From 463a3527d3d7e41e902b417ad34f121aa7ec7ca3 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 29 Sep 2023 20:23:27 +0000 Subject: [PATCH] Updated by Github Bot --- cache/NVD.dat | 10 +++ data/cves.db | Bin 43085824 -> 43089920 bytes docs/index.html | 162 ++++++++++++++++++++++++------------------------ 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/NVD.dat b/cache/NVD.dat index 65ce3803225..cd0802d1996 100644 --- a/cache/NVD.dat +++ b/cache/NVD.dat @@ -127,3 +127,13 @@ c9b755d9f9ddbb0fd8f420c630920222 50632a4d89f102ff4fb7d135ede42249 65f7a1d63bc7b89a3525598825bf0470 4bb11a54a9622af003b091644b566cdb +507a0f6f3264cdbec430bd2d2275a1a1 +199fd12c50a689f6d41da15691227515 +61daef1fcfe13a63c435d20e9eb84958 +75be3cfd6041283db50bbd38e92696dd +bb3033f090249d3003c94e5ea7af1bd0 +8ff69bd38008665d2d98e872a87e6c57 +2cb9c69a0d04f560ae7892899fa0497b +de2bef3c7bf693403c7394276cd63215 +6c24c15da493c723bbac6d81c3f16dd8 +3e75410c4926e75933e0789ac50e7783 diff --git a/data/cves.db b/data/cves.db index 90e023c5f3ba0ad35c2fd807b13b0783e52535a5..dfd2e9044c67a8c7ffcf364305c52235b54431c7 100644 GIT binary patch delta 4753 zcmb`}cXSkG8wGG?Ngxnf=v5Z!V8YDKR*;s^1R^C6P(bchAhZwyf)vv(h>C!Mu@CmH zs3;Z?u%lux*b8=1kqGwB?{456IY<66^2hHv*_^ZQ%$?_X-`SFnpKe}K@=Wvf?NayF zs@1dg2KPW?Zz%|aa1phM6e5+VL)0bGhf{5G{#T zL~EiA(UxdOv?n?crw|PjEEBnVg@mjm_-y2vxzyx zTw)$EpC}|25Jkj7qL^4jEGEt+mJmyc^N3}{a$*Isk~p6zAxeodqMWE8NUS1O6BiI` zhzp5}h>MA}#3jT!Vm+~exRkhz*hp+5E+;C9D~KzJtB9+KYlv%!>j;O~Ok7XgK-@^& zMBGf=LflH+M%+%^LEK5)Mchr?L)=SjA?_pYCmtZS5)Tp&5!;A|iARV>iN}cT#17(d zVkfbS*iAe^JV`u7JWV`9JWD)B>>-{fULam1_7X1{BXNkR zB7Pzc6Gw=jiC>6ciQkCdi9d)xiT@FQt%0!?hPb4*q)4jNk-Cy5^`yR}O9N>rjij+O zkql`n&7`@ske1R)T1y*gEA6DcbdXb|qqwD$oGP8Ai*%K4(p`E;Pw6GSTFc~f*zMu zFL^RSCQ80clF4$GoGnvis!Wq}WV$4ue^??Cm6*gOAv0vA%#s3`Epue9%#-<2C<~-W z7D}-!lEreaERm&ho-C8)vO-qM`BEaKQYPh6A(U0JS}u?^a-m!#7t30?MApfA*&vt7 zWwKE=$>mZhSICuem0T^?$hC5vII>x;mmB0pxk+x8TjW-`O>UPv<{g1jhuNmd0Y0$JMyl)C-2J#@}YbrAIm55sqB}}_pf zd@n!9LHSV*NtOI0hvkU;EWgOF@|*lFf5@NmKl#g81DCeHxTLnENUGG4x{@aKq`ss} z18FFYq_H%S3~4IOq`9<^meNXEOB-n`?WDbQkW-|ixTTYvDxIZ^bd_$>U3y4Q=_S48 zG|7}K=_96C;t^ZC;uF6FBq$;2EB)kj=`RChpbV11k}WwhM25;R87?E_3>hh-WVGbU znKDMk$~YM>c``vJO1?~z$#RyQEmLHwOp|kDx+I@}SRxXYn8YO^Gi0XBk^-46b7Zc} zllf983#3REO0g`G#d5AJk)?8;ER*H3LRQN8QX-{NCgoD$+5x(5T9F*nn=F?k%R1N2 z?Hkv-M!e9tj&Y<`gEsZP;Vzz18(U3Rpi-!Z@gcYf@X6(!K+L>Oj=`kn7=f%SA!8w*W(Y@HpGTjsNrdNN; z*N5>FMo-VTd|9TQW%{$cA!qmQ*~XyCbqAhJb6!i`Vl;KO9QfWyabCH6t!l&HGF(la z<%d?g(n6kq+w%3bLVazY`=noDZRuL0o^vq!7sIlvLzHJ%RApD^@8~P*SehR2MdEfe z5%Zf~%M-L?5uX`}#Oz=^6<#MAorydTJ7C z{o#C9-+uo+i2F#stN(Gm@szKus2WrqV~VeAN@=u9$sUlb(t9t$Kplq z!f;V|ZoD{Nly!m;bTY;)HT>QB)bJW9$!k<@m|fV?*}U+eVI95goo(i9aD7=jqoEGB z)H?lYHA-*LzJAX%Pn{hZTa8|>Tg@huQ!