From 91e9e6b27b095fc00cf8c792101dc88b24d3a383 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 20 Dec 2024 21:22:33 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 50556928 -> 50565120 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 718137580dd..bf9ff7366e4 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -158,3 +158,13 @@ a171fb73bfdc33c86ae3a19612719ee4 6c93d59c8fe4b93d71a5315b26b6eab2 43e6502c5abfce4e5f77de13ac605dc7 3d34d3cb1b0f5f7a4893a019ea08a3f1 +bdfbd17f2382028f4e33b61a86766504 +cbb4b3eca5b2e6dfd87baafe5169ef53 +203c7ea78f5b448dabd95feb3f218ab6 +39fb852f2a13d05cdd353a2c2df826d4 +d4fcd342a3c4221b15af4063cbe735b3 +f8e90f619a017b9c36ee9f7b7500acd2 +8ff4aef0b81de6a002b2b8c4bf689608 +da91c00f5d2a99f894f6bf3d0dab8df1 +03f6f28e0195eb4df4cdb5c8f257c2c4 +2a219fd745f871769350db0d47bc4fbe diff --git a/data/cves.db b/data/cves.db index bb11a7ee54e052d2adc2ea9f2e16f4d278346245..573a2047819fb38be28db5c53274861a47e062f2 100644 GIT binary patch delta 8101 zcmeI$32+qUwg+&gCm|sT$dUvITeA~L!p!unQITD?$S$~YdS<$lk;zOlOF}?_07sEU zK+skM8Wa~?aRWCDK~O;uK?D>RaE+n}?ug?3_XMna5$pP@-h1`lEsOenO33ur=X~4w zX6E6At!A#irPbm#$*u+sES@FeB_>xjF`1YICNonKQ!-OSrWB@BrbbL@OzBJ+OpTeE zFkQgZl&Kk0bEXzdnM_$s*-R~&S~0a|%3*55)Rw6oQ+uWkOd?Z9rcO+qnYu7_W$MP% zov8;?E>lmYUQBsR`Ah{&y_qabRwf&h#AIi3FgclAOl~F*Qz6rZOcya-%+!bJ5~jXP z{h0bQ4PY9`G>B<1)1^#9n1(V9V;ashf~kn&OJ)8$MPm?kn^ z!E`0lRZLeiUBh%O(1L*RO!Ju* zFfC-dg=rDfVx}cbw=ykdTE=u6)9p+e(;ZBAGA(Dii)jVZN~TpzI@4;VHB5Ii-NUq& z>0YM$nC@qKfN34mgG>)GJNj_G-( z7nn9Ny~tFPiJ(??7nGkwDJDbr_6bxfZ#eZh2; z=}V@sn2s@h&2*gU1k*Q6-!gs2^gYuLOg}RH#B`GBXQoq3zcBsEbeie6o5{40Odx<6 zk{}rxLJFipBS?dE$biPs1TKK4&sfCKo|sr z;Zhg^Ltz*UhY?T&m%&IF1*2gMjD>M99xjIoFcGeRE8!}*8m@tBVG z6hjFF;5wKLK`4a~grN+|Ap%i|K^!We5~e^EOoeH1J=_4(VFt{EYM2GHVGc0d2sgo8 zxEbcbd{_Vr;TBi~i(v`e3QJ)b+y=LU26w=nupI7!6|fRkfex!-4cra)z*@K$?t}Z` z0aynQ!b9*dJOYoxW3V0`hbQ1kcnY3|4X_cOfoI`4cphGWP4FVrz-Fk0E$|X-g>CRM zyaKPncGv;0!A{r(ufuM51NOjPcoX))Td*Gvz(IH$-ho5#F1!ct!v}B}j=+cT5qu1v zz^CvT)WPTQ1ssJh;VU=>U&C=Y0pGy4@Ev>)KfsUh6P$#f;S~G=zrtzw&2%#fSpFb@ z8Im9w8bS)BLL*3nbjX0l&;%}krqB$ULkq}+EXanI&!gkmJufa~(1+T+ycmwvpUU(Ds!CSB&4!}Wp8{UCK@GiUu@52Xh7>>Y)@DY3r zpTMW^8Pvh&@P)96jtXlRrM_rh*}y1X_0_ZX2tBk`WqtZ@ERe67W2*Ui$x&gRDJi3U zM$4MHOOFb2s@AOOXiJ90&2@SBh>PoT7j<26R6z5k(R^hz$BgD{qd9IgCyeGBqxsfo zzB8KdjphfV`O#>8GMbY{^Rv;MGMZnE=2xRRZ8X0L^SiDv<9|%%nyxDZ^9L_=Xp)lJ z;DSJt{Z0Beeynk;3{L+#eN5Vxv>uHXq@GOmr_?knn`ZjaywS3L&oLo?)&#t3T2X#( z^(3i!lI-=XUcc3)+9bElVsoo@MUuQutL%2VoKA<{F?dpFE7+X+p6@RbTC^1hjw=$! zhSiwpSE5QJAO{0em8cl@UZ?o9jsUBG8s!g^^ev8BB_e%~*w)t#+)or~0%8!J0E$lAK$nuyRQpCX#xm2kPM<#3K zugeyFX2moiJ5>qA0I?f7u>!