Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 23, 2024
1 parent c1c0f17 commit 6d74aaf
Show file tree
Hide file tree
Showing 3 changed files with 91 additions and 81 deletions.
10 changes: 10 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -190,3 +190,13 @@ d3a9c1e1e66da685f6ee39ce0895fc87
4a7d9d99b370064af68fe259cf425b20
165f0c684de86af2eda83cde2eb21612
22310242af8a93113a73f8f4b95ba8ca
77e33783c65fb599dd25a95235f2bee9
280b2b1c7479b8e43c50efa9161e532c
62e666b89f29ff2e4e2b22e4bf0e0a42
554a0ac02706303dcded2a7cd054af14
4aa135259bd73194edced3140171ead9
298f54b7417e20b3553b685ca66b2161
9eccda989b666a21ac84d2c831c4a697
bee4c8ac511f12f49530a9e00ba8a753
01a245df26fca613f715f7ac0a80509e
52ee009d2daa91b59134b9d4ea4cdf3f
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-23 03:24:12 -->
<!-- RELEASE TIME : 2024-04-23 05:26:07 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,86 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>77e33783c65fb599dd25a95235f2bee9</td>
<td>CVE-2024-3177</td>
<td>2024-04-22 23:15:51 <img src="imgs/new.gif" /></td>
<td>A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3177">详情</a></td>
</tr>

<tr>
<td>280b2b1c7479b8e43c50efa9161e532c</td>
<td>CVE-2024-32657</td>
<td>2024-04-22 23:15:50 <img src="imgs/new.gif" /></td>
<td>Hydra is a Continuous Integration service for Nix based projects. Attackers can execute arbitrary code in the browser context of Hydra and execute authenticated HTTP requests. The abused feature allows Nix builds to specify files that Hydra serves to clients. One use of this functionality is serving NixOS `.iso` files. The issue is only with html files served by Hydra. The issue has been patched on https://hydra.nixos.org around 2024-04-21 14:30 UTC. The nixpkgs package were fixed in unstable and 23.11. Users with custom Hydra packages can apply the fix commit to their local installations. The vulnerability is only triggered when opening HTML build artifacts, so not opening them until the vulnerability is fixed works around the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32657">详情</a></td>
</tr>

<tr>
<td>62e666b89f29ff2e4e2b22e4bf0e0a42</td>
<td>CVE-2024-32656</td>
<td>2024-04-22 23:15:50 <img src="imgs/new.gif" /></td>
<td>Ant Media Server is live streaming engine software. A local privilege escalation vulnerability in present in versions 2.6.0 through 2.8.2 allows any unprivileged operating system user account to escalate privileges to the root user account on the system. This vulnerability arises from Ant Media Server running with Java Management Extensions (JMX) enabled and authentication disabled on localhost on port 5599/TCP. This vulnerability is nearly identical to the local privilege escalation vulnerability CVE-2023-26269 identified in Apache James. Any unprivileged operating system user can connect to the JMX service running on port 5599/TCP on localhost and leverage the MLet Bean within JMX to load a remote MBean from an attacker-controlled server. This allows an attacker to execute arbitrary code within the Java process run by Ant Media Server and execute code within the context of the `antmedia` service account on the system. Version 2.9.0 contains a patch for the issue. As a workaround, one may remove certain parameters from the `antmedia.service` file.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32656">详情</a></td>
</tr>

<tr>
<td>554a0ac02706303dcded2a7cd054af14</td>
<td>CVE-2024-32653</td>
<td>2024-04-22 23:15:50 <img src="imgs/new.gif" /></td>
<td>jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32653">详情</a></td>
</tr>

<tr>
<td>4aa135259bd73194edced3140171ead9</td>
<td>CVE-2024-32480</td>
<td>2024-04-22 23:15:50 <img src="imgs/new.gif" /></td>
<td>LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32480">详情</a></td>
</tr>

<tr>
<td>298f54b7417e20b3553b685ca66b2161</td>
<td>CVE-2024-32479</td>
<td>2024-04-22 22:15:08 <img src="imgs/new.gif" /></td>
<td>LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32479">详情</a></td>
</tr>

<tr>
<td>9eccda989b666a21ac84d2c831c4a697</td>
<td>CVE-2024-32461</td>
<td>2024-04-22 22:15:07 <img src="imgs/new.gif" /></td>
<td>LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32461">详情</a></td>
</tr>

<tr>
<td>bee4c8ac511f12f49530a9e00ba8a753</td>
<td>CVE-2024-32460</td>
<td>2024-04-22 22:15:07 <img src="imgs/new.gif" /></td>
<td>FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32460">详情</a></td>
</tr>