~tA1@9UzW{SboQNXy384{+gsUCv7s?I-3vWyWA&Z zw5wM$tMXl)|K6>ZzkFUr)v)SBqkLtfO4DO;Pb8jDm`K7Ovb}nd1niL46Yxi4e%tf+ zZnXmcK2n}j=r1tRDi0psQ^zR@6d271oP@LVAFF0mw*O;f@aWlS1^6U=6f-jDxW`S_5*^1_O$A=M#sePy|&>A{4$mwW-5X3+1~TO$?<#)AP*I2efg zopGP^a2?%+p&EpA9?c)_YE(JB;6PnxRj-9c2dBwj(_M8>!ifH3;ays|U-B@rLjMQX CGEmF_ delta 2463 zcmWmG<#!eY7>057Zi4}%M~ocZ-QC^YaMRu08*l@oHUz~$rPBbVYlI+(1qR&;C@5tR zDqio0-}MLF=RD^;v9TwkVsD&?O3V>{JXx}$S(nAs4mlntE5r&|p;nj`ZY8%;SP@oA zE0vYninP*LX{~ftdMksK(aK~+S(&XYR#q#U6>Vj=a#%U7Tvl!?j}>F(wenf{tpZj- ztB_ULDq`p8lvUa)W0keaS>>$?Rz<6lRoSXyRkf;F)vX#E=S+Q1}HQSnF&9!XJv*ue1taxjowa8j*EwPqb309)D%zDjQZmqCh zx8AT;T5no!S#MkKSgWjet@o_=t<}~VYpu1;T5oNzHd>pk&DIuctF_Jg!1~bo$okmY zZtbu>u|BnSTDz>>)*frGwa?mb9k32shpfX^l6Ay7Y8|tVTc24ctdrK~)+y_>^@VlD z`qKK!`r7)&`qnyYowL5PzPEm`ezeY87p#lcCF`$dfi^|N)y zx@+CDezAVF?pqJ6->l!Qht?zOvGv4yYW-pTY5isWZ9TJ|TQ97a)<4$2)_>Nkc!exc z2m%O27{ZYpDG-5_NQKmhL>i<;I;2MiWJD%JAv3ZdE3zRP*^vV|kqfzz2QkQte8`Ui zD2PHRj3OwCVknLhD2Y-ijWQ^Uawv}qsEA6aj4G&#YN(DHsEJyrjXJ1{dZ>>EXoyB= zj3#J`W@wHUXo*&6jW%eDc4&_d=!j0}j4tSkZs?94=!stFjo|)$&=>vC9|JHDgD@CF zFciZu93wCiqc9p{Fc#x59uqJTlQ0=mFcs4<9WyW!vk;3o%*Gtdg)tBFu>kQ{h(%b8 zC0L3CBw`s}!*Z;^>v#hz@h0BF+js}7@GjoN`&f-NSc`R7j}6#}P1uYr*otlV03YHb ze2nebflu%$c48NHV-NOXANJz_4&o3FBMC=v6vuEJpWy^f;&YtBX?%e*_!3{?YkY%m zaTe$B9lpm8_z~xE0T*!zmvIGGaShjT12=ICxA7Bx#vRAS<#V8rhKpIgtywkq0rzi+sqB0w{<=D2yT~iee~^5-5pMD2*~Gi*hKB3aE%m zsEjJ8ifX8i8mNg{sEssUZ5Q8unLogJ>FdQQ=5~DC0V=xxuFdh>y5tA?(Q!o|N zFdZ{66SEMDILyWz%nclp1M3qaR)rl*7JQPDA`=~`61pejjfANo35QoWK;{KAKbQr< z#0Rr5m_@-X4rWO(OM^)WBpqIn7-)1RJR~wYS>&D!v1=m2l49B{4|$qmWu5e?Gbcq4 JUlzC<`aii+sBi!P diff --git a/docs/index.html b/docs/index.html index 5356c2d9999..5d551db42f3 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -2275,6 +2275,86 @@

眈眈探求 | 详情 + + 507a0f6f3264cdbec430bd2d2275a1a1 + CVE-2023-44042 + 2023-09-27 15:19:35 + A stored cross-site scripting (XSS) vulnerability in /settings/index.php of Black Cat CMS 1.4.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website header parameter. + 详情 + + + + 199fd12c50a689f6d41da15691227515 + CVE-2023-44023 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. + 详情 + + + + 61daef1fcfe13a63c435d20e9eb84958 + CVE-2023-44022 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function. + 详情 + + + + 75be3cfd6041283db50bbd38e92696dd + CVE-2023-44021 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the formSetClientState function. + 详情 + + + + bb3033f090249d3003c94e5ea7af1bd0 + CVE-2023-44020 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the security parameter in the formWifiBasicSet function. + 详情 + + + + 8ff69bd38008665d2d98e872a87e6c57 + CVE-2023-44019 