From 9a81a7d36093554940327b089b59d2de6cbd7a86 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 22 Sep 2023 12:40:18 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 42975232 -> 42979328 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index a09664236e1..2c72b83f293 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -135,3 +135,13 @@ f463a55fd8c986743d78c035e143b461 71fb4e65038bc255edaf07dbec76bac5 76bf447ee9f0afb2854c3a8ff53ccddb ab04749c9f3ddc0445a3f44a7398b9f9 +4be0e0b7dcbfa7985ab1e337bfafa4a2 +85e83fef12d37bec604f1f22ae863236 +02bd6c0b4a2f4cab127191f125adc7ea +b094359a59d899b3026cedd328a6b4fb +d61674902f7df9f3dcab43faf5c7e158 +b04cdb0f097c48d1eac2cbd53fe0d572 +8f1f92b6da330becdfc35a3f40969131 +7638136db8294d06fabb612b6f7e5ef5 +38d91b20db9454630cde5e699f0f1e1d +a2a5785871a2aa0d27582585e383c5db diff --git a/data/cves.db b/data/cves.db index 7b513d6593f7755482318ba94b908db63a74dedc..46142c076c485e45f6dd5ad59a43a7a0e9536bcd 100644 GIT binary patch delta 5205 zcmd7UcXSlj6$Wr-Bq1b>Kn95-%3x6hs7%>PwG75!49EfuZt%_S?BX@6f(oJ|iM8!jpCY+{_m0Vm&za{|QWBsn=J`Q!JFG&6Vh&b{x= zyw=u^KCL@D`fMA}HJI6@OUa?_+C(*&*#?0kPz4!+OhJ~Qs~}s@O^_qV6?7LIC+H!_ z6Z91H666bx7xWhN5flgt1$_nm1pNgA1Vw^@fkKyaquEWz1=a|GuK z777*#SRY#u5`+bgAR>qg77NZ3#02LHmI&g48bPg~PEapcDrgWi3YrAXf@Ojh!E(V0 z!Aij@!D_)8!CJvOL93um&@NanNC-r*L9kJH7Qsb=iv?Q++XUMMKM?#- zaEahj!DWJ^;Bvtgf-41A39c6G5L_d01v>@T3a%4eFStQ)qu?gN&4OD5w+e0(+%C97 zaHrr$f*%WhBKWD`F2UV`dj$6ib_wni+%Nc<;OBw|1P=-x5E@N2;vf;RPP))02R?d8bpI>2x&BwPM~5MM#E_YjieG9MWbm9l~Ng%Qw8Z{kVzJK z$V)!*Q-Fdrmd4R|nm`k25}inubP`RbDReSTrBi4cO{Y_72AxJTX%@|9q(zjjzfBVA^MvBrfi1FPP))02R?d8bpI>2x&BwPM~5MM#E_YjieG9MWbm9l~Ng% zQw8Z{kVzJK$V)!*Q-Fdrmd4R|nm`k25}inubP`RbDReSTrBi4cO{Y_72AxJTX%@|< zDmtC2X%5Y$d2|NNrv-E-okeHUIdm>9q(zjjzfB`G?MS^xUQhLY56_J zoG^UJl&88dxqnwGv%o0l`ELaB{J?Js^e10p;81V5Ufvn!(d=4Bi`z|+hNBzmaq~ae zqLlvsK0)r0CvaQGw5t_HXWch0PNZ7W4cky>ZK$&Y-blcTM%W?8@`oZ}pYDkoQPZ>| z0iWgO2M#KOve+)G(%nC5i89#j<*!up+;QG1YTl7Y@8!P47M_%Re!v^K$;Z|&C`uOR zEbV`!dD(?lxv$*xc#NZa#5vH)O7}KBrhe>kBRQ}mH8|7K4`0&9@-W!@Pr=4_^yTnE z`=91p@U8hC?t+=_g0*2)BDJiu3mMji4BHcm=n*~Scfz5l?GFaLTsaYo4dKhk_P9g$ z_EQI@+u-@$$C~r)4XFOQwU1+RG8(X6lFSgo?ZQHcH{(v{&H~5#WJEq?o zFuhzMR=^5-U8CVvrD&4JGR(k~veTx|nxRdZUR@T@eVSqF`b@*9oUFCP8Y1yXW24qk z*UT42`U+l9X)KyL-_Z5RvqH)3qxTlLy`CGV?4R%e0#~Y8lq7BWo4p;j>Pr)#>SfjSAIbIuSutQ0A^xo{F6YBR}3Aw4) z4=9G-SpX?Wq}H->BNIcc#E?Z+zzG^5Q+Gl^kJsa~^sp20Mts3wRFArqTlOh~GCf}1 z<5m=pSEmiDs%vbT6K;srH)&2?xVa`$+f=Geo>w*J@Pv$o>g%0k{_d7Schb=D>VV6h z+Le|3xb)nde}&ETtS!~jU9cM?juxxc z=0xh7A~hj)gT+nH+hfY=XxC7Xs~l z6RFkdrP4OUY8zq)_>l-Q5y!SHou3US8n(Q)74_&rU(mQp*{l}zwhX`FJ8J7uZkX=F zS1waVxqGT>l&)p5cw|DfdAVI4uUmZd>*SkTrGJX-epF;~`}GaO{;?hLwV$0xt?EoO zY_)O!p?ktkNRR44f7lanjEEgJ!y(7ZFP`prU3;yr4$d(AmG08Z7Al3qIa!X)SF_{s zx|T*QvOK*)8|)@dF?Z<8?aDwGuf43~y7j9^E8UX&vo>eu9@*+8_rJfg&~4={v;Wgu Ox>c`EQ%f@ZhX3zwO7k)R delta 2457 zcmWmG<#!eY7>0570;9&LQKLq8*XZuf(cE-*Ghzd7VAMdx1f?6LM^6E}5HRU(6BH)K z^?vwWf53gtbIudDE;%ADE;(XlWN36ss#K+3tct21h)#)@6=DUf)K(fRtrcpev(j4` ztc+GBE6mDlg%ZvesB@t+%artaa9UYlF4X+GK6Ewpd%OZPs>chqcq%W$m`!wcfM# zSbME~)_&`Nbx}iG^^x_l^@;VV^_lg# z^@a7N^_BItb=LaEI%l1?E?D1M-&x;VKUhCnKUo*8OV(xUignexW?i>#SU0U()@|#K zb=SIQ-M1cC53NVmW9w(@7wcE+H|uxn59^8b)cVu<%X(%#w^FRXtrylm*1y(&2?