Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 19, 2023
1 parent 568e143 commit 4862ac7
Show file tree
Hide file tree
Showing 3 changed files with 51 additions and 41 deletions.
10 changes: 10 additions & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -157,3 +157,13 @@ f2ffb6db1fcfd5b04cddcd82a325ff64
887bcc35055ad2d931e0b5e0f6b9e4fa
0fd01c618f076be68187553f0f9904ff
04fed750f11357abd407ba8af0289909
37f0dc92e7d37aff56dbdd25dfc111c0
5f68fb48aa8aac1ed0ebb32975cbfb57
df72e06778aa89b2aa6023b5f2fb9fd5
54ec8eb776e93cfc18d19c73cf95ee6f
500e77d3a5e21640dd14b009c42955c1
6c1b9c4fee44f66c9d1f8ab988ec1e7f
e001d6a84d22092468b9ce98e546140b
2784e905e77006aee167c8cd449c71f0
8722c1b5d809a05f967dc5e5638d23ad
a72a10e0ef716a6ed2a3961dbfd14540
Binary file modified data/cves.db
Binary file not shown.
82 changes: 41 additions & 41 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-09-19 15:24:19 -->
<!-- RELEASE TIME : 2023-09-19 16:30:56 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2227,6 +2227,30 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>6c1b9c4fee44f66c9d1f8ab988ec1e7f</td>
<td>CVE-2023-36659</td>
<td>2023-09-15 06:15:08 </td>
<td>An issue was discovered in OPSWAT MetaDefender KIOSK 4.6.1.9996. Long inputs were not properly processed, which allows remote attackers to cause a denial of service (loss of communication).</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36659">详情</a></td>
</tr>

<tr>
<td>2784e905e77006aee167c8cd449c71f0</td>
<td>CVE-2023-36657</td>
<td>2023-09-15 06:15:07 </td>
<td>An issue was discovered in OPSWAT MetaDefender KIOSK 4.6.1.9996. Built-in features of Windows (desktop shortcuts, narrator) can be abused for privilege escalation.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36657">详情</a></td>
</tr>

<tr>
<td>e001d6a84d22092468b9ce98e546140b</td>
<td>CVE-2023-36658</td>
<td>2023-09-15 05:15:24 </td>
<td>An issue was discovered in OPSWAT MetaDefender KIOSK 4.6.1.9996. It has an unquoted service path that can be abused locally.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36658">详情</a></td>
</tr>

<tr>
<td>20cbda9e7b28bb57eedd926a61063e44</td>
<td>CVE-2023-23845</td>
Expand Down Expand Up @@ -2275,6 +2299,22 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20233">详情</a></td>
</tr>

<tr>
<td>8722c1b5d809a05f967dc5e5638d23ad</td>
<td>CVE-2023-36642</td>
<td>2023-09-13 13:15:09 </td>
<td>An improper neutralization of special elements used in an OS command vulnerability [CWE-78]&Acirc;&nbsp;in the management interface of FortiTester 3.0.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36642">详情</a></td>
</tr>

<tr>
<td>a72a10e0ef716a6ed2a3961dbfd14540</td>
<td>CVE-2023-36638</td>
<td>2023-09-13 13:15:09 </td>
<td>An improper privilege management vulnerability [CWE-269] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions API may allow a remote and authenticated API admin user to access some system settings such as the mail server settings through the API via a stolen GUI session ID.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36638">详情</a></td>
</tr>

<tr>
<td>c63ed8a05c1ab72186ab0d8302f1b543</td>
<td>CVE-2023-29183</td>
Expand Down Expand Up @@ -2427,46 +2467,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36796">详情</a></td>
</tr>

<tr>
<td>74d33fe152547c62bfe69955d3270806</td>
<td>CVE-2023-36794</td>
<td>2023-09-12 17:15:14 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36794">详情</a></td>
</tr>

<tr>
<td>f57a585c15991bae1d4618bd856384aa</td>
<td>CVE-2023-36793</td>
<td>2023-09-12 17:15:14 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36793">详情</a></td>
</tr>

<tr>
<td>7e6ca1a5a271c50671bea04219928642</td>
<td>CVE-2023-36792</td>
<td>2023-09-12 17:15:14 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36792">详情</a></td>
</tr>

<tr>
<td>f9ac797504c02c825a749692dc14f1e8</td>
<td>CVE-2023-36771</td>
<td>2023-09-12 17:15:13 </td>
<td>3D Builder Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36771">详情</a></td>
</tr>

<tr>
<td>2a699d80b18a58c0eae3371acdcb86e9</td>
<td>CVE-2023-36770</td>
<td>2023-09-12 17:15:13 </td>
<td>3D Builder Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36770">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 4862ac7

Please sign in to comment.