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the mac parameter in the GetParentControlInfo function. + 详情 + + + + 2cb9c69a0d04f560ae7892899fa0497b + CVE-2023-44018 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the domain parameter in the add_white_node function. + 详情 + + + + de2bef3c7bf693403c7394276cd63215 + CVE-2023-44017 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the timeZone parameter in the fromSetSysTime function. + 详情 + + + + 6c24c15da493c723bbac6d81c3f16dd8 + CVE-2023-44016 + 2023-09-27 15:19:35 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the deviceId parameter in the addWifiMacFilter function. + 详情 + + + + 3e75410c4926e75933e0789ac50e7783 + CVE-2023-44015 + 2023-09-27 15:19:34 + Tenda AC10U v1.0 US_AC10UV1.0RTL_V15.03.06.49_multi_TDE01 was discovered to contain a stack overflow via the schedEndTime parameter in the setSchedWifi function. + 详情 + + d180a520e938734ec2a15357cc3952dc CVE-2023-5129 @@ -2387,86 +2467,6 @@

眈眈探求 | 详情 - - 083cd1afd9bfb8473e74b45b2c2fcfcc - CVE-2023-5134 - 2023-09-23 08:15:10 - The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta. - 详情 - - - - b9d8a8407aa45fc540dfc495b16f71d0 - CVE-2023-5125 - 2023-09-23 05:15:31 - The Contact Form by FormGet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'formget' shortcode in versions up to, and including, 5.5.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - - - - 420062f419187effc2e771cb2657311d - CVE-2023-5002 - 2023-09-22 14:15:47 - A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server. - 详情 - - - - a97ea477c346e6ecb082f8ffcaa76da8 - CVE-2023-5068 - 2023-09-21 23:15:13 - Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process. - 详情 - - - - c4c8e6fad1208c422fb884063dc408dc - CVE-2023-5104 - 2023-09-21 09:15:10 - Improper Input Validation in GitHub repository nocodb/nocodb prior to 0.96.0. - 详情 - - - - 55154e097ca9cd9178e1cedd8fe4e00b - CVE-2023-5074 - 2023-09-20 16:15:12 - Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28 - 详情 - - - - 5b6d7eb859ebe5065c9fa2568539c343 - CVE-2023-5042 - 2023-09-20 12:15:12 - Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713. - 详情 - - - - be01985caf3d13a706450396ccdce1b6 - CVE-2023-5084 - 2023-09-20 10:15:15 - Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.8.8. - 详情 - - - - 50632a4d89f102ff4fb7d135ede42249 - CVE-2023-4853 - 2023-09-20 10:15:14 - A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service. - 详情 - - - - 1d49a765844dd4af56f01d5405420162 - CVE-2023-5063 - 2023-09-20 03:15:14 - The Widget Responsive for Youtube plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'youtube' shortcode in versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - 详情 - -