From b3b943b896a3782f9cad478a619900bd8954539e Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 21 Sep 2023 20:22:35 +0000 Subject: [PATCH] Updated by Github Bot --- cache/NVD.dat | 1 + data/cves.db | Bin 42950656 -> 42950656 bytes docs/index.html | 18 +++++++++--------- 3 files changed, 10 insertions(+), 9 deletions(-) diff --git a/cache/NVD.dat b/cache/NVD.dat index e54242b80e4..9b0cf988fa0 100644 --- a/cache/NVD.dat +++ b/cache/NVD.dat @@ -193,3 +193,4 @@ dceae23583f9a04fc530ed224b49b378 d5f9b68a051c497fca8417eb1e6f4095 473febfe8ab9bae26b7462a218a4533f c067401155eebe16566d819dbbc0fdd9 +77fb68b61f9b45e5d5d973d9698f7d7d diff --git a/data/cves.db b/data/cves.db index af6e61dc536a03651a648fa91cd0f26ede4c212d..75d13ffa2d3002a949e668f9df5bf14f86910040 100644 GIT binary patch delta 2497 zcmWmD=X(tX07miND?)_Wd+#j?xfwRGXN=h66%l(An*=Ws1Z|BDvual9q(h^0Z>2+b z>7b=Gs=L+G55IrlJkQBGb+SwrHdYRt-Bcwxa5h_3zzSLgtT3yf6>b%>3R@9Y5i8Ov zY8A7htm0M)tE5%RDs7dq%39^D@>T__qE*SNY*n$UTGg!TRt>ABRm-Yv)v@YY^{o0< z1FNCc$ZBjgv6@=VtY|C7inW?sEvz^zWW`$vR-%<;wX|AUt*tgzTdSSb-s)g=w34k( zR%fe=)z#`|b+>w0J*{3=Z>x{h*GjSaS^cd6)<7%O8e|Q&hFC+bVb*YKgf-F{WsSDz zGsa4@##-stI4i>%Z%wc!T9d5F))Z^1HO-oC&9G)#v#it`KuC>-$XRWvLtPR#iYm;@ib&qwgwb|NYZMC*p z_gVK_4_FUc+pQhePHUI7+uCD2WbL&cw)R>3tpnCU>yUNWdc-W6V@}Ht#j6S>jUdU>m%!9>w@)(^{Mrl^||$h^`-Td^|f`;x@3K0eQSMZeQ#a1 zu2?@Q3Evi`RIvHrF0#S6vYsQ;wXWVD237}gR&@x@~D7{sD#R>f~u&7>ZpO5sD;|7gSx1P z`e=ZLXoSXSf~IJOXv82E&CvpJ2q7K`NJJ7^q7_=B4cej|+M@$HA{m{~8C}p7-OwF9 z&=bAT8-36hDd>m(7=VFD#UKpE5DdjI495tJ#3+o$|NX}x4P%jxamc`UOu$4;!emUr zR7}Hk%)m^{!fedJTx4P%=3@aCVi6W&36^3RvXG7CSb>!=R$(>PAP2cvi*;C!JZ!*5 zY{K2R2lrw#wqPr^;Xd4t2k;=aV+VF(7j|P09>QKcjD6UT12~97IE+Vd1drk@fE(tMO?x+_!i&cdtAm9{D2>E71!_+e#Uj&z)jr3 zFSw0g@f&`}ANUi0;cxtde{m;}qagbuhyn;hL4>0a3L^qV5Q(BFhA0$A36w-Bltvkp zMLCp51yn>OR7Mq4MKx4M4b(&})J7fDMLpC<12jYC&f7VXd;9ncZU=!DMbg0AR>?&yJ@=!M?sgT6>XKlH}{3`8mhVK9bZD28D; zMqngHVKn~lKL%+Si*$@b2F7CoCSnpMV+y8X8m40gW?~j*V-Dsb6Z0@13$PH2uoz3Q z6w8o>Y%IqLtc0-&tFZ<-$i-T$!+PWePijMOZ{LUl;i0>tszv68A1`_RPMtu0OxEnc zov=+Q1)Jrjth~`HvUh6zoaj(abaq5SLPlDAVp@D`Mp9Z_Xj~{gl%AB(B0VWSDKR4< uedq4f6M^XbsN}rhgkYdXerD&q;IQD%BeyREV#7i)p}73q;TwXPVgCW8SFHg6 delta 2419 zcmWmDWqTF`07hZ=ZZKdpqq`eMcXy8NcgMUkU1!RVU}7!