From 56caeeeddb6f183b1dfd86b500b4dac47b030bd2 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sun, 18 Feb 2024 23:22:15 +0000 Subject: [PATCH] Updated by Github Bot --- cache/RedQueen.dat | 7 +++++++ data/cves.db | Bin 46112768 -> 46112768 bytes docs/index.html | 42 +++++++++++++++++++++--------------------- 3 files changed, 28 insertions(+), 21 deletions(-) diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index df4c0368405..dcbadc19e20 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -169,3 +169,10 @@ b19bec7a5c29e3910395bea9d969b65e b0126f618babc0db9d49affc4f0402e6 062d83f0bdcac326f9f0d6e0fb792479 45ace596682cd06aa2bd138fffff27e6 +bbf7d0441c4084da50f7c425c23fdf23 +aa51b0f30e2c3691d842a8e2c66f4957 +8b0b86cfaa16f5aa491403f2d594d49b +234e3ede3825ca75fc7cb1b82dae2126 +e24ecac437560894960719bec987fa36 +243f283c71aec82dc1a05267198311de +33a678af0904489922e4074e1f63a578 diff --git a/data/cves.db b/data/cves.db index b175b3dcfa4a2d7360aca9ddcc55eb8be12c89c6..7fbfd1f86cbe176fada3a3fa10ed00fac6ddf4da 100644 GIT binary patch delta 3425 zcmZwGX}DE$AI5PVjT#Ke6e*IzX79Dv-g|ACQmK%Pk;J|B6gep=gmez>2&GI7$~jUr zsHBLJ44LP7o~6w5{NVW>&#TAPi_f~Q|BH3~?sfnEtLDMK+SOo6`$pAMckbD!x>i;r ztIFEkYHT&Jnp(}Q=2i=93#+Bo%4%)3v9`3fvbMIivD#YOTJ5autnIBGtR1bLtoGK< z)-F~DYgenI)ydk;+TH4G?O}DX_O!ZM-K@Q=y{&z$gtf1=pOv&yR$!&A(8^d@D`!Pk z-rC>lZXIA9XdPr7Y#n0tunx6)TD`2^)?rp3tFP71I@~(KI@0QI9c2x$j<$}mjX0eqyU&6|It0wkp<8>vZc3YnXMWRc#Ho&ay^W zBdxQoQPw%uXlsmhu63SuzBSgmz`D@7$Qox|Y>l^StXk_5>r(47%hm+za_b6fqIIQp zm36f>$(n3kV@LRHOrc9-E7ra_0}!c9P3tVt~JlP z&AQ#1Z!NGET8peZti{$6YpHdowamK9T5hed?zZl+R$BL3_gSl~)zIbfSU*}n zSwCC9Sif4oS-)Fr&j2#mzp7=?2%8e?!S&cpc_ ziwkfeF2XomjPa;JEiS>OxD3VwT#hR+5m(|WT#ZSXjB79jQ*kY>!}YiUH)0y5V+Lm8 zCd|TY+>AQZ;}*=pt(c2>xDB^sJ{Djh7U2#o#u6;WomhsuupBFJH}1ho+>86L3afEH z*5CoG#e;YV591N6!=rc%kK+kEiKp;1p24$t4$tESyoi_ZGG4)}cnz=P4ZMlB@HXDT zyLb=p;{$w%kMJ=*!Fqg(4cLg!@HxJ~m-q@_;~RX7@9;f-z>oL|KjRntir?@%{=k3m zC;r0UjV7v!