Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 9, 2023
1 parent 5a7db94 commit 4d7604b
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -128,3 +128,13 @@ df6bcb19e65f6b1c59002087af562ad8
d349cefd043daf680900ef3e9225fac8
1a1d88cb88b74363c74901a647d50785
2101f920a56f7429f92d02208db26021
17011e370c7709795d6c97cd10ffd77c
76580dc98577d8753e3e67bff62df45d
d7b0babe33e61d6aaafb4e214393812b
298819c0331142aa3012544fbe7d5bc6
b2d0fdc90226d8528b00de0a8c7e6344
1601995ad07507e8b7edfd5d2522b51a
e4b49475254cebadf5277e08b33f87e2
7cd4148e37fddea9b598df3657d118c1
291bcbdb32d373dfe04a4672524cba2d
90f9a72a099d5af0058554e3e534c686
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-10-09 14:28:06 -->
<!-- RELEASE TIME : 2023-10-09 23:22:21 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>17011e370c7709795d6c97cd10ffd77c</td>
<td>CVE-2023-5460</td>
<td>2023-10-09 19:15:00 <img src="imgs/new.gif" /></td>
<td>A vulnerability was found in Delta Electronics WPLSoft up to 2.51 and classified as problematic. This issue affects some unknown processing of the component Modbus Data Packet Handler. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241583. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5460">详情</a></td>
</tr>

<tr>
<td>76580dc98577d8753e3e67bff62df45d</td>
<td>CVE-2023-5459</td>
<td>2023-10-09 19:15:00 <img src="imgs/new.gif" /></td>
<td>A vulnerability has been found in Delta Electronics DVP32ES2 PLC 1.48 and classified as critical. This vulnerability affects unknown code of the component Password Transmission Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. VDB-241582 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5459">详情</a></td>
</tr>

<tr>
<td>d7b0babe33e61d6aaafb4e214393812b</td>
<td>CVE-2023-41672</td>
<td>2023-10-09 19:15:00 <img src="imgs/new.gif" /></td>
<td>Cross-Site Request Forgery (CSRF) vulnerability in Rémi Leclercq Hide admin notices – Admin Notification Center plugin <= 2.3.2 versions.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-41672">详情</a></td>
</tr>

<tr>
<td>298819c0331142aa3012544fbe7d5bc6</td>
<td>CVE-2023-41670</td>
<td>2023-10-09 19:15:00 <img src="imgs/new.gif" /></td>
<td>Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel (in person: Edward Bock) Use Memcached plugin <= 1.0.4 versions.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-41670">详情</a></td>
</tr>

<tr>
<td>b2d0fdc90226d8528b00de0a8c7e6344</td>
<td>CVE-2023-41669</td>
<td>2023-10-09 19:15:00 <img src="imgs/new.gif" /></td>
<td>Cross-Site Request Forgery (CSRF) vulnerability in DAEXT Live News plugin <= 1.06 versions.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-41669">详情</a></td>
</tr>

<tr>
<td>1601995ad07507e8b7edfd5d2522b51a</td>
<td>CVE-2022-3431</td>
<td>2023-10-09 19:15:00 <img src="imgs/new.gif" /></td>
<td>A potential vulnerability in a driver used during manufacturing process on some consumer Lenovo Notebook devices that was mistakenly not deactivated may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-3431">详情</a></td>
</tr>

<tr>
<td>e4b49475254cebadf5277e08b33f87e2</td>
<td>CVE-2023-41668</td>
<td>2023-10-09 18:15:00 <img src="imgs/new.gif" /></td>
<td>Cross-Site Request Forgery (CSRF) vulnerability in Leadster plugin <= 1.1.2 versions.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-41668">详情</a></td>
</tr>

<tr>
<td>7cd4148e37fddea9b598df3657d118c1</td>
<td>CVE-2023-41667</td>
<td>2023-10-09 18:15:00 <img src="imgs/new.gif" /></td>
<td>Cross-Site Request Forgery (CSRF) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-41667">详情</a></td>
</tr>

