From b72de6c6ef5fa783fbe24ac250d7e8f8871879c7 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 26 Jan 2024 07:20:42 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 45776896 -> 45776896 bytes docs/index.html | 278 +++++++++++++++++++++++----------------------- 3 files changed, 154 insertions(+), 139 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 49e51062674..b7f0d0f936b 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -190,3 +190,18 @@ d6cdd3c8929c506d158596250d3a440f 705978c3bcca7a46b5c69c7b76c93466 e61b9f8e88ef92fd7400b52ea84ab6d8 91d0d3c16eefd006e0c90c6a7f0ae095 +52852946a92e688f7b707e239a023fdc +cc53f4838dfd9f68426be7c5bf11084b +60779caad34773931980277ce55d20f8 +0dc41e5131f5f16529789a22a814b131 +4f245bf85edb8636836d8c79aac53734 +2647b0eaf2f230bb2ac47d5ec09f43ce +e9cc1ac054dd026f2305c1f6c37eae72 +41b9abdded76c53acbc886b3f4fd088b +620f30c0c1d5d76ea3d194f4a561e30f +324c55a393f1e02bdfdcf53c7f4f087f +adaecdd75ecbc424bb8c76b2f30116a1 +2d05c4194b77f6c011248c9bf5634e85 +fbadcc774db2027cf050a6f5244df40a +b67958f0959d4aaa35b7341454ac0320 +12f7d32c221575531f4ee955849cfab3 diff --git a/data/cves.db b/data/cves.db index 6f71e4217b9ae9744cac75bbbcc2af8a49434fa9..0b0edbc3a23851f95fa7feb220ac137932684b31 100644 GIT binary patch delta 4105 zcmajfcaRk276tIP!!9`~K>?8^$A!*4jffxug5)SFa=LqZWJ#;Am@qKHQBgrq6m^vW zMN~vZMF|GX5p&L24489%XLye)U3|VjepOR5Rrh@N&i%gm^FL`eUzWBi+O%xH0Y#f~ zAc}|-QG+NZN{E_7EuuD2hp0=`BkB_kh=xQXqA{@-u{Y6#Xi79AniKmF`w}gPmP9LJ zKcY3UKhcILCE610i1tJWq9f6X=uC7Wx)R-p?nDowjOa=9A`HSLEW#!n!X-SyC(=Yf z^d=4<`Va>aeTjpJenfxbU}6Aq2r-ZtL<}YlC58|~iNlCt#BgE+F_IWXj3&kqV~KIZ zcwz!EkvN=~L>xgJNgPE?CXObi5SmX&L_|zvh=j-z#}HGAa$*`WotQz)BxVs6#IeM2 z#B5>?QAx}tjwenaP9#nuPA29Nrx2$SrxB+U^NAdB2C;xxNRT*_IEy%&SVWvdoJ*WX zEGCu^=MzhbWyA%tRt=`))O}nHxf4y8;F~UTZmhUjl^xl?ZhTxGqHu(O58!*N!&%;O>86XA?_va zBkm_2ARZ(hA|56lAs!_jBOWKV6HgFN5>F9N6VDLO63-FO6E6@i5-$-i6R!}j60Z@j z6K@c25^oW26Ymi367Lc36CV&C5<7^Gh>wX+h);=~#An3k#23Vu#8<@E#5csZ#COE^ z#1F)e#81S}#4p6J#Bap!#2<@Lv=~K_k{VJhB~nvrNo}bkb)}xvmj=>M8cAc>OZJu~ z(o~vBbJ<7sl@`)cTFHLWTK1PVQYvkwowSz@(os4|XXzqcrJHn@9#SSfrI#3DiY2x< z;)*A}q$QBva)9)a1EsGVB>kkn94rIm5E&?gWUw46Lu9BNCc|X7jF6EsN=C~V87t#t zyiAaZa=1*ABjiXqN+!