-yc=j9F5TgP0r&j2#mzp7=?2%8e?!S&cpc_iwkfeF2XomjPa;JEiS>O zxD3VwT#hR+5m(|WT#ZSXjB79jQ*kY>!}YiUH)0y5V+Lm8Cd|TY+>AQZ;}*=pt(c2> zxDB^sJ{Djh7U2#o#u6;WomhsuupBFJH}1ho+>86L3afEH*5HAvHCkIW_nHoEnsnK0 z%YJPxZhdd74_b9<*?o)gE!MSY+B|ADrs>iq->==OW@DqqO$OBVasAL1{dep(cC*&C znRGhN=AyWg%qPPz%IAZi942#NIaSG~<4i8vuxifwDU*8+?41abL6``_Og`DOx*U({ z_|J2Ab)9xtST$&TF_S9ilR++#$!6k27{;kYl&X{x#d0MMbGfLJ3gg0&Mwmy1zQDyHIOCdlSe`6!)AmCBo#och1X>laU7KWqNRl}pz@aM`p!SI4dD zK3KQ7Dj1)QlDR01lZi^9P)da5C`ja!rDP(P%opPdUsp(`YJ0f8+z@4WLzHq5mWy#Q zOy@G$WRwr{*(5Ovu?*_~Hc^%-BR6bt!cR7zBWOqd9Z z`AVWt%w-eBOtF;CrVCM&$=4p_`cgxRq5l+;4$J9sshp02Ofk-7D#cu}kSb73Tn2e~9Ns$f0uoNa!Q8LKX_H%u) zA;q|c6j32rh_b~>9H+9COdN;#RG4H_rA(eT@`ZnQ5u~H2?-`|`)guaVb=|U+^Bc9T zd*QjoRW0kXa~4+h7@rMFVI`Li5@FD=jbbvJh%#BqCPSySp1UMhpzF0}Mhb1tpbKk?`>0 z{R8KDPUP9Qp^;daB_MoJ*4hE#QL+N8Kr4Zj&`M+_wvt#$tz=e^mD~!pQdlXiR90#$ z#7bkOwbEIkR(dOgmC?#%Wwx?dS*>hVb}NS!X63YUS-Gt|R$eQgmES606|@Rjg{>l1 zQLC6$+$v#}v`Sf}tuj_wtDIHds$f;LDp{4SDppminpNGZVb!#1S+%V?R$Z%}Ro`l0 zHMAO8jjbkDQ>&TP+-hO9v|3rMtu|I$tDV)}>R@%WI$52qE>>5oo7LT-PY%PbFF#Sd~1QV&{||Iww72+t!377YlXGaT4k-a)>vz; zb=G=ogSFAxWNo&#SX-@a)^=-$wbR;V?Y8z{b>DUUAC@RSFLN-&(<&2b?b(8)4FBdwtlsKv+h`Tt>3Lbtb5jd>w)#qdSpGe z{)(o_0a$g(Fl#v1WnNl&Cvoa z(F(2625r#}?a=`p(FvW=1zph%-SNJE5A;MY^hP-PpfCENKL%hR24OIUU?_%RI7VP3 zMqxC@U@XRAJSJcwCSfwBAOewy!c$riNxP{yJ6~EyQ?&5d+fqS@*2Y84_c#J>s7oOlLp5ZxO;3fXXKlm4~@E=~| z4c_8iK(qqcAAv}Kgh+(MNP?tDh9D$IFj62TQXw@$kOpay4xvbo49JK~$c!w=ifqV^ z90)^Bkb<{vj z)Ix34L0!~CeKbHrG(uxEK~pqCbF@H9v_fmNL0hy#dvriYbV6rzL05D`cf9Z413l3T zy%CN+=!<^nj{z8nK^Tl77>Z#Sju9A%Q5cOe7>jWjj|rHFNtlc&h(IKwFcs4<9mWjI z#4JQ(Hs)Y1=3zb-U?CP^F_vH{mSH(oU?o;zHP&D))?qz1U?VnRGqzwWwqZMVU?+BA zH}+sJ_F+E`;2;j+Fpl6Tj^Q|B5Q`It!%3XNX`Bf>t@yyL3qq0vMSPH|Vah2fVuNo6 j=S*HXC?;g%rXd0GVQ1q40+X%?Q-fFW5v$_^qZ0iO`0?X; diff --git a/docs/index.html b/docs/index.html index e47cb16485e..0200684d493 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -286,7 +286,7 @@