&RhRj_Za=25$Dt}-NwrzsvflCGgF>53hr{l&o|6pi$i#RHedhEHLPzazyYVTV0wJ;f zR|*D%L$OFW7*rzBg7KKxXaBBSN_z>}`l9$KAx)pTV~DAtw#z;@MGH^ZldU&-Tu48*#DPbLf?H;L!ry>$+IrKf$Mr2$y=H%ElrkvUa#FN zDL&cZwJA=&>UX=mvaBi&tJ9;X`jM$yg*M3!rzE-b+RWv`0DX1ty{44pap6**tdHJZ zE40&xE}xAKzTR}F&|$D7<%wz}Tq=4BEcjDo#XOFL!b8-LT2koJQNCqip4}{G0|9OqEC)0qPFY6=$6{d1uHXW zL@I(xOstFqVv4AQWN%RMi#;NW><@>q377@2pHV7I{pGh*5kf7EUa(P&kzD zS5!G3j2TNhu3$ZisvL|exnikYC599{Quh1tq;NIT$&jh8M z6OO)lM|)GIqXIL@*eUSrVRD6R^jsy%5k-tgjSwpXv63@!7K-`enaK6c>js*#dKM<$ zGg=jmDWzgrBwVIMVpZ60LIr_vK|HDqkP*WG*;k_IyK`!UtQlvbO9UbI2pF4lB0lUY zh&d8RWWV=eq&4wI*qZ-xKhZofpc+Zc6HDXKnCMl`X4L4jpYn%J&*bxuz1pmJfl4{z zj~0p{Bb57X{?BHFc_}HXiAA!J3FVadnD#4QjawK>r6doO3PRt#=^pcHr@)U3@3U! z-%uyUvVMfURc8lStVHr~GQ^OKP{ALM1N+~L`0qu0cC+|<5&w@Y;$i=Ni&$SA6-?c8 za4;GNuu<|hG-otu+#qd3%8=w^NfqXrW_>Ri(zmXDM7~OBC{@Qgx|plWkUy z>UY^4s@r9CIX#lY;`dtoc9+*@SM|}IpA*_7;lU2Qwo5?h*xp`XwTVV?iz3)BssSbF zKXV>dVo%X$Jln~X)jM%cRRokuV_%A4uZxN}jY?6dVqN|7e&eXG^J{-N_Sc@={Etu8 zW{lroASHr#*k_@*wYHR&_5zve749#eGpNiW#JG?4PQ8p zJOoit7-#3iv19)v$n$hy`>%Jf>b8kO_cI|oW{u}MOCscJr0Q#AzwEL4EEd(_x5*xl z>h{=Gr&q<*1_iHMFE2m#d&tg2$juWW2M~lWjx%9m(TGv29%+SBwZryJ4YmA{@1}Mu zL-4raps1NRagZp-Vz`a`NqqnQX^sEoY1*2lH9hV1L*TqIz;(TiNVr_$a@nn_c3Dv^ zUboe+IAx2)=CygUVp-(*EAAGR+mCnOFGL=<1FpT87& z9aIqx#uHbsv6D5q*XT_Bc%we1BvTJfeyAwZl&kg2-qJ$fHRLlPOM7(R+;q*gZg^9j z%uP&5+Hp%!x=s^Lo05CUC@B-qGp4k0?kgfHiOEJ?lc+j;kw94tr-N zW)A~AgB~8#wMC59_zyzH4bCQ@TFtkrSro+8Y-yODl9b-A38>XRjYP z-$8BtPl&w3zlmHkZB)AHhX*|`B=yE%&l$vZ1;#9yT_nvel2y0jv8Ya~N48j9UXM?5 zDvC#Sd0h^RMb?j4Up3{V8h0zV-O^91UH(+N4$723G=>r_B#t%evLNmR1>%Gf#ke<& z8b3}SY5vTVr5|_g5|Xa&T@s6xO+pbjC7?umho;r8w~s8U`aR{(@du(wCJrWF<(hy8vXtcqE|*2k@FO0(*MN} zvd$ZVzJ9P^?qy3Po~LnLeqv#pB{s``yXx~xcAG5u>^7U#Yjwz~-QtvdUd1IjH0#>S zTI)@nhlHeLtJ~Qxr1!3#BIIhFKVH+SUHF`DVMM2Kfy}F~srAD}=|WaFY`}8jI~EMF zH#|iw#n&w|mY}h^!WfpNW9Ki)VTmQW9DN}|h4jpLB2V?9aN_iZ^ERG*DqCo6l zg<4<6QE&vmmTAVX=_mHKGquc)DxoNDdKI{&%7Gy2>KOhL)t7womC&K-neVX9e6{lb UE`S{U*8?F_=lbsg%ou`y09sCU_y7O^ delta 2978 zcmWmGWsnwR7=>Z>TVm-_SVW{*LPA17N|2InkvxQSBi+bBI;EFTx>FjK4nexRL%JKh zzaQ5<@9#77%)I?)jSBC7Wn}o6lrgeLi4lAdX%lgL3ZRN4@TKTMRt^8I2tDyCrRmduA6|st1#jNkG z;#LXk2dku2$|`M@vC3LMTIHYnV0M8exsJMp>h+G1gdXoHgG1 z!oRn}^2jrF&+)>>z+w>DTCtxeWuYm2qjin6v@+pQhePHUI7+uCF8wf0&2t$(Zo z)yUNWI$|BQj#O+InNXwcc6ptq;~m>(fw$j8q5$ z2t{Yy&_p*|X*A%goiLSr;RQ~ZKvXpRXpau)h)(E?U(p3!(GA_v13l3Tz0n7K(GUGG00Z$G2EiDN-!TM3F$}{o z0wXaBqcH|!F%IML2PR-5CSfwBU@E2|64NmQGcgN);xEj`9L&W$%*O&O#3C%l5-i0s zEXNA0#44=D8vKp5Scmo4fQ{IM&Desih{85(#}4eoF6_o0?8QFp$3HlLgZLMRa2Q8$ z6vuEJCvXy{a2jWD7Uyst7jO}ma2Z!{71wYbH*gcTa2t1U7yscN?