Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 21, 2023
1 parent a843820 commit b3b943b
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 9 deletions.
1 change: 1 addition & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -193,3 +193,4 @@ dceae23583f9a04fc530ed224b49b378
d5f9b68a051c497fca8417eb1e6f4095
473febfe8ab9bae26b7462a218a4533f
c067401155eebe16566d819dbbc0fdd9
77fb68b61f9b45e5d5d973d9698f7d7d
Binary file modified data/cves.db
Binary file not shown.
18 changes: 9 additions & 9 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-09-21 17:25:27 -->
<!-- RELEASE TIME : 2023-09-21 20:22:33 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2243,6 +2243,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5062">详情</a></td>
</tr>

<tr>
<td>77fb68b61f9b45e5d5d973d9698f7d7d</td>
<td>CVE-2023-5054</td>
<td>2023-09-19 07:15:51 </td>
<td>The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.2. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5054">详情</a></td>
</tr>

<tr>
<td>6a35eb0ecc6baafa493f36c4ed2d4d16</td>
<td>CVE-2023-5060</td>
Expand Down Expand Up @@ -2459,14 +2467,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20236">详情</a></td>
</tr>

<tr>
<td>86a2ec17900da16bc0f1d21d3bbefd35</td>
<td>CVE-2023-20233</td>
<td>2023-09-13 17:15:09 </td>
<td>A vulnerability in the Connectivity Fault Management (CFM) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incorrect processing of invalid continuity check messages (CCMs). An attacker could exploit this vulnerability by sending crafted CCMs to an affected device. A successful exploit could allow the attacker to cause the CFM service to crash when a user displays information about maintenance end points (MEPs) for peer MEPs on an affected device.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-20233">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit b3b943b

Please sign in to comment.