<tr>
<td>01a245df26fca613f715f7ac0a80509e</td>
<td>CVE-2024-32459</td>
<td>2024-04-22 22:15:07 <img src="imgs/new.gif" /></td>
<td>FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32459">详情</a></td>
</tr>

<tr>
<td>52ee009d2daa91b59134b9d4ea4cdf3f</td>
<td>CVE-2024-31036</td>
<td>2024-04-22 22:15:07 <img src="imgs/new.gif" /></td>
<td>A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows attackers to cause a denial of service via transmission of crafted hexstreams.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31036">详情</a></td>
</tr>

<tr>
<td>63b2ecda32a2b2f3c9eef5daed4af627</td>
<td>CVE-2015-10132</td>
Expand Down Expand Up @@ -443,86 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-31584">详情</a></td>
</tr>

<tr>
<td>882336e63f8f362ae432dcf34545bb36</td>
<td>CVE-2024-30974</td>
<td>2024-04-19 21:15:08</td>
<td>SQL Injection vulnerability in autoexpress v.1.3.0 allows attackers to run arbitrary SQL commands via the carId parameter.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30974">详情</a></td>
</tr>

<tr>
<td>260e77e43494cda414d2a798eb317b45</td>
<td>CVE-2024-22905</td>
<td>2024-04-19 21:15:07</td>
<td>Buffer Overflow vulnerability in ARM mbed-os v.6.17.0 allows a remote attacker to execute arbitrary code via a crafted script to the hciTrSerialRxIncoming function.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22905">详情</a></td>
</tr>

<tr>
<td>9f3fdc93a01824c806baaff87504a00e</td>
<td>CVE-2024-30923</td>
<td>2024-04-18 21:15:07</td>
<td>SQL Injection vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the where Clause in Racer Document Rendering</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30923">详情</a></td>
</tr>

<tr>
<td>dd354069b4bc4392111cb03227ce30e9</td>
<td>CVE-2024-30922</td>
<td>2024-04-18 21:15:07</td>
<td>SQL Injection vulnerability in DerbyNet v9.0 allows a remote attacker to execute arbitrary code via the where Clause in Award Document Rendering.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30922">详情</a></td>
</tr>

<tr>
<td>ae29e390446cb177ee8654c871b65e96</td>
<td>CVE-2024-30921</td>
<td>2024-04-18 21:15:07</td>
<td>Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the photo.php component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30921">详情</a></td>
</tr>

<tr>
<td>10db47651c20c56152eb79b87aab4c6e</td>
<td>CVE-2024-30920</td>
<td>2024-04-18 21:15:07</td>
<td>Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the render-document.php component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30920">详情</a></td>
</tr>

<tr>
<td>ffdd0761bc93a066fe7ea247741dd977</td>
<td>CVE-2024-30107</td>
<td>2024-04-18 21:15:07</td>
<td>HCL Connections contains a broken access control vulnerability that may expose sensitive information to unauthorized users in certain scenarios.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-30107">详情</a></td>
</tr>

<tr>
<td>0b56c14674ba41df39efd973376f8d31</td>
<td>CVE-2024-32477</td>
<td>2024-04-18 20:15:17</td>
<td>Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. By using ANSI escape sequences and a race between `libc::tcflush(0, libc::TCIFLUSH)` and reading standard input, it's possible to manipulate the permission prompt and force it to allow an unsafe action regardless of the user input. Some ANSI escape sequences act as a info request to the master terminal emulator and the terminal emulator sends back the reply in the PTY channel. standard streams also use this channel to send and get data. For example the `\033[6n` sequence requests the current cursor position. These sequences allow us to append data to the standard input of Deno. This vulnerability allows an attacker to bypass Deno permission policy. This vulnerability is fixed in 1.42.2.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32477">详情</a></td>
</tr>

<tr>
<td>e259fa4761d579dc26ee40732488d728</td>
<td>CVE-2024-32474</td>
<td>2024-04-18 20:15:17</td>
<td>Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser`. An attacker with access to the log data could use these leaked credentials to login to the Sentry system as superuser. Self-hosted users on affected versions should upgrade to 24.4.1 or later. Users can configure the logging level to exclude logs of the `INFO` level and only generate logs for levels at `WARNING` or more.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-32474">详情</a></td>
</tr>

<tr>
<td>17bd011120675ec9e445c2ee33695e58</td>
<td>CVE-2024-20380</td>
<td>2024-04-18 20:15:17</td>
<td>A vulnerability in the HTML parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to an issue in the C to Rust foreign function interface. An attacker could exploit this vulnerability by submitting a crafted file containing HTML content to be scanned by ClamAV on an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to terminate, resulting in a DoS condition on the affected software.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20380">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 6d74aaf

Please sign in to comment.