc9214a7f397d1b56b0ae221964ade - CVE-2023-5324 - 2023-10-01 21:15:42 - A vulnerability has been found in eeroOS up to 6.16.4-11 and classified as critical. This vulnerability affects unknown code of the component Ethernet Interface. The manipulation leads to denial of service. The attack needs to be approached within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241024. - 详情 - - - - af6e7926bf594213f7ce8ed5c4bc8b71 - CVE-2023-5322 - 2023-10-01 05:15:09 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/edit_manageadmin.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240992. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - - - - 84c2f3c275bcde2fcafb5767d71614f2 - CVE-2023-5323 - 2023-10-01 01:15:24 - Cross-site Scripting (XSS) - Generic in GitHub repository dolibarr/dolibarr prior to 18.0. - 详情 - - - - ac55b54e3e5df1a2f230e428061a580a - CVE-2023-5112 - 2023-09-30 23:15:40 - Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "specials_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser. - 详情 - - - - a1d4daf3b0efd6abaa387a32952a21df - CVE-2023-5111 - 2023-09-30 23:15:40 - Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "featured_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser. - 详情 - -