Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Dec 26, 2023
1 parent 05a2108 commit 6b39e59
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -111,3 +111,13 @@ e5dc3ecb0abfad6b49eca8db5476b556
b9145be13a08a325d7bdab4079c01da6
57b5bbb4520b0c4df7072b10558dc8c9
f5ae0cd73bc59a023eb7b0a0faa5b3d0
db7b3a081ca3f10d03d3a63346493552
99144a98657f2c5933c14b9f8b78fb75
6091912286b6ef18028b4297cc30ebb1
dd5dfe631179401fe985da6a4617cacf
801d2b5710bf51e261e22003ae120898
e0e45694ade204e60b229d73321cfbe9
f7ffa179db033bc31f364f46d7a73f78
0af963f8c39ca5652e6928b99e8af797
7590a906921f2148f5cb3113fc37aebf
cf391ce4c4a09740e68400db21db1b34
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-12-26 09:22:47 -->
<!-- RELEASE TIME : 2023-12-26 10:28:36 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>db7b3a081ca3f10d03d3a63346493552</td>
<td>CVE-2023-28616</td>
<td>2023-12-26 04:15:07 <img src="imgs/new.gif" /></td>
<td>An issue was discovered in Stormshield Network Security (SNS) before 4.3.17, 4.4.x through 4.6.x before 4.6.4, and 4.7.x before 4.7.1. It affects user accounts for which the password has an equals sign or space character. The serverd process logs such passwords in cleartext, and potentially sends these logs to the Syslog component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-28616">详情</a></td>
</tr>

<tr>
<td>99144a98657f2c5933c14b9f8b78fb75</td>
<td>CVE-2023-27150</td>
<td>2023-12-26 04:15:07 <img src="imgs/new.gif" /></td>
<td>openCRX 5.2.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name field after creation of a Tracker in Manage Activity.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-27150">详情</a></td>
</tr>

<tr>
<td>6091912286b6ef18028b4297cc30ebb1</td>
<td>CVE-2023-7111</td>
<td>2023-12-26 03:15:09 <img src="imgs/new.gif" /></td>
<td>A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. Affected is an unknown function of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249006 is the identifier assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-7111">详情</a></td>
</tr>

<tr>
<td>dd5dfe631179401fe985da6a4617cacf</td>
<td>CVE-2023-38321</td>
<td>2023-12-25 09:15:07 <img src="imgs/new.gif" /></td>
<td>OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-38321">详情</a></td>
</tr>

<tr>
<td>801d2b5710bf51e261e22003ae120898</td>
<td>CVE-2023-49954</td>
<td>2023-12-25 08:15:07 <img src="imgs/new.gif" /></td>
<td>The CRM Integration in 3CX before 18.0.9.23 and 20 before 20.0.0.1494 allows SQL Injection via a first name, search string, or email address.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49954">详情</a></td>
</tr>

<tr>
<td>e0e45694ade204e60b229d73321cfbe9</td>
<td>CVE-2023-49944</td>
<td>2023-12-25 08:15:07 <img src="imgs/new.gif" /></td>
<td>The Challenge Response feature of BeyondTrust Privilege Management for Windows (PMfW) before 2023-07-14 allows local administrators to bypass this feature by decrypting the shared key, or by locating the decrypted shared key in process memory. The threat is mitigated by the Agent Protection feature.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49944">详情</a></td>
</tr>

<tr>
<td>f7ffa179db033bc31f364f46d7a73f78</td>
<td>CVE-2023-49226</td>
<td>2023-12-25 08:15:07 <img src="imgs/new.gif" /></td>
<td>An issue was discovered in Peplink Balance Two before 8.4.0. Command injection in the traceroute feature of the administration console allows users with admin privileges to execute arbitrary commands as root.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49226">详情</a></td>
</tr>

<tr>
<td>0af963f8c39ca5652e6928b99e8af797</td>
<td>CVE-2023-48652</td>
<td>2023-12-25 08:15:07 <img src="imgs/new.gif" /></td>
<td>Concrete CMS 9 before 9.2.3 is vulnerable to Cross Site Request Forgery (CSRF) via /ccm/system/dialogs/logs/delete_all/submit. An attacker can force an admin user to delete server report logs on a web application to which they are currently authenticated.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-48652">详情</a></td>
</tr>