<tr>
<td>291bcbdb32d373dfe04a4672524cba2d</td>
<td>CVE-2023-39194</td>
<td>2023-10-09 18:15:00 <img src="imgs/new.gif" /></td>
<td>A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-39194">详情</a></td>
</tr>

<tr>
<td>90f9a72a099d5af0058554e3e534c686</td>
<td>CVE-2023-39193</td>
<td>2023-10-09 18:15:00 <img src="imgs/new.gif" /></td>
<td>A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-39193">详情</a></td>
</tr>

<tr>
<td>4bb123e521032e807438cf60c52f017c</td>
<td>CVE-2023-45356</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-43615">详情</a></td>
</tr>

<tr>
<td>5ff7a179ca0e52ad35af09234260e743</td>
<td>CVE-2023-5182</td>
<td>2023-10-07 00:15:00</td>
<td>Sensitive data could be exposed in logs of subiquity version 23.09.1 and earlier. An attacker in the adm group could use this information to find hashed passwords and possibly escalate their privilege.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5182">详情</a></td>
</tr>

<tr>
<td>ceaba1cde842d751c921570050432457</td>
<td>CVE-2023-36123</td>
<td>2023-10-07 00:15:00</td>
<td>Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version Alpha 1.3.9, allows local attackers to execute arbitrary code and gain sensitive information.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-36123">详情</a></td>
</tr>

<tr>
<td>d7c9148f172e7f87fa1d39b430c3ce25</td>
<td>CVE-2023-44860</td>
<td>2023-10-06 23:15:00</td>
<td>An issue in NETIS SYSTEMS N3Mv2 v.1.0.1.865 allows a remote attacker to cause a denial of service via the authorization component in the HTTP request.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-44860">详情</a></td>
</tr>

<tr>
<td>478b6d47c0f482a555aacf7770b3e0fc</td>
<td>CVE-2023-44061</td>
<td>2023-10-06 23:15:00</td>
<td>File Upload vulnerability in Simple and Nice Shopping Cart Script v.1.0 allows a remote attacker to execute arbitrary code via the upload function in the edit profile component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-44061">详情</a></td>
</tr>

<tr>
<td>fca3794018c119647c192df84dec1aaf</td>
<td>CVE-2023-45322</td>
<td>2023-10-06 22:15:00</td>
<td>** DISPUTED ** libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-45322">详情</a></td>
</tr>

<tr>
<td>1f998874f1edb701c462073f897f7996</td>
<td>CVE-2022-33160</td>
<td>2023-10-06 22:15:00</td>
<td>IBM Security Directory Suite 8.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 228568.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-33160">详情</a></td>
</tr>

<tr>
<td>9c9c09c38fbad0dc232ee947a80410cb</td>
<td>CVE-2023-45311</td>
<td>2023-10-06 21:15:00</td>
<td>fsevents before 1.2.11 depends on the https://fsevents-binaries.s3-us-west-2.amazonaws.com URL, which might allow an adversary to execute arbitrary code if any JavaScript project (that depends on fsevents) distributes code that was obtained from that URL at a time when it was controlled by an adversary.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-45311">详情</a></td>
</tr>

<tr>
<td>e7e4836b459bc502ed72b03e71295413</td>
<td>CVE-2023-3725</td>
<td>2023-10-06 21:15:00</td>
<td>Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-3725">详情</a></td>
</tr>

<tr>
<td>e3ec2575a1c23253b20fdaedcdfff5cf</td>
<td>CVE-2023-45303</td>
<td>2023-10-06 19:15:00</td>
<td>ThingsBoard before 3.5 allows Server-Side Template Injection if users are allowed to modify an email template, because Apache FreeMarker supports freemarker.template.utility.Execute (for content sent to the /api/admin/settings endpoint).</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-45303">详情</a></td>
</tr>

<tr>
<td>004d187d4b6141a1cf6956d672706151</td>
<td>CVE-2023-45282</td>
<td>2023-10-06 19:15:00</td>
<td>In NASA Open MCT (aka openmct) 2.2.5 before 545a177, prototype pollution can occur via an import action.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-45282">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 4d7604b

Please sign in to comment.