Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 18, 2023
1 parent f06ed20 commit b40ac84
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 17 deletions.
2 changes: 2 additions & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -100,3 +100,5 @@ fee42c5c3350c0778bb8eca01c5e2efa
7abe9e444fb931d9847478bb3d8226b0
85ca0426243514b04281aa2dcc9a082a
e0f12a28e563b380d0bcd0cb148c9532
e2a2e5f66f7313ce93cb9b8dcde37c58
24cc779bd99caa6238823d0a69145f2c
Binary file modified data/cves.db
Binary file not shown.
34 changes: 17 additions & 17 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-09-18 14:27:08 -->
<!-- RELEASE TIME : 2023-09-18 16:30:32 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2315,6 +2315,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-21523">详情</a></td>
</tr>

<tr>
<td>e2a2e5f66f7313ce93cb9b8dcde37c58</td>
<td>CVE-2023-21520</td>
<td>2023-09-12 20:15:07 </td>
<td>A PII Enumeration via Credential Recovery in the Self Service&Acirc;&nbsp;(Credential Recovery) of BlackBerry AtHoc version 7.15 could allow an attacker to potentially associate a list of contact details with an AtHoc IWS organization.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-21520">详情</a></td>
</tr>

<tr>
<td>85ca0426243514b04281aa2dcc9a082a</td>
<td>CVE-2023-21522</td>
Expand Down Expand Up @@ -2387,6 +2395,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4913">详情</a></td>
</tr>

<tr>
<td>24cc779bd99caa6238823d0a69145f2c</td>
<td>CVE-2023-2071</td>
<td>2023-09-12 14:15:09 </td>
<td>Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user&acirc;&euro;&trade;s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. &Acirc;&nbsp;The device has the functionality, through a CIP class, to execute exported functions from libraries. &Acirc;&nbsp;There is a routine that restricts it to execute specific functions from two dynamic link library files. &Acirc;&nbsp;By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2071">详情</a></td>
</tr>

<tr>
<td>7c1f5e1b9d461277f697f2c39a7601b2</td>
<td>CVE-2023-27169</td>
Expand Down Expand Up @@ -2451,22 +2467,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4897">详情</a></td>
</tr>

<tr>
<td>fee42c5c3350c0778bb8eca01c5e2efa</td>
<td>CVE-2023-2705</td>
<td>2023-09-11 20:15:08 </td>
<td>The gAppointments WordPress plugin before 1.10.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2705">详情</a></td>
</tr>

<tr>
<td>ce11eb07fe14170208adf7b1b2a208c4</td>
<td>CVE-2023-4881</td>
<td>2023-09-11 17:15:07 </td>
<td>A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4881">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit b40ac84

Please sign in to comment.