眈眈探求 | + 2024-02-16 19:15:08 A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable. 详情 @@ -294,7 +294,7 @@

眈眈探求 | + 2024-02-16 19:15:08 Prior to version 24.1, a local authenticated attacker can view Sysvol when Privilege Management for Windows is configured to use a GPO policy. This allows them to view the policy and potentially find configuration issues. 详情 @@ -302,7 +302,7 @@

眈眈探求 | + 2024-02-16 19:15:08 In convertToComponentName of DreamService.java, there is a possible way to launch arbitrary protected activities due to intent redirection. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. 详情 @@ -310,7 +310,7 @@

眈眈探求 | + 2024-02-16 19:15:08 In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. 详情 @@ -318,7 +318,7 @@

眈眈探求 | + 2024-02-16 19:15:08 In DevmemIntUnmapPMR of devicemem_server.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. 详情 @@ -326,7 +326,7 @@

眈眈探求 | + 2024-02-16 18:15:07 Rejected reason: Erroneous assignement 详情 @@ -334,7 +334,7 @@

眈眈探求 | + 2024-02-16 17:15:08 ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow an attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting. 详情 @@ -342,7 +342,7 @@

眈眈探求 | + 2024-02-16 17:15:08 Rejected reason: Erroneous assignment 详情 @@ -350,7 +350,7 @@

眈眈探求 | + 2024-02-16 16:15:57 A flaw was found in OpenShift. The existing Cross-Site Request Forgery (CSRF) protections in place do not properly protect GET requests, allowing for the creation of WebSockets via CSRF. 详情 @@ -358,7 +358,7 @@

眈眈探求 | + 2024-02-16 15:15:08 Tongda OA v2017 and up to v11.9 was discovered to contain a SQL injection vulnerability via the $AFF_ID parameter at /affair/delete.php. 详情 @@ -366,7 +366,7 @@

眈眈探求 | + 2024-02-16 12:15:08 Dell RecoverPoint for Virtual Machines 5.3.x contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-02-16 12:15:07 Dell RecoverPoint for Virtual Machines 5.3.x contains a brute force/dictionary attack vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to launch a brute force attack or a dictionary attack against the RecoverPoint login form. This allows attackers to brute-force the password of valid users in an automated manner. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-02-16 10:15:08 In Hazelcast Platform through 5.3.4, a security issue exists within the SQL mapping for the CSV File Source connector. This issue arises from inadequate permission checking, which could enable unauthorized clients to access data from files stored on a member's filesystem. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-02-16 09:15:08 Directory Traversal vulnerability in React Native Document Picker before v.9.1.1 and fixed in v.9.1.1 allows a local attacker to execute arbitrary code via a crafted script to the Android library component. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-02-16 09:15:08 An issue in idocv v.14.1.3_20231228 allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted script. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-02-16 09:15:08 DOM-based HTML injection vulnerability in the main page of Darktrace Threat Visualizer version 6.1.27 (bundle version 61050) and before has been identified. A URL, crafted by a remote attacker and visited by an authenticated user, allows open redirect and potential credential stealing using an injected HTML form. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-02-16 09:15:08 An issue in alanclarke URLite v.3.1.0 allows an attacker to cause a denial of service (DoS) via a crafted payload to the parsing function. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-02-16 08:15:39 Directory Traversal vulnerability in YetiForceCompany YetiForceCRM versions 6.4.0 and before allows a remote authenticated attacker to obtain sensitive information via the license parameter in the LibraryLicense.php component. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-02-16 04:15:08 Publicly known cryptographic machine key in AlayaCare's Procura Portal before 9.0.1.2 allows attackers to forge their own authentication cookies and bypass the application's authentication mechanisms. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-02-16 02:15:51 A remote code execution (RCE) vulnerability in /admin/define_language.php of CE Phoenix v1.0.8.20 allows attackers to execute arbitrary PHP code via injecting a crafted payload into the file english.php. 详情