Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 19, 2024
1 parent 56caeee commit 5d3fdbf
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -118,3 +118,13 @@ f1e49f17867951bb1cb00f017dddff7e
2b51cef4b6153b4165ff8742272eb902
4d55c97a364e59bd41e8fc711dfde5d5
67f58b2e636db49d7ef8686f7a709a34
6aa334efde52ba1564057fd534fbc0f0
f1ef85c0727110356751c1b5b41b1437
a97e731ef00c99a94abe23dbc80de2e4
ddb460ac5c8ba98e7f779b427f391446
81c8708c5f6916d7e5bc225500d0391f
d5614f866e8067ec9308d9ea256019a7
26fa7882883672fe4327e452286823e4
d984c43eb67ac9e78f4412dc0a6bf393
2c5740c783e56d949d078f331921c13b
d10075fe712ef3b4bb32e008116712ae
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-18 23:22:13 -->
<!-- RELEASE TIME : 2024-02-19 01:23:17 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>6aa334efde52ba1564057fd534fbc0f0</td>
<td>CVE-2023-6249</td>
<td>2024-02-18 08:15:07 <img src="imgs/new.gif" /></td>
<td>Signed to unsigned conversion esp32_ipm_send</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-6249">详情</a></td>
</tr>

<tr>
<td>f1ef85c0727110356751c1b5b41b1437</td>
<td>CVE-2023-5779</td>
<td>2024-02-18 08:15:06 <img src="imgs/new.gif" /></td>
<td>can: out of bounds in remove_rx_filter function</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5779">详情</a></td>
</tr>

<tr>
<td>a97e731ef00c99a94abe23dbc80de2e4</td>
<td>CVE-2023-6749</td>
<td>2024-02-18 07:15:10 <img src="imgs/new.gif" /></td>
<td>Unchecked length coming from user input in settings shell</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-6749">详情</a></td>
</tr>

<tr>
<td>ddb460ac5c8ba98e7f779b427f391446</td>
<td>CVE-2023-52381</td>
<td>2024-02-18 07:15:09 <img src="imgs/new.gif" /></td>
<td>Script injection vulnerability in the email module.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-52381">详情</a></td>
</tr>

<tr>
<td>81c8708c5f6916d7e5bc225500d0391f</td>
<td>CVE-2023-52380</td>
<td>2024-02-18 07:15:09 <img src="imgs/new.gif" /></td>
<td>Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-52380">详情</a></td>
</tr>

<tr>
<td>d5614f866e8067ec9308d9ea256019a7</td>
<td>CVE-2023-52379</td>
<td>2024-02-18 07:15:09 <img src="imgs/new.gif" /></td>
<td>Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-52379">详情</a></td>
</tr>

<tr>
<td>26fa7882883672fe4327e452286823e4</td>
<td>CVE-2023-52378</td>
<td>2024-02-18 07:15:08 <img src="imgs/new.gif" /></td>
<td>Vulnerability of incorrect service logic in the WindowManagerServices module.Successful exploitation of this vulnerability may cause features to perform abnormally.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-52378">详情</a></td>
</tr>

<tr>
<td>d984c43eb67ac9e78f4412dc0a6bf393</td>
<td>CVE-2022-48621</td>
<td>2024-02-18 07:15:07 <img src="imgs/new.gif" /></td>
<td>Vulnerability of missing authentication for critical functions in the Wi-Fi module.Successful exploitation of this vulnerability may affect service confidentiality.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-48621">详情</a></td>
</tr>

<tr>
<td>2c5740c783e56d949d078f331921c13b</td>
<td>CVE-2023-52377</td>
<td>2024-02-18 06:15:08 <img src="imgs/new.gif" /></td>
<td>Vulnerability of input data not being verified in the cellular data module.Successful exploitation of this vulnerability may cause out-of-bounds access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-52377">详情</a></td>
</tr>

<tr>
<td>d10075fe712ef3b4bb32e008116712ae</td>
<td>CVE-2023-52376</td>
<td>2024-02-18 06:15:08 <img src="imgs/new.gif" /></td>
<td>Information management vulnerability in the Gallery module.Successful exploitation of this vulnerability may affect service confidentiality.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-52376">详情</a></td>
</tr>

<tr>
<td>53c6301f0b16a3aa4a5ee955344de741</td>
<td>CVE-2024-21915</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25415">详情</a></td>
</tr>

<tr>
<td>f4b6c8602f534398ec169444ba866ec5</td>
<td>CVE-2024-25620</td>
<td>2024-02-15 00:15:45</td>
<td>Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. When either the Helm client or SDK is used to save a chart whose name within the `Chart.yaml` file includes a relative path change, the chart would be saved outside its expected directory based on the changes in the relative path. The validation and linting did not detect the path changes in the name. This issue has been resolved in Helm v3.14.1. Users unable to upgrade should check all charts used by Helm for path changes in their name as found in the `Chart.yaml` file. This includes dependencies.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25620">详情</a></td>
</tr>

<tr>
<td>d180424eeff34a639d75c0aaa18da297</td>
<td>CVE-2024-24301</td>
<td>2024-02-14 23:15:08</td>
<td>Command Injection vulnerability discovered in 4ipnet EAP-767 device v3.42.00 within the web interface of the device allows attackers with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24301">详情</a></td>
</tr>

<tr>
<td>f22efcffbfd452555557990fb7070efa</td>
<td>CVE-2024-24300</td>
<td>2024-02-14 23:15:08</td>
<td>4ipnet EAP-767 v3.42.00 is vulnerable to Incorrect Access Control. The device uses the same set of credentials, regardless of how many times a user logs in, the content of the cookie remains unchanged.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24300">详情</a></td>
</tr>

<tr>
<td>78feefedce41c6047b3a4701dfbff676</td>
<td>CVE-2023-6138</td>
<td>2024-02-14 23:15:08</td>
<td>A potential security vulnerability has been identified in the system BIOS for certain HP Workstation PCs, which might allow escalation of privilege, arbitrary code execution, or denial of service. HP is releasing mitigation for the potential vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-6138">详情</a></td>
</tr>

<tr>
<td>9349462f4abf012b08235071e9c3b64d</td>
<td>CVE-2022-48220</td>
<td>2024-02-14 23:15:08</td>
<td>Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-48220">详情</a></td>
</tr>

<tr>
<td>bf6ad87d2a8511d99f253c17c79dcdd3</td>
<td>CVE-2022-48219</td>
<td>2024-02-14 23:15:07</td>
<td>Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-48219">详情</a></td>
</tr>

<tr>
<td>375ecf8d8e60b8b09412c52e66ad8bb2</td>
<td>CVE-2024-1471</td>
<td>2024-02-14 22:15:47</td>
<td>An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1471">详情</a></td>
</tr>

<tr>
<td>e21bfe93720eca43aebe350aa7426243</td>
<td>CVE-2024-1367</td>
<td>2024-02-14 22:15:47</td>
<td>A command injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Logging parameters, which could lead to the execution of arbitrary code on the Security Center host.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1367">详情</a></td>
</tr>

<tr>
<td>c549c1e3e23fe847b0cac550846cbdc3</td>
<td>CVE-2023-49721</td>
<td>2024-02-14 22:15:47</td>
<td>An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49721">详情</a></td>
</tr>

<tr>
<td>c97466358b23783d42d48f5c6667eb6b</td>
<td>CVE-2023-48733</td>
<td>2024-02-14 22:15:47</td>
<td>An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-48733">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 5d3fdbf

Please sign in to comment.