|-R z5Co7KX^YNHP7q8{p_0UDwa8lwrCq8XZ_ z1zMsNTB8lxq8-|!13ID;I-?7^q8qv+20hRdz0ezd&=>vCAHn?xU?2uzFos|#hG95H zU?fIiG{#^o#$h}rU?L`AGNxcEreQi}U?yTQ3$rl?a}kGl%)@*vfUyvZuowwgf~8o7 zp|3VTJ;QSFlYNSD0gd!c%BLgxb6T*-g;mCrl$cF65 zfe7S8F62fY^g&|ESia>Jg>cl`oWV%53=~P)1o|NtEg?(v~qoR(5gl0@WeKIjnFXVs1 C^rYPY diff --git a/docs/index.html b/docs/index.html index 4668c078f0c..7bc5eafaa39 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 4be0e0b7dcbfa7985ab1e337bfafa4a2 + CVE-2023-23364 + 2023-09-22 04:15:00 + A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors. We have already fixed the vulnerability in the following versions: Multimedia Console 2.1.1 ( 2023/03/29 ) and later Multimedia Console 1.4.7 ( 2023/03/20 ) and later + 详情 + + + + 85e83fef12d37bec604f1f22ae863236 + CVE-2023-23363 + 2023-09-22 04:15:00 + A buffer copy without checking size of input vulnerability has been reported to affect QNAP operating system. If exploited, the vulnerability possibly allows remote users to execute code via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 4.3.6.2441 build 20230621 and later QTS 4.3.3.2420 build 20230621 and later QTS 4.2.6 build 20230621 and later QTS 4.3.4.2451 build 20230621 and later + 详情 + + + + 02bd6c0b4a2f4cab127191f125adc7ea + CVE-2023-23362 + 2023-09-22 04:15:00 + An OS command injection vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability allows remote authenticated users to execute commands via susceptible QNAP devices. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2376 build 20230421 and later QTS 4.5.4.2374 build 20230416 and later QuTS hero h5.0.1.2376 build 20230421 and later QuTS hero h4.5.4.2374 build 20230417 and later QuTScloud c5.0.1.2374 and later + 详情 + + + + b094359a59d899b3026cedd328a6b4fb + CVE-2023-31719 + 2023-09-22 00:15:00 + FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin. + 详情 + + + + d61674902f7df9f3dcab43faf5c7e158 + CVE-2023-31718 + 2023-09-22 00:15:00 + FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download. + 详情 + + + + b04cdb0f097c48d1eac2cbd53fe0d572 + CVE-2023-31717 + 2023-09-22 00:15:00 + A SQL Injection attack in FUXA <= 1.1.12 allows exfiltration of confidential information from the database. + 详情 + + + + 8f1f92b6da330becdfc35a3f40969131 + CVE-2023-31716 + 2023-09-22 00:15:00 + FUXA <= 1.1.12 has a Local File Inclusion vulnerability via file=fuxa.log + 详情 + + + + 7638136db8294d06fabb612b6f7e5ef5 + CVE-2023-5068 + 2023-09-21 23:15:00 + Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process. + 详情 + + + + 38d91b20db9454630cde5e699f0f1e1d + CVE-2023-4504 + 2023-09-21 23:15:00 + Due to failure in validating the length provided by an attacker-crafted PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. + 详情 + + + + a2a5785871a2aa0d27582585e383c5db + CVE-2023-43128 + 2023-09-21 23:15:00 + D-LINK DIR-806 1200M11AC wireless router DIR806A1_FW100CNb11 is vulnerable to command injection due to lax filtering of HTTP_ST parameters. + 详情 + + a41132e7a4615dffb9b1f344ad988e2f CVE-2023-42807 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - 5ddec74e1ec8fdf4a0c3a243f85acb01 - CVE-2023-43377 - 2023-09-20 19:15:00 - A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_contratto.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the destinatario_email1 parameter. - 详情 - - - - 8d232916fa611389b5fbe6408ea2d019 - CVE-2023-43376 - 2023-09-20 19:15:00 - A cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php of Hoteldruid v3.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the nometipotariffa1 parameter. - 详情 - - - - c429f67fc28b9c6ee2d952515cfca94e - CVE-2023-43375 - 2023-09-20 19:15:00 - Hoteldruid v3.0.5 was discovered to contain multiple SQL injection vulnerabilities at /hoteldruid/clienti.php via the annonascita, annoscaddoc, giornonascita, giornoscaddoc, lingua_cli, mesenascita, and mesescaddoc parameters. - 详情 - - - - 4c82fe0696154d0fa062de50317cbb70 - CVE-2023-43374 - 2023-09-20 19:15:00 - Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php. - 详情 - - - - 06a60af972e4e4076a1e6197e407acdd - CVE-2023-43373 - 2023-09-20 19:15:00 - Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php. - 详情 - - - - 36fea47ad554c845ad86105dfda6d4bb - CVE-2023-43371 - 2023-09-20 19:15:00 - Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the numcaselle parameter at /hoteldruid/creaprezzi.php. - 详情 - - - - eabd76036824e6cdf2d145aa26b88993 - CVE-2023-40368 - 2023-09-20 19:15:00 - IBM Storage Protect 8.1.0.0 through 8.1.19.0 could allow a privileged user to obtain sensitive information from the administrative command line client. IBM X-Force ID: 263456. - 详情 - - - - b00f898b6afb085b52edf91cc7604aac - CVE-2023-39041 - 2023-09-20 19:15:00 - An information leak in KUKURUDELI Line v13.6.1 allows attackers to obtain the channel access token and send crafted messages. - 详情 - - - - 277a9acff14579c00cfc353e6f0fd6d5 - CVE-2023-40619 - 2023-09-20 18:15:00 - phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized. - 详情 - - - - 522b82eaffebb2967bf05b47d036d542 - CVE-2023-40618 - 2023-09-20 18:15:00 - A reflected cross-site scripting (XSS) vulnerability in OpenKnowledgeMaps Head Start versions 4, 5, 6, 7 as well as Visual Project Explorer 1.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'service' parameter in 'headstart_snapshot.php'. - 详情 - -