Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 21, 2024
1 parent 7a9132e commit 4a2587f
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -178,3 +178,13 @@ e87358f0ce0c0d35756b48c37ecd124a
911e6a10c7356fa6d13166cc66f28f3e
5f8b3c0749bc369f74ae79762da2f638
d163df537e1a603e6d574f72c08f029d
f24d0b1e73b3b0edb14e596a1fd65c0a
35ca16e1d732d84f01bc48aa8110a894
89729faa0d4baa960a6a749eb919d388
0d30a4d6bf68b79f467e9045b1aedf8f
3ef2900ad6ce169e4a65eeba4ca4fde7
a5c01cd56cfe0c032e4f528a7e036fae
ac2f59e493dd2c3c572347e1563d9416
bd5ba4a51cc0533c96a153673eb7c6ac
4a806761b3f4a2552b469b14e2cb11c6
69ec16805f2b4a76d9edfb73a16f42b4
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-21 15:23:08 -->
<!-- RELEASE TIME : 2024-02-21 19:18:34 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>f24d0b1e73b3b0edb14e596a1fd65c0a</td>
<td>CVE-2024-27215</td>
<td>2024-02-21 16:15:50 <img src="imgs/new.gif" /></td>
<td>ConnectWise ScreenConnnect before 23.9.8 allows authentication bypass via an alternate path or channel.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-27215">详情</a></td>
</tr>

<tr>
<td>35ca16e1d732d84f01bc48aa8110a894</td>
<td>CVE-2024-22220</td>
<td>2024-02-21 16:15:50 <img src="imgs/new.gif" /></td>
<td>An issue was discovered in Terminalfour 7.4 through 7.4.0004 QP3 and 8 through 8.3.19, and Formbank through 2.1.10-FINAL. Unauthenticated Stored Cross-Site Scripting can occur, with resultant Admin Session Hijacking. The attack vectors are Form Builder and Form Preview.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22220">详情</a></td>
</tr>

<tr>
<td>89729faa0d4baa960a6a749eb919d388</td>
<td>CVE-2024-1709</td>
<td>2024-02-21 16:15:50 <img src="imgs/new.gif" /></td>
<td>ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1709">详情</a></td>
</tr>

<tr>
<td>0d30a4d6bf68b79f467e9045b1aedf8f</td>
<td>CVE-2024-1708</td>
<td>2024-02-21 16:15:50 <img src="imgs/new.gif" /></td>
<td>ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1708">详情</a></td>
</tr>

<tr>
<td>3ef2900ad6ce169e4a65eeba4ca4fde7</td>
<td>CVE-2024-1701</td>
<td>2024-02-21 16:15:50 <img src="imgs/new.gif" /></td>
<td>A vulnerability has been found in keerti1924 PHP-MYSQL-User-Login-System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /edit.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-254389 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1701">详情</a></td>
</tr>

<tr>
<td>a5c01cd56cfe0c032e4f528a7e036fae</td>
<td>CVE-2024-1700</td>
<td>2024-02-21 16:15:49 <img src="imgs/new.gif" /></td>
<td>A vulnerability, which was classified as problematic, was found in keerti1924 PHP-MYSQL-User-Login-System 1.0. Affected is an unknown function of the file /signup.php. The manipulation of the argument username with the input <script>alert("xss")</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-254388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1700">详情</a></td>
</tr>

<tr>
<td>ac2f59e493dd2c3c572347e1563d9416</td>
<td>CVE-2024-1474</td>
<td>2024-02-21 16:15:49 <img src="imgs/new.gif" /></td>
<td>In WS_FTP Server versions before 8.8.5, reflected cross-site scripting issues have been identified on various user supplied inputs on the WS_FTP Server administrative interface.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1474">详情</a></td>
</tr>

<tr>
<td>bd5ba4a51cc0533c96a153673eb7c6ac</td>
<td>CVE-2023-49100</td>
<td>2024-02-21 16:15:49 <img src="imgs/new.gif" /></td>
<td>Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdei_interrupt_bind. The parameter is passed to a call to plat_ic_get_interrupt_type. It can be any arbitrary value passing checks in the function plat_ic_is_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49100">详情</a></td>
</tr>

<tr>
<td>4a806761b3f4a2552b469b14e2cb11c6</td>
<td>CVE-2023-46241</td>
<td>2024-02-21 16:15:49 <img src="imgs/new.gif" /></td>
<td>`discourse-microsoft-auth` is a plugin that enables authentication via Microsoft. On sites with the `discourse-microsoft-auth` plugin enabled, an attack can potentially take control of a victim's Discourse account. Sites that have configured their application's account type to any options other than `Accounts in this organizational directory only (O365 only - Single tenant)` are vulnerable. This vulnerability has been patched in commit c40665f44509724b64938c85def9fb2e79f62ec8 of `discourse-microsoft-auth`. A `microsoft_auth:revoke` rake task has also been added which will deactivate and log out all users that have connected their accounts to Microsoft. User API keys as well as API keys created by those users will also be revoked. The rake task will also remove the connection records to Microsoft for those users. This will allow affected users to re-verify their account emails as well as reconnect their Discourse account to Microsoft for authentication. As a workaround, disable the `discourse-microsoft-auth` plugin by setting the `microsoft_auth_enabled` site setting to `false`. Run the `microsoft_auth:log_out_users` rake task to log out all users with associated Microsoft accounts.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-46241">详情</a></td>
</tr>