<tr>
<td>7590a906921f2148f5cb3113fc37aebf</td>
<td>CVE-2023-38826</td>
<td>2023-12-25 08:15:07 <img src="imgs/new.gif" /></td>
<td>A Cross Site Scripting (XSS) vulnerability exists in Follet Learning Solutions Destiny through 20.0_1U. via the handlewpesearchform.do. searchString.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-38826">详情</a></td>
</tr>

<tr>
<td>cf391ce4c4a09740e68400db21db1b34</td>
<td>CVE-2023-36486</td>
<td>2023-12-25 08:15:07 <img src="imgs/new.gif" /></td>
<td>The workflow-engine of ILIAS before 7.23 and 8 before 8.3 allows remote authenticated users to run arbitrary system commands on the application server as the application user by uploading a workflow definition file with a malicious filename.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-36486">详情</a></td>
</tr>

<tr>
<td>12eeb28f9825c317799e26619ba03627</td>
<td>CVE-2023-51771</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-51763">详情</a></td>
</tr>

<tr>
<td>fc8b77142f0dc7e758ed5cdffb16e001</td>
<td>CVE-2023-7090</td>
<td>2023-12-23 23:15:07</td>
<td>A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-7090">详情</a></td>
</tr>

<tr>
<td>ddc16d8025c6e6b91e538bc6bf3246e9</td>
<td>CVE-2023-49594</td>
<td>2023-12-23 20:15:38</td>
<td>An information disclosure vulnerability exists in the challenge functionality of instipod DuoUniversalKeycloakAuthenticator 1.0.7 plugin. A specially crafted HTTP request can lead to a disclosure of sensitive information. An user login to Keycloak using DuoUniversalKeycloakAuthenticator plugin triggers this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49594">详情</a></td>
</tr>

<tr>
<td>beceb7c0d2d3b597435b1f50f1d77670</td>
<td>CVE-2016-15036</td>
<td>2023-12-23 20:15:37</td>
<td>** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Deis Workflow Manager up to 2.3.2. It has been classified as problematic. This affects an unknown part. The manipulation leads to race condition. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.3.3 is able to address this issue. The patch is named 31fe3bccbdde134a185752e53380330d16053f7f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248847. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2016-15036">详情</a></td>
</tr>

<tr>
<td>80d0a2bfbcab164eb3dda5e24ed93ce3</td>
<td>CVE-2014-125108</td>
<td>2023-12-23 17:15:07</td>
<td>A vulnerability was found in w3c online-spellchecker-py up to 20140130. It has been rated as problematic. This issue affects some unknown processing of the file spellchecker. The manipulation leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of the patch is d6c21fd8187c5db2a50425ff80694149e75d722e. It is recommended to apply a patch to fix this issue. The identifier VDB-248849 was assigned to this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2014-125108">详情</a></td>
</tr>

<tr>
<td>3af0800bfa44a02440f0c78d85d85f43</td>
<td>CVE-2023-7008</td>
<td>2023-12-23 13:15:07</td>
<td>A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-7008">详情</a></td>
</tr>

<tr>
<td>1dec5c4182838e0654d76697c4beec74</td>
<td>CVE-2023-6744</td>
<td>2023-12-23 10:15:10</td>
<td>The Divi theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'et_pb_text' shortcode in all versions up to, and including, 4.23.1 due to insufficient input sanitization and output escaping on user supplied custom field data. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-6744">详情</a></td>
</tr>

<tr>
<td>c2466620c1d423832cf68db56232fed1</td>
<td>CVE-2020-36769</td>
<td>2023-12-23 10:15:08</td>
<td>The Widget Settings Importer/Exporter Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wp_ajax_import_widget_dataparameter AJAX action in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with subscriber-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-36769">详情</a></td>
</tr>

<tr>
<td>c023145efa0a5f2872914781aa0670b6</td>
<td>CVE-2023-5962</td>
<td>2023-12-23 09:15:08</td>
<td>A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5962">详情</a></td>
</tr>

<tr>
<td>62c5372d9ebe004725894d61c09330b2</td>
<td>CVE-2023-5961</td>
<td>2023-12-23 09:15:07</td>
<td>A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5961">详情</a></td>
</tr>

<tr>
<td>24e25211d78ec83bc589e04f7425ee7a</td>
<td>CVE-2023-7002</td>
<td>2023-12-23 02:15:45</td>
<td>The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-7002">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 6b39e59

Please sign in to comment.