From 7304bab154790ab63cd38520fbfffbb5ad15e1bc Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 29 Mar 2024 03:23:20 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++++++++++++++ cache/RedQueen.dat | 1 + data/cves.db | Bin 46866432 -> 46870528 bytes docs/index.html | 38 +++++++++++++++++++------------------- 4 files changed, 35 insertions(+), 19 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index cb42fbe874d..e2bc997149d 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -184,3 +184,18 @@ a922b2c7de692d79941e628db6b4d7f5 050964d6373ff197b4908c1db3031af3 dbcf756a3eb3244d57f16de8befcdb84 507a7a2f2e430a8278d48370f074ee96 +0801fe221df23a2ee3acb50a0ae0caa1 +ae318434389a31d9460b94abdb3bcec6 +0267a45b40925f9ebc88a91ba8bb4e49 +cae326cd4089f9cfe5ab06c212ff2d86 +cddc2dd3fe2662e7f1ae27b1e6e006d1 +d0215d8bb376b8c212214d9fd6c72793 +eb62f26f2976517e26a246c4600ffcfa +199b2909e2b49abadb3a216cd9303079 +e206dfe989a070a1552f49615f2e07bf +1543b6b44cc18ddd8f158a647711d6f8 +b53d57e8aadcab53c1c9ea0b442643d1 +c24346163d04f890b913b82c54a10e14 +ae7ee41a459ae9f8dc5b00a326731679 +d3428d60f2f2642a00569f7497e0cb52 +1c80bf7b715200ffc51a9cb078fcdc93 diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index d3fa131bcd6..b7eb7491095 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -130,3 +130,4 @@ e191ff9c800333d8f9447871dc4baf12 7e5fdbfdc3b1edd8c9d0f499121aa492 2b3aba82386cc921c94da59b66b311d2 57c45164ac489c479f1a912479305228 +f1c7bb45161c38412c0ec04359cbc478 diff --git a/data/cves.db b/data/cves.db index 9f2d8841a4c7446fd4ee8cf3e6edf55b656c278d..5333bd6b068c191eec75065e755bc79bc43ee14d 100644 GIT binary patch delta 4570 zcmZ|RcX$-#76x##5FkM4y)Gyq$m;anu?GZ10t7)65jnF{NF-!q5~>AOd{scIB_iUA zVr2zUF#>8p0R?;S8Vh0klv6!kfR_+L;6DcLHa|Efee5Qgd7VQ1c^b8gB%Z0 zASy(I=nw;9LM%uel7QHd6Cfu-PJ)~aIR$bmTnxDcaw+68$UMk= zNE&iEWC7#~2q0HNu7X?*SqNDKSq!-bvIMdevJA2uvI4RaaxLUK$n}sLAk~l?A*&!a zK~_U2eKFP4CGnJ zbCBmDFF;;|yaag}@(Sct$ZL?-A#Xt5guDfL8}bh1UC4Wo_aPrZ>L4FNK7xD<`2?~L z@+o9LPVfaGj*Y^)Q!4R z59&$1C`!Gl4;@8EQ(x*w{plDQKm+Mm8bmQVj*cgVRMJQ%gG{n0P6@K<1UivUqLb+q zI+aeN0vb$1=yV!N!)Q32K_lo)8cBsTibm5IDx$G;7LB9vbT&<(bLd=}NaxWcI-e%f z1vG`i`8$*(mpt+*ps7?$C3GQ8qf(kqWt5_Fx`-;MlB#G1&7@g0o9575x|lAZOX)J2 zNAoF7m(v2ef% z8M>9$(rt7*t)n~WPP&WkrhDjKT2EQJk2cUox}P@D1N0z0M4Rbhs-Z_{3vH!s^e8<> zk5eserycYJJxM!h7wx8}=xN$Rd+8Z^mY$>M=>>X`UZR)j6?&Ckqu1#TdXwIwx9J^v zm)@iI=>w{x59uTNm_DI>^eOG9&**ddg1)4$=xh3hzNG{79eqzf(2w*J{Y<~muk;)J zPJhs!^cVey{?1t_5gvbvP(x}&xzw1NP*cjIX4IToP(HP!R@9o>P+Mw8?WqHGq)ybC zx=>f@M%}3g^`u@DrQXzsj-sQfFZHATbPNrkfpjblq8J@V$CE-TX{3`uCRr4x1le=~ zok%Cq$#e>xN~ci)4W=PnMpoL={v?RWyTU(kz-yb7(GI zOqbB5bQ#T~`IM&1X#rh9peyMrx|$Z!B3ew>&=Oio%V;^Rpp|qjT}Ri`4OC4x(ki-% zR@2S2hHjw@-AZfeHoBeG(H(Rr-9>lPJ#;Uvr!3t^8)zflPn+lgdXOHX&Gc~OF{z2H z`=IIOhHDyx|Jkc;QCAZwZWw9Vv3BOiH4(j8b(^~DQ@Mj4K(^mauFM z%eJsQ8kWbx@_1Nk!?HarJHqlrSe^{a&amtX%kHo|6_%&NvL{m8+;drZ1B->2!QE(0d&`Q!Ygr3IQ5 zXm;E()wr)&j%HY{VJS)wxPh~OTkZbUnIRK~#xzAUVw!F#=J4TX4~v$TI@6uw-173w zhcE7qL^B_Jx;N4!Gpz4jkv?N=&C;}VOJsX6rvGrpc#5W)ULu*)<5n`^YO1EGhGz$! z<;JzRt=EfD4Bad!n^RR>QZ}`)u)1KP*)FrZU{543Q^%Ob|HOD5Oqb z&(%Cn57>vL`SCz?d@Y_-ealxA%To`F(PM^fTgr$sFBKb?DvcJMHD=g|(L=|_MvSg3 z_or2*Dx#yuXEyEI9qD>#cT>VxBi#+zZei?{FxK&P&2l|MN!Wqy2EOSe6)WsA2sAHY z9TBUl#@N)H;Z9m7l-imjP}?I+zt!m-t)!x0<4Vb@R86;rJ)sL5}i$&R}+(jikfcn`;T$S{Y7 z8CICl<=+f8r6vsB&=a56SvpH`FKq57SddbiCi{~>(; zA>4<)Bg1FM(=Cwg96q~%6H^k3%8#U}UZClY=KH$iCQZdr9A9xA=kO23wX;+$k#s6K zor|h#BHbG4G0n~t@ZtS)IRM+PUDN)Vh}*nNJ`ZAEUQL5mV_UAw|1N)Ei`C7)Zhlg; z>b#mZtvB46TN5oB@oU2g=}E};Z^lxmY4xQ~5J7v{5ZxnXQtUs`qhvne(!