Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 3, 2024
1 parent ddd1945 commit 4d056bf
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -123,3 +123,13 @@ b32e653ffa89d6cdc42742d8332802f3
2d06f9a106003e6837f948512a7abce9
2c4e03bc24b0a262b8aef609cae4d88b
09c4f1d46d4e1dfe81bfc4eeb8388cbd
9f22b8f6a172a1855368cd2004242e0b
ccd16c14b07c24a6d10454e932b742b8
1a0bb88a5266c17539051604748d6173
0e965b79eab963a35c53b4c3da239714
2878f7903310149a9d68eac962455728
fcb2b760850137470ef152412d1c08f3
ba6f3b10e4b76231b5e29e900f73db52
6e298211553cc8f66c61c351ac586ad7
9137e4fe74b9c52e5329f80be0f41238
74581bb5ce0d3f0c5d71e2670f4318f4
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-03 03:25:33 -->
<!-- RELEASE TIME : 2024-02-03 07:19:56 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>9f22b8f6a172a1855368cd2004242e0b</td>
<td>CVE-2024-1200</td>
<td>2024-02-03 02:15:52 <img src="imgs/new.gif" /></td>
<td>A vulnerability was found in Jspxcms 10.2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /template/1/default/. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252698 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1200">详情</a></td>
</tr>

<tr>
<td>ccd16c14b07c24a6d10454e932b742b8</td>
<td>CVE-2023-43016</td>
<td>2024-02-03 01:15:09 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote user to log into the server due to a user account with an empty password. IBM X-Force ID: 266154.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-43016">详情</a></td>
</tr>

<tr>
<td>1a0bb88a5266c17539051604748d6173</td>
<td>CVE-2023-32329</td>
<td>2024-02-03 01:15:08 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a user to download files from an incorrect repository due to improper file validation. IBM X-Force ID: 254972.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-32329">详情</a></td>
</tr>

<tr>
<td>0e965b79eab963a35c53b4c3da239714</td>
<td>CVE-2023-32327</td>
<td>2024-02-03 01:15:08 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 254783.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-32327">详情</a></td>
</tr>

<tr>
<td>2878f7903310149a9d68eac962455728</td>
<td>CVE-2023-31006</td>
<td>2024-02-03 01:15:08 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) is vulnerable to a denial of service attacks on the DSC server. IBM X-Force ID: 254776.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-31006">详情</a></td>
</tr>

<tr>
<td>fcb2b760850137470ef152412d1c08f3</td>
<td>CVE-2023-31005</td>
<td>2024-02-03 01:15:08 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a local user to escalate their privileges due to an improper security configuration. IBM X-Force ID: 254767.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-31005">详情</a></td>
</tr>

<tr>
<td>ba6f3b10e4b76231b5e29e900f73db52</td>
<td>CVE-2023-31004</td>
<td>2024-02-03 01:15:08 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote attacker to gain access to the underlying system using man in the middle techniques. IBM X-Force ID: 254765.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-31004">详情</a></td>
</tr>

<tr>
<td>6e298211553cc8f66c61c351ac586ad7</td>
<td>CVE-2023-30999</td>
<td>2024-02-03 01:15:07 <img src="imgs/new.gif" /></td>
<td>IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow an attacker to cause a denial of service due to uncontrolled resource consumption. IBM X-Force ID: 254651.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-30999">详情</a></td>
</tr>

<tr>
<td>9137e4fe74b9c52e5329f80be0f41238</td>
<td>CVE-2024-1199</td>
<td>2024-02-03 00:15:44 <img src="imgs/new.gif" /></td>
<td>A vulnerability has been found in CodeAstro Employee Task Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file \employee-tasks-php\attendance-info.php. The manipulation of the argument aten_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252697 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1199">详情</a></td>
</tr>