@l$05Sph593b7Jc39V2ok(Jm=Vue{rtz=emD}|NP zN@bSA@Z=+n*WZuPKw zTD`2^Rv)Xc)z9j04X_4UgRH^U5NoJ4%o=Wuutr*=tkKpOYpgZS8gEUoCR&rM$<`Dr z%9?6Tv!+`!EL$_JS=MYT+KRE}SaYp;)_g10T3{`--nSN6i>(i=53MEEQfryD-1^A+ z*!sl!)LLP!v{qTGtu@wKYn}C(^||$h^`*7m+F*TUeQkYXeQRyBHd&jkE!I|Ro3-8A zVSQ(PZ|$^pS-Y)0)?O>l+Gp*z4p;}RL)KyIh;`IDW*xUqSSPJh)@kdEb=Hcv&ROTJ z3)V&Jl6Bd-V*OzKXkE3gS=X%_)=le{b=$gQ-L>vn_pJxkL+g?C*!s!(+4{x$)p}w* zwVqketryly>o@Cn>ksQs>y`D|`pf#;`p5d$dSkt{-bE{Do`MiSFhY<32@#4!NQ@*1 zLsBF|a-={?q(W+>K{(PP9nvEMG9nW)BMY)38?qw@av~RUBM$k z7>XkTB~TKjP#R@W7UfVL6;KhCP#INF71dB3HBb|^P#bkn7xhpd4bTvc&=^h76p?6# z=4gSIXoc2jgSKdg_UM3)=!DMbg0A?#e>ZeT5A;MY^hO`_ML+b%01U(+48{-)#V`!V z2#mxijK&y@#W;+|1Wd#vOvV&MVJfC!I%dF_iCLJ9XvAO+=3*Y^BNhv=5bt9V7UKha zh$UExWmt}n@G(BYr&xiNScTPCgSA+P&+s|Ez?WE$4fqOQ;~RX7jo5_E*n+LthV9sa z@9;f#Vi$H}5B4Gs`>-Dea1e)Z7)Njv$8a1ca1y6*8fS18@i>R`xPXhegv+>sAMhit z;u@~w25#aOZsQK_;vVkf0UqKJ9^)tcj9>68p5Q5-;W=L5C4R&2_yd396<*^n{EdI` zFW%rS-UUS~!2Spz7$Hc2ga}0=dVjRX}0w!V-CSwYsFcs4<9W!9e z#4OB4G-5CZb1@I|1A7!3SQ{A{2#a|ydA6{)R2ydo#s$YkM2!e~7qTPbcH7Y4xR{Qy IfzcuV0kqbXVgLXD diff --git a/docs/index.html b/docs/index.html index 3b7192003b2..0c740880e09 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -2243,6 +2243,14 @@

眈眈探求 | 详情 + + 77fb68b61f9b45e5d5d973d9698f7d7d + CVE-2023-5054 + 2023-09-19 07:15:51 + The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.2. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer. + 详情 + + 6a35eb0ecc6baafa493f36c4ed2d4d16 CVE-2023-5060 @@ -2459,14 +2467,6 @@

眈眈探求 | 详情 - - 86a2ec17900da16bc0f1d21d3bbefd35 - CVE-2023-20233 - 2023-09-13 17:15:09 - A vulnerability in the Connectivity Fault Management (CFM) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to incorrect processing of invalid continuity check messages (CCMs). An attacker could exploit this vulnerability by sending crafted CCMs to an affected device. A successful exploit could allow the attacker to cause the CFM service to crash when a user displays information about maintenance end points (MEPs) for peer MEPs on an affected device. - 详情 - -