&AR-;t?L>37+B^ zp5p~x;uT)w4c_7%-s1y4;#0^_1vq~M5Q^xCftZMeFvLb2#6>*BM*<{7A|yrNE3H*SPD237}gR=M$St$60Oi0ZO|6&&>kJo5uMN(zoHAeq8qxS2YR9x zdZQ2eq96KW00!bW41zHjzhel7Vi<;F1V&;MMq>=dVjRZf4@|&BOu}SL!Bk8`B&K5q zW?~lp#9x?=Ihc!in2!Zmh(%b8C0L4OSdJA~iB(vQHTWBAu@3980UNOio3RC35ru8o zjvd&EUD%C1*o%GGkAH9g2k|cs;V_QiD30McPT(X?;WWeV0 z&-TS6QA5Vx3p5Iwlz2tyqN5`s?*+*HU>*eXFqlWdJPzhbFi(Sd7R>WtUIg + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + bdfbd17f2382028f4e33b61a86766504 + CVE-2024-12677 + 2024-12-20 17:15:07 + Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary code. + 详情 + + + + cbb4b3eca5b2e6dfd87baafe5169ef53 + CVE-2024-56337 + 2024-12-20 16:15:24 + Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97. The mitigation for CVE-2024-50379 was incomplete. Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed) Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can. + 详情 + + + + 203c7ea78f5b448dabd95feb3f218ab6 + CVE-2024-55471 + 2024-12-20 16:15:24 + Oqtane Framework is vulnerable to Insecure Direct Object Reference (IDOR) in Oqtane.Controllers.UserController. This allows unauthorized users to access sensitive information of other users by manipulating the id parameter. + 详情 + + + + 39fb852f2a13d05cdd353a2c2df826d4 + CVE-2024-55470 + 2024-12-20 16:15:23 + Oqtane Framework 6.0.0 is vulnerable to Incorrect Access Control. By manipulating the entityid parameter, attackers can bypass passcode validation and successfully log into the application or access restricted data without proper authorization. The lack of server-side validation exacerbates the issue, as the application relies on client-side information for authentication. + 详情 + + + + d4fcd342a3c4221b15af4063cbe735b3 + CVE-2024-55186 + 2024-12-20 16:15:23 + An IDOR (Insecure Direct Object Reference) vulnerability exists in oqtane Framework 6.0.0, allowing a logged-in user to access inbox messages of other users by manipulating the notification ID in the request URL. By changing the notification ID, an attacker can view sensitive mail details belonging to other users. + 详情 + + + + f8e90f619a017b9c36ee9f7b7500acd2 + CVE-2024-12840 + 2024-12-20 16:15:23 + A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with the http_proxies variable set to localhost, the attacker can fetch the localhost banner. + 详情 + + + + 8ff4aef0b81de6a002b2b8c4bf689608 + CVE-2024-10385 + 2024-12-20 16:15:21 + Ticket management system in DirectAdmin Evolution Skin is vulnerable to XSS (Cross-site Scripting), which allows a low-privileged user to inject and store malicious JavaScript code. If an admin views the ticket, the