|hRx^dMyW=J7P9a~SFAhL-Rw zB?!;Hp*f0TT6PdO>^R4tG_}Ll$B3y3&CI0V+z~k@Q@g2I&i`2-)l3gS_Gq@%|59c+ ze%$vBm0M~%z8xey*Gwvk!-K*GtoY$8dN9K{m@y!uZ0V5GHnY89y%jAC8?n;OkUc6K z-O0>wHSQ;Wse6hMBy8@dswWegYZ{KK_^MH_4=t|h`l!O7G&L)ep1Ct}*tvGY$H&uy zk?nJEPBA_|Y3iOC_Y;oexeov0s;=!jO42YmHoe|`684}f=cFpUq6)vVGFntRV`@oR zw4lN*E}2RCaeewV7Ls0HPz%BqS~d9fd@bjnJqO6K~p;;QM@oBCbV zF{5;PDw2EXoi;BFwbLgc8)feU(%qQqYrHW7-{$F8;)v6h&cj69^C_xCIj2-QC^YVdL)ZK{gQFJp|X_5WrbU*tu$6zE5b@= zrMEIz8Ldbwla<-ZVr8|mS=p@|R!%FImD|c=MOk^Rd{(p-W97FBSOu*@R$;4%Rn#hG z6}L)QC9P6cX{(G?)+%R}w<=f_tx8s9tBO_Cs%BNUYFIU`T2^hVj#byHXVteFSPiX4 zR%5G))zoTcHMd$=Ev;5oYpadb)@o<9w>nrItxi^FtBcju>SlGfdRRTJURH0bkJZ;= zpMF+|&%bZdq+ z)0$t*};FtE|=58f&e!&RTD6ur^wo ztj*RIYpb=*inq2~3Dyp4r?t!4ZSAr4TKla1)&c9Fb;vqwC0a+Uqt-F&xOKuhX`Ql8 zTW74ZR+4qjI&WRDE?SqY%hnYu*}7_7v#wh=tee&?>$Y{rx@+CD?pqJ6SFBg9*R0pA zH>@|Uht^xx+txeQyViTw`_>26ht@~d$JQs-r`99uvGtktx%I?)YCW^Qu)egOTVGi( ztgo$atZ%KC)_2zT)(_T?)=$>Y)-Tqt)^FDD)*sfN)?e1&)<4$2)_-vdS*{QS5Q;FQ zL@I0hEXay%$c`MyiCoByJcvSGSt$ z60Oi0ZO|6&&>kJo5uMN(UCcO{6TQ$Ieb5)d{rjOm24EltVK9bZD28D;MqngH zVKl~IEXH9xCSW2aVKSy*DyCsNW?&{}VK(L<7IQHV^RWQNLM*~!#9;}RVi}fW1y*7e zR$~p;Vjb3F12$q4He(C6VjJSI9SPWho!Eul*n_>;hy6H!gE)l4NW>8w#W5Vm37o_! zoW>cPMH0^8JTBlOF5xn+AQ@M24cBo4H*pKMaR+yC5BKo^ui#a@hS%{1-o!(^g}3nz z-o<-(A0OaDe1wnj2|mRmJjQ4E98d5R&+rAl#B+Rw7x)_A;9I=JclaJZ;79y~pYaQR z#c%i>f8bC2g}?C+{>6VGaSCw$2p|+;NQqPkM{1-&T0|fn(jx;hA`+R98Cj4O*^nJM zkQ2F(8+j0gyvT=W#2`NkpdbpNFp8ikilI14pd?D6G|HeX%Aq_epdu=vGOC~|s-Ze+ zpeAaeHtL`*>Y+XwpdlKeF`A$$nxQ#bpe0(NHQJyp+Mzu=SC13R$` zyRip*u@C!k00(ghhmnXQIErI9juSYEQ#g$?I2*XEq`;m>sZWQ-rwBfK$>|;^1%`$u z#5_$36iD9iBq@+3Z9=AUTLY6{qu;2XJ I2n>k$A73{Q00000 diff --git a/docs/index.html b/docs/index.html index b5e3fa8a76b..f4a59bcda84 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-03-27 19:15:50 A vulnerability was found in Tenda FH1203 2.0.1.6 and classified as critical. This issue affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-03-27 19:15:49 A vulnerability has been found in Tenda FH1203 2.0.1.6 and classified as critical. This vulnerability affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258160. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-03-27 19:15:49 A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. This affects the function formexeCommand of the file /goform/execCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-03-27 19:15:49 Saleor is an e-commerce platform that serves high-volume companies. When using `Pickup: Local stock only` click-and-collect as a delivery method in specific conditions the customer could overwrite the warehouse address with its own, which exposes its address as click-and-collect address. This issue has been patched in versions: `3.14.61`, `3.15.37`, `3.16.34`, `3.17.32`, `3.18.28`, `3.19.15`. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-03-27 19:15:49 Serverpod is an app and web server, built for the Flutter and Dart ecosystem. This bug bypassed the validation of TSL certificates on all none web HTTP clients in the `serverpod_client` package. Making them susceptible to a man in the middle attack against encrypted traffic between the client device and the server. An attacker would need to be able to intercept the traffic and highjack the connection to the server for this vulnerability to be used. Upgrading to version `1.2.6` resolves this issue. