From b40ac84ee5001d7ad87be1541d2edb9b368ccdf3 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Mon, 18 Sep 2023 16:30:34 +0000 Subject: [PATCH] Updated by Github Bot --- cache/NVD.dat | 2 ++ data/cves.db | Bin 42831872 -> 42835968 bytes docs/index.html | 34 +++++++++++++++++----------------- 3 files changed, 19 insertions(+), 17 deletions(-) diff --git a/cache/NVD.dat b/cache/NVD.dat index ef1aac90a97..e8fe848d396 100644 --- a/cache/NVD.dat +++ b/cache/NVD.dat @@ -100,3 +100,5 @@ fee42c5c3350c0778bb8eca01c5e2efa 7abe9e444fb931d9847478bb3d8226b0 85ca0426243514b04281aa2dcc9a082a e0f12a28e563b380d0bcd0cb148c9532 +e2a2e5f66f7313ce93cb9b8dcde37c58 +24cc779bd99caa6238823d0a69145f2c diff --git a/data/cves.db b/data/cves.db index be44640dd5d0e71311d52c1046e340f9aeb57604..f894ff94f0b39acecff5dfb5980537a5f6ddbf8b 100644 GIT binary patch delta 3810 zcmeI!cW_kY8U}E(B%y?2AS#4*Kq&zN$%ZsQdJ9qlp(u(zCudKR1IcdKJxK^65RwO^ z30PRMEg*`$3o2m1E@HthHtdK6yMm%Vi*UX7&Yih4_m6x3xikBFcV=h4_kF+e&g`NM zTay;;+M2YcUEI+I4SMWfYYdJ#S_2}6@DL4&SR#&yCmIori6%r-B7tZ|G$&dREs0Zz zM4}bZnn)r}B~BwwC)yBgiDaT3(Vpl)bR;?v2GN=5LYzUINpvN;5#5O%L<-T9=tcA< zQi(o9Um}f2C%i-k(T~U^vWRRVhsY)R69b5W#9723VlXj;7)lHyh7%)*k;EusG%<$A zBgPVE6XS^S!~|j@kxxt_CKCn36k;kdjhIfHL!3*@AkHJsCuR~C5El|UACo8~EW$_F zL=jO;ln@RviTU)BQ7H56BiQ;h=s%=qJ~&Z z)Dm?Bi6z8R;u2yRv7A^ztRz+umlCUqHN;xtGU9UL3gSv)9T6t3BGwaE6W0*e64w#e z6A@wqv60wB+(2w5ZX|9Zwh%WHw-C1yw-L7!cMx|HcM*3J_Yn6I_YwCK4-i|4ZN!7b zL&U?xc47yylX!%vCw39LiARaYh{uU1h$o4sh^L8Xh&{x!#9rb#;(6i);zeQ~@e=Ve z@e1)O@fz_u@doiGv7dO0c$;{Kc$avOI6%Bld_a6id_;Uqd_sIm93(y?4iTRdUl3ms zUlE6iuZeGnZ;9`S?};CXABmrcpNS*HQQ{ZkSK=7)8}a)x#H>P$c%-4kN}R+?BWWy6 zq^TrGGifd@q@|o9iPB11OOl)_r^)HkM%qfUw3GJIK{`q&F{HC}ku&5>=_=i%yY!G0 z=_$RWx1>rR=__fHE?&uyev&C!k}WxsEB$4F43x8EkPMa~GE|1ia2X*ZWt5DTF_I@^ zalchkW$W)mo)8!mFS7yk0a=y%z3*|DUxC-5l3dp zY$=s8@k>C;WsU?TB(79QrBumWsg`+ik<6EiWq~Y|MN%V+rB>>MvP723C9+JG%L-X3 ztK?EyEo)@0Tqc*x6>_DlldxPR>*Z>>My{3XklLzG?d04i~4%sP>NWJWm-SVhBCXdS#@}xW^Ps=m1 zN1m0v@|-*`FUX6sPhOIjX4%Mm#$zsRq0On#H!W0t|A@fVLYlvs(A zcxfb!rHM3^1ZgJCrG>PVQzTJZNoz@xQ{^-{UD`-nNtSlfUOGre=_H19mM(IJoGD$U zn{<~Rk|I5&m-LoY=_7q5P140H8PZQOB}=j;M{=dV43L3xmJE`?GDL>TFc~f*WTcFe z(K1HzWUQPm<7B){kcpBnlVq|K$P}3>(`34wBj?HtIZw`)nR0<#DADsbrBE#Ki7iD^ zEG6Q|ESW8(QYL;0NV&|BpoGMg3aOMTnJd*YPcD-AaqM=;XSP zQ4|c68Kq8P&o z;rxd-rbHrJCV5)+H~qf9?acI78&*K8s)CN|+J3|N^Eys$w2wE!->C+9UeK*KE@NP`D1+DVON8jQfp<_S~Ur_*Yw(% zMOj%z*%|2>mYthn73LP^_$;5Dk!^*|oq4H|A<4U9V$Do%+E61uFV7h1uPC#F=JCO; zbTlqO+h_Y-$1F7_+g3o6T7B{b73e`41$HnxcmFVsJ^sa_$nM%zp0UF;cLB>WHF2h% zamY0SMS7in*R)){W7l*_Lq?V3YEb>gP38NG?<%r;*(y(KWE=mD Yel!20e#6IV?;I8RI&nu#Y(pLF9~{qtRR910 delta 2413 zcmWmG^>-Hp7=>~61xEMC5gXmz-QC?>n$g{{0T&qE-C%%%jYM#w(?kc zt$bE~tAJI|Dr6P5idaRhVpeghgjLciWtFzdSY@qpR(Y#}Rne+sRko^FRjq1Pb*qL| z)2e0Fw(3}Qt$J2{tAW+fYGgIGnpjP(W>#~nh1Jq(Wwo~2SZ%F#R(q?1)zRu?b+)=# z?9F+ttr-2%hoh&x;4X!wq{zhtl8EaYpylVnr|(z7Fvs}#nuvQskO{n zZmqCZTC1$p)*5TAwa!{^ZLl_4o2<>&N7l#IC)TId7Hg~Znf1A~&Dw5#VSQ$G*oI&1x6{c4@F&RZ9(i`FIUvUSC}YF)FgTQ{tm)-CI{b;r7E-Lvjn53GmQBkQsC zoAtZ(#CmEyvz}Wote4gw)}PiZ>$Ua9dTYJ2-dlfJe_Q`p|62c9AEFgBM?nZ6F5)3R zf{_3TkqC*A1WAz$$&msnkqW7i1|dj`bV!d3$cRh`MP_6{R%AmM!jT<0kQ2F(8+niy z`H&w4P!NSs7)4MN#ZVk2P!gq38f8!xx z01L4Qi?IYtu?)+x0xPi!tFZ=au@3980UNOioAD7o#wYj`Td)$riNxP{xegS)tg`*?tdc!bCJ4Zq_Fp5hsv;{{&g5B!N&c#SuB zi+6aBzwkHy!N2$qAA+J4;QSFlT*O0s1S0_wA`ucJ36dfik|PCDA{A024MLC>>5v{7 zkP(>>ipY+XwpdlKeF`A$$nxQ#bpe0(NHQJyp+MzuxOvEHa zA_|i+1ycii*CIfSn2?o7Mtm@nGu`l*vyR0 OtUye}(%FG!@Bat$c9mlQ diff --git a/docs/index.html b/docs/index.html index b2ed9618c2e..e05960fcbb9 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -2315,6 +2315,14 @@