script might perform actions with their privileges, including command execution. This issue has been fixed in version 1.668 of DirectAdmin Evolution Skin. + 详情 + + + + da91c00f5d2a99f894f6bf3d0dab8df1 + CVE-2024-56356 + 2024-12-20 15:15:09 + In JetBrains TeamCity before 2024.12 insecure XMLParser configuration could lead to potential XXE attack + 详情 + + + + 03f6f28e0195eb4df4cdb5c8f257c2c4 + CVE-2024-56355 + 2024-12-20 15:15:09 + In JetBrains TeamCity before 2024.12 missing Content-Type header in RemoteBuildLogController response could lead to XSS + 详情 + + + + 2a219fd745f871769350db0d47bc4fbe + CVE-2024-56354 + 2024-12-20 15:15:09 + In JetBrains TeamCity before 2024.12 password field value were accessible to users with view settings permission + 详情 + + 1fc440261e27306b1a7f59bcbc5673a3 CVE-2024-52897 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - 3246b89d17ebce389ad043c2a5c46a02 - CVE-2024-53144 - 2024-12-17 16:15:25 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4 ("Bluetooth: Always request for user confirmation for Just Works") always request user confirmation with confirm_hint set since the likes of bluetoothd have dedicated policy around JUST_WORKS method (e.g. main.conf:JustWorksRepairing). CVE: CVE-2024-8805 - 详情 - - - - 0110a638f9542db0151b15913612ab7b - CVE-2024-12671 - 2024-12-17 16:15:25 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. - 详情 - - - - 0ab2d39bdfff0e23d4d8d88f0f6277fe - CVE-2024-12670 - 2024-12-17 16:15:25 - A maliciously crafted DWF file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. - 详情 - - - - 145033e556d1e530ea6a0b253f2d5076 - CVE-2024-12669 - 2024-12-17 16:15:25 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. - 详情 - - - - 7cde8f0f4cc3ce2107f1b9d29acc3798 - CVE-2024-12200 - 2024-12-17 16:15:24 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. - 详情 - - - - 4a5aca1b061dafb45b2596285c7b52b6 - CVE-2024-12199 - 2024-12-17 16:15:24 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. - 详情 - - - - 3b6e859f26639254ed32fb8e64162bbe - CVE-2024-12198 - 2024-12-17 16:15:24 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. - 详情 - - - - 76de3ac3512dd89b9892cb5fbd135978 - CVE-2024-12197 - 2024-12-17 16:15:24 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. - 详情 - - - - b6d1b5a24856c4e6171b742be38c0516 - CVE-2024-12194 - 2024-12-17 16:15:24 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process. - 详情 - - - - b7621d7f4b2ce07c211af869a2a8dc89 - CVE-2024-12193 - 2024-12-17 16:15:24 - A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process. - 详情 - -