<tr>
<td>74581bb5ce0d3f0c5d71e2670f4318f4</td>
<td>CVE-2024-1198</td>
<td>2024-02-03 00:15:44 <img src="imgs/new.gif" /></td>
<td>A vulnerability, which was classified as critical, was found in openBI up to 6.0.3. Affected is the function addxinzhi of the file application/controllers/User.php of the component Phar Handler. The manipulation of the argument outimgurl leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252696.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1198">详情</a></td>
</tr>

<tr>
<td>90f99f87c8a1273200574443665adfcf</td>
<td>CVE-2024-22533</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-51685">详情</a></td>
</tr>

<tr>
<td>7efaec2584d2789a92b5ff0277e6b617</td>
<td>CVE-2024-22159</td>
<td>2024-01-31 19:15:09</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional allows Reflected XSS.This issue affects WOLF – WordPress Posts Bulk Editor and Manager Professional: from n/a through 1.0.8.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22159">详情</a></td>
</tr>

<tr>
<td>1f26b0c20c004a4d0efbe9e54d30b7aa</td>
<td>CVE-2024-22158</td>
<td>2024-01-31 19:15:09</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PeepSo Community by PeepSo – Social Network, Membership, Registration, User Profiles allows Stored XSS.This issue affects Community by PeepSo – Social Network, Membership, Registration, User Profiles: from n/a before 6.3.1.0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22158">详情</a></td>
</tr>

<tr>
<td>a03c3f4dc9b9b1f47fd5d3f0a4dc43e7</td>
<td>CVE-2024-22153</td>
<td>2024-01-31 19:15:09</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fahad Mahmood & Alexandre Faustino Stock Locations for WooCommerce allows Stored XSS.This issue affects Stock Locations for WooCommerce: from n/a through 2.5.9.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22153">详情</a></td>
</tr>

<tr>
<td>8eda8b6b9ab8c10e96e1106f3a083d1b</td>
<td>CVE-2024-22150</td>
<td>2024-01-31 19:15:09</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PWR Plugins Portfolio & Image Gallery for WordPress | PowerFolio allows Stored XSS.This issue affects Portfolio & Image Gallery for WordPress | PowerFolio: from n/a through 3.1.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22150">详情</a></td>
</tr>

<tr>
<td>a40e13b68eb55bdb44f82b08986c96b4</td>
<td>CVE-2024-22146</td>
<td>2024-01-31 19:15:08</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Magazine3 Schema & Structured Data for WP & AMP allows Stored XSS.This issue affects Schema & Structured Data for WP & AMP: from n/a through 1.25.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22146">详情</a></td>
</tr>

<tr>
<td>01dd3d0c761342bc0bf52087cac0a1d4</td>
<td>CVE-2024-21917</td>
<td>2024-01-31 19:15:08</td>
<td>A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory. If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21917">详情</a></td>
</tr>

<tr>
<td>b15e08907b00af06d9854c719589fadc</td>
<td>CVE-2024-21916</td>
<td>2024-01-31 19:15:08</td>
<td>A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogix controllers. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21916">详情</a></td>
</tr>

<tr>
<td>bad4d9d030d56df4acabb8a471192177</td>
<td>CVE-2024-1111</td>
<td>2024-01-31 19:15:08</td>
<td>A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1111">详情</a></td>
</tr>

<tr>
<td>e8c00b66ad7f031bf982e09b86de5ce0</td>
<td>CVE-2024-23637</td>
<td>2024-01-31 18:15:49</td>
<td>OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password. An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance. The vulnerability will be patched in version 1.10.0.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23637">详情</a></td>
</tr>

<tr>
<td>713cef78838587eaf92fe2eba1a3a32d</td>
<td>CVE-2024-22297</td>
<td>2024-01-31 18:15:49</td>
<td>Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codeboxr CBX Map for Google Map & OpenStreetMap allows Stored XSS.This issue affects CBX Map for Google Map & OpenStreetMap: from n/a through 1.1.11.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22297">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 4d056bf

Please sign in to comment.