$EGDQmW4<(XVGLlGEj*+QSF4JVX%#fKfODg18IZkHF9I2GK za=e@%C(223vdoiHYlxkK)hyX0=!Cilp_a-ZBU56FY^kUT7p$fNR@JTBYi33*bUlBeYv zc~+j2=j8=?QC^aln|y(A;nT6HKmr+mO4^b>PdZR zAPuFFG?u+&Z)qY;rI|FBePmy0AuXkq>?f^de`zD7(pK6@d+8t@rIU1)F49%HNq6ZX zWzti6i6N#~Vv8fLc;ZW10_iOWNFO;+`pQAlPx{NjGC&TIfig%2%b_wvhRR_wOoqz{ z87ZS=w2YClGET33eJ`@IwvzH~A6cJjQp50#{2x2RRIfd!J*rSKovY2NvO>i`^RO)^cHPhp z?5vp>R+PzR;;d`Oe%8q&PG#PlzA@Fb)}Q~;T^T{HDXV%E zGDa)IvkV+iS zBdfYAsPkL}Ic5}uQ6`fpC3fvlLrSN;$W|{IH6B%K#IGd>?eqQA+g~H2LZq4N!K!X`6qzehW)j4)sm*kqOvbRhtYvEhO#Sz^pM;5T?V0I} zOX67-rOx2eQ5CZ*!)QiQI^P~G>;$%DO)RgRIyQ;t&Q9{9%{bLIpWjezsdok0g`h6G zgPg48xKTFkCYdPh*`DrmMtc{8p@yux`8Pr4{|_2j=*TGqb>1ChWOR2D*VK#RW=+qv z0zVyumKCN=C(^fj2AS5V*-2bJr@Ug;it>e1+WpO*3@hZgxfZPIRM?ZkAN^35T r7Y0`1rPEnI@(n++>>$)ztIPYJv*$;C`VVDG3a3qPTQzTM3dR2hJ<^=Y delta 2590 zcmWmD^Pdm~0EY41<*v)NZQHhuH{14I^;VZ{T)u4Ec3a%m!j?UR;n@%0f8hCio{*3i zi9#?VML@*NlobLZLS+S5fmS3dvK7UOYDKf6TQRJdR*)6T3btZfajdvjJS)DHz)EN( zvJzWKtfW>lE4h`zN@=CCQd?=Pv{pJRy_LbrXl1f8TUo5ERyHfUmBY$u<+5^Hd91uv zJ}bXfz$$1JvI<*8tfE#itGHFdDruFnN?T>DvQ{~(yj8)fXjQT*TUD&8RyC`-Rl}-j z)v{_^b*#EpJ*&Rez-nkUvKm`Wtfp2otGU&}YH78yT3c-_`n0v$S?#S3R!6Io)!FJ| zb+x)#-K`#0Ppg;J+v;QWwfb58tpV0RYmhbA8e$E#hFQa{5!Og+lr`E4u|lme)>vzt zWox`O!J24=S(B{E))Z^1HO-oC&9G)#v#id1##(Ewvm&hZ)&^^%waMCSZLzjm+pO)@4r`~i%i3-2vG!W~to_yj>!5YW zI&2-Wj#|g8!MbhT zvF=*;tozmj>qqM+>u2ks^^5h$dTc$ho?5?Jzgf?$=hh4BrS-~sZN0JHTJNm))(7jO z^~w6(`osFu`pf!keX+h;->ko_f2@DQ6fji*2t*`AMifLvG(<-X#6%EcAsDd{2XPS( z@sR)tkqC*A1WAz$$&msnkqW7i25FHF>5%~$kqMcR1zC{|*^vV|kqfzz2YHbX`B4A` zQ3!=m1VvE{#Zdw!Q3|C|24ztWo_0a$g(Fl#v z1WnNl&Cvoa(F(262LJbOi*{&_4(NzZ=!`Dtif-tR9_Wc)=#4(;i+<>j0T_ru7>pqp zieVUz5g3V47>y8wVhqM&9E|apfQbmhBuvH>OvN-z#|+HGEX>9n%*8y+#{w+GA}q!d zEX6V`M>tksC01cI)?h8xAp+~M0UNOio3RC3u?^d?13R$`yRip*u@C!k00(ghhj9c) zaSX?C0w-|_r*Q^naSrEk0T*!zmvIGGaShjT12=IC-{S||#vR16w{D`0MGalj> zJi=o5h1|%4yvT?AD1d?}gu*C-q9}&qD1nkFh0-X4vM7i0sDO&7gvzLb zs;GwQsDYZOh1#ftx~PZxXn=-jgvMxsrf7!dXn~e!h1O_;|NFN^JG4g!bVMg~Mi+EN zH*`l2^h7W8Mj!M=KlH}{48$M|#t;m}Fbu~CjKnC6MhHSN24gV}#&}G?M1)}yCSwYw zVj8An24-RwW@8TKVjkvW0TyBr7GnvPVi}er94oLAtFRhtuomkOf%Vvcjo5_E*n+Lt zhV9sao!Eul*n_>;hy8(vbs%tc@8Bpw;orqc6}wPy?O5Z2j>da + @@ -382,7 +382,7 @@