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-03-27 19:15:49 Serverpod is an app and web server, built for the Flutter and Dart ecosystem. An issue was identified with the old password hash algorithm that made it susceptible to rainbow attacks if the database was compromised. This vulnerability is fixed by 1.2.6. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-03-27 19:15:48 Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Users of IPsec transparent encryption in Cilium may be vulnerable to cryptographic attacks that render the transparent encryption ineffective. In particular, Cilium is vulnerable to chosen plaintext, key recovery, replay attacks by a man-in-the-middle attacker. These attacks are possible due to an ESP sequence number collision when multiple nodes are configured with the same key. Fixed versions of Cilium use unique keys for each IPsec tunnel established between nodes, resolving all of the above attacks. This vulnerability is fixed in 1.13.13, 1.14.9, and 1.15.3. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-03-27 19:15:48 The Pi-hole is a DNS sinkhole that protects your devices from unwanted content without installing any client-side software. A vulnerability has been discovered in Pihole that allows an authenticated user on the platform to read internal server files arbitrarily, and because the application runs from behind, reading files is done as a privileged user.If the URL that is in the list of "Adslists" begins with "file*" it is understood that it is updating from a local file, on the other hand if it does not begin with "file*" depending on the state of the response it does one thing or another. The problem resides in the update through local files. When updating from a file which contains non-domain lines, 5 of the non-domain lines are printed on the screen, so if you provide it with any file on the server which contains non-domain lines it will print them on the screen. This vulnerability is fixed by 5.18. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-03-27 19:15:48 JupyterHub is an open source multi-user server for Jupyter notebooks. By tricking a user into visiting a malicious subdomain, the attacker can achieve an XSS directly affecting the former's session. More precisely, in the context of JupyterHub, this XSS could achieve full access to JupyterHub API and user's single-user server. The affected configurations are single-origin JupyterHub deployments and JupyterHub deployments with user-controlled applications running on subdomains or peer subdomains of either the Hub or a single-user server. This vulnerability is fixed in 4.1.0. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-03-27 19:15:48 wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. 详情 @@ -1971,6 +1971,14 @@

眈眈探求 | TITLE URL + + 0801fe221df23a2ee3acb50a0ae0caa1 + CVE-2024-26128 + 2024-03-29 03:21:09 + baserCMS跨站脚本漏洞 + 详情 + + 7bff88e2b8d49434581ec1e06c85484f CVE-2023-44252 @@ -2203,14 +2211,6 @@

眈眈探求 | 详情 - - 260185a35570fc92a918018ae9c2e506 - - 2024-03-28 03:22:45 - SourceCodester Free and Open Source Inventory Management System SQL注入漏洞(CVE-2024 - 详情 - -