眈眈探求 | 详情 + + e2a2e5f66f7313ce93cb9b8dcde37c58 + CVE-2023-21520 + 2023-09-12 20:15:07 + A PII Enumeration via Credential Recovery in the Self Service (Credential Recovery) of BlackBerry AtHoc version 7.15 could allow an attacker to potentially associate a list of contact details with an AtHoc IWS organization. + 详情 + + 85ca0426243514b04281aa2dcc9a082a CVE-2023-21522 @@ -2387,6 +2395,14 @@

眈眈探求 | 详情 + + 24cc779bd99caa6238823d0a69145f2c + CVE-2023-2071 + 2023-09-12 14:15:09 + Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function. + 详情 + + 7c1f5e1b9d461277f697f2c39a7601b2 CVE-2023-27169 @@ -2451,22 +2467,6 @@

眈眈探求 | 详情 - - fee42c5c3350c0778bb8eca01c5e2efa - CVE-2023-2705 - 2023-09-11 20:15:08 - The gAppointments WordPress plugin before 1.10.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin - 详情 - - - - ce11eb07fe14170208adf7b1b2a208c4 - CVE-2023-4881 - 2023-09-11 17:15:07 - A stack based out-of-bounds write flaw was found in the netfilter subsystem in the Linux kernel. If the expression length is a multiple of 4 (register size), the `nft_exthdr_eval` family of functions writes 4 NULL bytes past the end of the `regs` argument, leading to stack corruption and potential information disclosure or a denial of service. - 详情 - -