眈眈探求 | + 2024-01-24 21:15:08 D-Link DIR-882 DIR882A1_FW130B06 was discovered to contain a stack overflow via the sub_477AA0 function. 详情 @@ -390,7 +390,7 @@

眈眈探求 | + 2024-01-24 21:15:08 An issue found in Processwire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. 详情 @@ -398,7 +398,7 @@

眈眈探求 | + 2024-01-24 20:15:53 Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. The application allows users to create zip files from available files on the site. In the 1.x branch prior to version 1.3.2, parameter `selectedIds` is susceptible to SQL Injection. Any backend user with very basic permissions can execute arbitrary SQL statements and thus alter any data or escalate their privileges to at least admin level. Version 1.3.2 contains a fix for this issue. 详情 @@ -406,7 +406,7 @@

眈眈探求 | + 2024-01-24 20:15:53 Trillium is a composable toolkit for building internet applications with async rust. In `trillium-http` prior to 0.3.12 and `trillium-client` prior to 0.5.4, insufficient validation of outbound header values may lead to request splitting or response splitting attacks in scenarios where attackers have sufficient control over headers. This only affects use cases where attackers have control of request headers, and can insert "\r\n" sequences. Specifically, if untrusted and unvalidated input is inserted into header names or values. Outbound `trillium_http::HeaderValue` and `trillium_http::HeaderName` can be constructed infallibly and were not checked for illegal bytes when sending requests from the client or responses from the server. Thus, if an attacker has sufficient control over header values (or names) in a request or response that they could inject `\r\n` sequences, they could get the client and server out of sync, and then pivot to gain control over other parts of requests or responses. (i.e. exfiltrating data from other requests, SSRF, etc.) In `trillium-http` versions 0.3.12 and later, if a header name is invalid in server response headers, the specific header and any associated values are omitted from network transmission. Additionally, if a header value is invalid in server response headers, the individual header value is omitted from network transmission. Other headers values with the same header name will still be sent. In `trillium-client` versions 0.5.4 and later, if any header name or header value is invalid in the client request headers, awaiting the client Conn returns an `Error::MalformedHeader` prior to any network access. As a workaround, Trillium services and client applications should sanitize or validate untrusted input that is included in header values and header names. Carriage return, newline, and null characters are not allowed. 详情 @@ -414,7 +414,7 @@

眈眈探求 | + 2024-01-24 20:15:53 DOM-based Cross Site Scripting (XSS vulnerability in 'Tail Event Logs' functionality in Nagios Nagios Cross-Platform Agent (NCPA) before 2.4.0 allows attackers to run arbitrary code via the name element when filtering for a log. 详情 @@ -422,7 +422,7 @@

眈眈探求 | + 2024-01-24 17:15:08 SvelteKit is a web development kit. In SvelteKit 2, sending a GET request with a body eg `{}` to a built and previewed/hosted sveltekit app throws `Request with GET/HEAD method cannot have body.` and crashes the preview/hosting. After this happens, one must manually restart the app. `TRACE` requests will also cause the app to crash. Prerendered pages and SvelteKit 1 apps are not affected. `@sveltejs/adapter-node` versions 2.1.2, 3.0.3, and 4.0.1 and `@sveltejs/kit` version 2.4.3 contain a patch for this issue. 详情 @@ -430,7 +430,7 @@

眈眈探求 | + 2024-01-24 17:15:08 Dell Unity, versions prior to 5.4, contain a vulnerability whereby log messages can be spoofed by an authenticated attacker. An attacker could exploit this vulnerability to forge log entries, create false alarms, and inject malicious content into logs that compromise logs integrity. A malicious attacker could also prevent the product from logging information while malicious actions are performed or implicate an arbitrary user for malicious activities. 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-01-24 17:15:08 Command Injection vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via crafted string in application URL. 详情 @@ -446,7 +446,7 @@

眈眈探求 | + 2024-01-24 17:15:08 Buffer Overflow vulnerability in the main() function in Mathtex 1.05 and before allows a remote attacker to cause a denial of service when using \convertpath. 详情 @@ -454,7 +454,7 @@

眈眈探求 | + 2024-01-24 17:15:08 Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a remote attacker to execute arbitrary code via the length of the LaTeX string component. 详情 @@ -462,7 +462,7 @@