<tr>
<td>69ec16805f2b4a76d9edfb73a16f42b4</td>
<td>CVE-2022-45179</td>
<td>2024-02-21 16:15:49 <img src="imgs/new.gif" /></td>
<td>An issue was discovered in LIVEBOX Collaboration vDesk through v031. A basic XSS vulnerability exists under the /api/v1/vdeskintegration/todo/createorupdate endpoint via the title parameter and /dashboard/reminders. A remote user (authenticated to the product) can store arbitrary HTML code in the reminder section title in order to corrupt the web page (for example, by creating phishing sections to exfiltrate victims' credentials).</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-45179">详情</a></td>
</tr>

<tr>
<td>fb1b9927eef0a4cba396cf982cff7609</td>
<td>CVE-2023-7235</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21795">详情</a></td>
</tr>

<tr>
<td>b8aba38af1a774eff45b0bbe10813aac</td>
<td>CVE-2024-24794</td>
<td>2024-02-20 11:15:08 <img src="imgs/new.gif" /></td>
<td>A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_sequence_end()` parsing the Sequence Value Represenations.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24794">详情</a></td>
</tr>

<tr>
<td>9cf9f848f33665ea32436073d225a420</td>
<td>CVE-2024-24793</td>
<td>2024-02-20 11:15:08 <img src="imgs/new.gif" /></td>
<td>A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_element_create()` parsing the elements in the File Meta Information header.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24793">详情</a></td>
</tr>

<tr>
<td>e3fe73e2d653c4f0db722139743c2983</td>
<td>CVE-2023-7245</td>
<td>2024-02-20 11:15:07 <img src="imgs/new.gif" /></td>
<td>The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not properly configured, which allows a local user to execute arbitrary code within the nodejs process context via the ELECTRON_RUN_AS_NODE environment variable</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-7245">详情</a></td>
</tr>

<tr>
<td>40c0b4e6eccba333cb08be33cf9a6cb6</td>
<td>CVE-2024-25609</td>
<td>2024-02-20 10:15:08 <img src="imgs/new.gif" /></td>
<td>HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25609">详情</a></td>
</tr>

<tr>
<td>de19821832c611b987b4e2ff8fcd2aa2</td>
<td>CVE-2024-25608</td>
<td>2024-02-20 10:15:08 <img src="imgs/new.gif" /></td>
<td>HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the 'REPLACEMENT CHARACTER' (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25608">详情</a></td>
</tr>

<tr>
<td>5cc2f806d8d4bc4262321df1d995c8df</td>
<td>CVE-2024-25607</td>
<td>2024-02-20 10:15:08 <img src="imgs/new.gif" /></td>
<td>The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25607">详情</a></td>
</tr>

<tr>
<td>0f3627630ee089d9dc8ed517f431fc7c</td>
<td>CVE-2023-51770</td>
<td>2024-02-20 10:15:08 <img src="imgs/new.gif" /></td>
<td>Arbitrary File Read Vulnerability in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-51770">详情</a></td>
</tr>

<tr>
<td>6661ba2b40a7b755c39fcbf712128d9b</td>
<td>CVE-2023-50270</td>
<td>2024-02-20 10:15:08 <img src="imgs/new.gif" /></td>
<td>Session Fixation Apache DolphinScheduler before version 3.2.0, which session is still valid after the password change. Users are recommended to upgrade to version 3.2.1, which fixes this issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-50270">详情</a></td>
</tr>

<tr>
<td>565cdcaa93894ee76db0f6f1d5aeda16</td>
<td>CVE-2023-49250</td>
<td>2024-02-20 10:15:08 <img src="imgs/new.gif" /></td>
<td>Because the HttpUtils class did not verify certificates, an attacker that could perform a Man-in-the-Middle (MITM) attack on outgoing https connections could impersonate the server. This issue affects Apache DolphinScheduler: before 3.2.0. Users are recommended to upgrade to version 3.2.1, which fixes the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49250">详情</a></td>
</tr>

<tr>
<td>d93cfe8129be54ba1ca1924433b3d875</td>
<td>CVE-2023-49109</td>
<td>2024-02-20 10:15:07 <img src="imgs/new.gif" /></td>
<td>Exposure of Remote Code Execution in Apache Dolphinscheduler. This issue affects Apache DolphinScheduler: before 3.2.1. We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49109">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 4a2587f

Please sign in to comment.