眈眈探求 | + 2024-01-24 16:15:08 Orthanc versions before 1.12.2 are affected by a reflected cross-site scripting (XSS) vulnerability. The vulnerability was present in the server's error reporting. 详情 @@ -470,7 +470,7 @@

眈眈探求 | + 2024-01-24 16:15:08 There is a command injection vulnerability in the ssdpcgi_main function of cgibin binary in D-Link DIR-815 router firmware v1.04. 详情 @@ -478,7 +478,7 @@

眈眈探求 | + 2024-01-24 16:15:08 Dell Pair Installer version prior to 1.2.1 contains an elevation of privilege vulnerability. A low privilege user with local access to the system could potentially exploit this vulnerability to delete arbitrary files and result in Denial of Service. 详情 @@ -486,7 +486,7 @@

眈眈探求 | + 2024-01-24 15:15:08 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Cozmoslabs Profile Builder Pro.This issue affects Profile Builder Pro: from n/a through 3.10.0. 详情 @@ -494,7 +494,7 @@

眈眈探求 | + 2024-01-24 14:15:08 The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 详情 @@ -502,7 +502,7 @@

眈眈探求 | + 2024-01-24 01:15:07 Ubuntu's pipewire-pulse in snap grants microphone access even when the snap interface for audio-record is not set. 详情 @@ -510,7 +510,7 @@

眈眈探求 | + 2024-01-24 00:15:08 Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`. 详情 @@ -518,7 +518,7 @@

眈眈探求 | + 2024-01-24 00:15:08 Label Studio, an open source data labeling tool had a remote import feature allowed users to import data from a remote web source, that was downloaded and could be viewed on the website. Prior to version 1.10.1, this feature could had been abused to download a HTML file that executed malicious JavaScript code in the context of the Label Studio website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image. `data_import/uploader.py` lines 125C5 through 146 showed that if a URL passed the server side request forgery verification checks, the contents of the file would be downloaded using the filename in the URL. The downloaded file path could then be retrieved by sending a request to `/api/projects/{project_id}/file-uploads?ids=[{download_id}]` where `{project_id}` was the ID of the project and `{download_id}` was the ID of the downloaded file. Once the downloaded file path was retrieved by the previous API endpoint, `data_import/api.py`lines 595C1 through 616C62 demonstrated that the `Content-Type` of the response was determined by the file extension, since `mimetypes.guess_type` guesses the `Content-Type` based on the file extension. Since the `Content-Type` was determined by the file extension of the downloaded file, an attacker could import in a `.html` file that would execute JavaScript when visited. Version 1.10.1 contains a patch for this issue. Other remediation strategies are also available. For all user provided files that are downloaded by Label Studio, set the `Content-Security-Policy: sandbox;` response header when viewed on the site. The `sandbox` directive restricts a page's actions to prevent popups, execution of plugins and scripts and enforces a `same-origin` policy. Alternatively, restrict the allowed file extensions that may be downloaded. 详情 @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 52852946a92e688f7b707e239a023fdc + CVE-2023-48707 + 2024-01-26 07:18:27 + CodeIgniter Shield信息泄露漏洞 + 详情 + + + + cc53f4838dfd9f68426be7c5bf11084b + CVE-2023-48708 + 2024-01-26 07:18:27 + CodeIgniter Shield信息泄露漏洞 + 详情 + + + + 60779caad34773931980277ce55d20f8 + CVE-2023-6277 + 2024-01-26 07:18:27 + LibTIFF不受控制的资源消耗漏洞 + 详情 + + + + 0dc41e5131f5f16529789a22a814b131 + CVE-2023-49312 + 2024-01-26 07:18:27 + Precision Bridge证书验证错误漏洞 + 详情 + + + + 4f245bf85edb8636836d8c79aac53734 + CVE-2023-49321 + 2024-01-26 07:18:27 + WithSecure多款产品拒绝服务漏洞 + 详情 + + + + 2647b0eaf2f230bb2ac47d5ec09f43ce + CVE-2023-49322 + 2024-01-26 07:18:27 + WithSecure多款产品拒绝服务漏洞 + 详情 + + + + e9cc1ac054dd026f2305c1f6c37eae72 + CVE-2023-6304 + 2024-01-26 07:18:27 + Tecno 4G Portable WiFi TR118操作系统命令注入漏洞 + 详情 + + + + 41b9abdded76c53acbc886b3f4fd088b + CVE-2023-6309 + 2024-01-26 07:18:27 + moses-smt mosesdecoder操作系统命令注入漏洞 + 详情 + + + + 620f30c0c1d5d76ea3d194f4a561e30f + CVE-2023-47865 + 2024-01-26 07:18:27 + Mattermost访问控制错误漏洞 + 详情 + + + + 324c55a393f1e02bdfdcf53c7f4f087f + CVE-2023-35075 + 2024-01-26 07:18:27 + Mattermost注入漏洞 + 详情 + + + + adaecdd75ecbc424bb8c76b2f30116a1 + CVE-2023-40703 + 2024-01-26 07:18:27 + Mattermost不受控制的资源消耗漏洞 + 详情 + + + + 2d05c4194b77f6c011248c9bf5634e85 + CVE-2023-43754 + 2024-01-26 07:18:27 + Mattermost信息泄露漏洞 + 详情 + + + + fbadcc774db2027cf050a6f5244df40a + CVE-2023-45223 + 2024-01-26 07:18:27 + Mattermost信息泄露漏洞 + 详情 + + + + b67958f0959d4aaa35b7341454ac0320 + CVE-2023-48268 + 2024-01-26 07:18:27 + Mattermost不受控制的资源消耗漏洞 + 详情 + + + + 12f7d32c221575531f4ee955849cfab3 + CVE-2023-48369 + 2024-01-26 07:18:27 + Mattermost不受控制的资源消耗漏洞 + 详情 + + 94d75576bdc644f0c6c296831d047f30 CVE-2023-5325 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - de4de870b7b82fe499e7dcbd9fc1b976 - CVE-2022-41678 - 2024-01-24 08:27:25 - Apache ActiveMQ任意代码执行漏洞 - 详情 - - - - 35eddd06295579759784c8badd5e59f2 - CVE-2023-49062 - 2024-01-24 08:27:25 - Meta Katran初始化错误漏洞 - 详情 - - - - 9e3df88c509bf9aedaac096ed6428110 - CVE-2023-41264 - 2024-01-24 08:27:25 - Netwrix UserCube身份认证错误漏洞 - 详情 - - - - 1926d32b40d069c4ffcf334af9d99e1b - CVE-2023-42502 - 2024-01-24 08:27:25 - Apache Superset开放重定向漏洞 - 详情 - - - - 322b33671b833529be379431cea496cd - CVE-2023-42505 - 2024-01-24 08:27:25 - Apache Superset信息泄露漏洞 - 详情 - - - - afcfc826ab2961d93579e6a15b7897d6 - CVE-2023-45286 - 2024-01-24 08:27:25 - Resty竞争条件漏洞 - 详情 - - - - 33fbca2d4ec579378a10465db6449eae - CVE-2023-48848 - 2024-01-24 08:27:25 - UReport任意文件读取漏洞 - 详情 - - - - a225239aa9d753d9d2eeec05ce1ac326 - CVE-2023-48121 - 2024-01-24 08:27:25 - Ezviz CS Series多款产品身份认证绕过漏洞 - 详情 - - - - 4bded4d5d07efb084f212d4ddb16ccc4 - CVE-2023-42504 - 2024-01-24 08:27:25 - Apache Superset拒绝服务漏洞 - 详情 - - - - 65a308236d4629ec7685bc50cc6b168d - CVE-2023-29061 - 2024-01-24 08:27:25 - BD FACSChorus身份认证错误漏洞 - 详情 - - - - 3de9d246d26618fa7e8fa192355e43ab - CVE-2023-45539 - 2024-01-24 08:27:25 - HAProxy信息泄露漏洞 - 详情 - - - - 54b6359c792232e1d847afccb32960d4 - CVE-2023-30588 - 2024-01-24 08:27:25 - Node.js拒绝服务漏洞 - 详情 - - - - 12936ad6880cdc838c72b28c288a2e08 - CVE-2023-29060 - 2024-01-24 08:27:25 - BD FACSChorus身份认证错误漏洞 - 详情 - - - - c1bfb2683743ab62c4c72d9de8604f68 - CVE-2023-49652 - 2024-01-24 08:27:25 - Jenkins Google Compute Engine Plugin授权错误漏洞 - 详情 - - - - 927c52393dacb55c62f72c4a935bea17 - CVE-2023-40626 - 2024-01-24 08:27:25 - Joomla CMS信息泄露漏洞 - 详情 - -