diff --git a/cache/NVD.dat b/cache/NVD.dat
index 2d52249e2de..833ebc64b72 100644
--- a/cache/NVD.dat
+++ b/cache/NVD.dat
@@ -182,3 +182,8 @@ fc4f7dfa657e3f5bf049777fc61cb976
122e8a08fbae0b948c74ba348ea9b038
1d8d4e2f26089891b78362dd762a8558
d3d952f6dc8655117121015f600086a5
+8ae724385b9efc96d9e3a775fba15669
+8484932beeca0daadc7e55c549f1c679
+b95b9e70cb6800ca35fe741b43ec3125
+6f158425cbcecf25b03a1e6a982fbf55
+6f6501d87401a3e4c6520a7fe54cd29f
diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat
index d7031706229..c9713055e6c 100644
--- a/cache/Nsfocus.dat
+++ b/cache/Nsfocus.dat
@@ -130,3 +130,18 @@ fc65acb0a632d2715ad203312ee9e589
235aad1a7aadab0c6ad714642800bb2a
b9153e04108e81eb5a1b2eb5981d8509
b51959cdc7ce04ca01ad0503a2a306d9
+bcb65b3865772c2b07eb1aee6edfa5bc
+37a9a665070fed92354da52d04271cf7
+0ae52a539772a4e6597582f35e29fb1c
+9479fd51511f83015abbec531d8c237d
+5ffd49f848b58b49a3e1d0f977363005
+8aaeeabba1b51909de67ceb13dff5e5b
+8e0c99024d55f98a324eecb7e4aa619f
+58701ac10a800793a2682e5552a08c5d
+5c28d395fa69a5b71de2f04301ce1ebb
+4356b44cbff51c92a4b1c518a93cbdb6
+faa2266355d6888c001c73d61e478cf6
+7c02d864db2d0230d79ecb994d3a9494
+80a477e70a4cddfbbe440b3361485757
+19e81956afd96fb3acc34f99face50ff
+95d2b3ad06708b6600e534020f77707e
diff --git a/data/cves.db b/data/cves.db
index 3304cf87815..512ca171a0c 100644
Binary files a/data/cves.db and b/data/cves.db differ
diff --git a/docs/index.html b/docs/index.html
index a51f40015db..3a4f0bf0808 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -1,4 +1,4 @@
-
+
@@ -1971,6 +1971,126 @@ 眈眈探求 | TITLE
URL |
+
+ bcb65b3865772c2b07eb1aee6edfa5bc |
+ CVE-2023-29182 |
+ 2023-10-07 05:22:33 |
+ Fortinet FortiOS堆栈缓冲区溢出漏洞 |
+ 详情 |
+
+
+
+ 37a9a665070fed92354da52d04271cf7 |
+ CVE-2023-34217 |
+ 2023-10-07 05:22:33 |
+ MOXA TN-4900 Series命令注入漏洞 |
+ 详情 |
+
+
+
+ 0ae52a539772a4e6597582f35e29fb1c |
+ CVE-2023-2917 |
+ 2023-10-07 05:22:33 |
+ Rockwell Automation ThinManager输入验证错误漏洞 |
+ 详情 |
+
+
+
+ 9479fd51511f83015abbec531d8c237d |
+ CVE-2023-31942 |
+ 2023-10-07 05:22:33 |
+ Online Travel Agency System跨站脚本漏洞 |
+ 详情 |
+
+
+
+ 5ffd49f848b58b49a3e1d0f977363005 |
+ CVE-2023-37914 |
+ 2023-10-07 05:22:33 |
+ XWiki Platform代码注入漏洞 |
+ 详情 |
+
+
+
+ 8aaeeabba1b51909de67ceb13dff5e5b |
+ CVE-2023-39970 |
+ 2023-10-07 05:22:33 |
+ AcyMailing Joomla Component危险类型文件上传漏洞 |
+ 详情 |
+
+
+
+ 8e0c99024d55f98a324eecb7e4aa619f |
+ CVE-2023-38576 |
+ 2023-10-07 05:22:33 |
+ ELECOM LAN-WH300N/RE隐藏功能漏洞 |
+ 详情 |
+
+
+
+ 58701ac10a800793a2682e5552a08c5d |
+ CVE-2023-39944 |
+ 2023-10-07 05:22:33 |
+ ELECOM WRC-F1167ACF和ELECOM WRC-1750GHBK操作系统命令注入漏洞 |
+ 详情 |
+
+
+
+ 5c28d395fa69a5b71de2f04301ce1ebb |
+ CVE-2023-2317 |
+ 2023-10-07 05:22:33 |
+ Typora跨站脚本漏洞 |
+ 详情 |
+
+
+
+ 4356b44cbff51c92a4b1c518a93cbdb6 |
+ CVE-2023-37369 |
+ 2023-10-07 05:22:33 |
+ Qt拒绝服务漏洞 |
+ 详情 |
+
+
+
+ faa2266355d6888c001c73d61e478cf6 |
+ CVE-2020-28715 |
+ 2023-10-07 05:22:33 |
+ LeEco LeTV X43拒绝服务漏洞 |
+ 详情 |
+
+
+
+ 7c02d864db2d0230d79ecb994d3a9494 |
+ CVE-2023-39939 |
+ 2023-10-07 05:22:33 |
+ LuxSoft LuxCal Web Calendar SQL注入漏洞 |
+ 详情 |
+
+
+
+ 80a477e70a4cddfbbe440b3361485757 |
+ CVE-2023-39106 |
+ 2023-10-07 05:22:33 |
+ Nacos Spring Project不受信数据反序列化漏洞 |
+ 详情 |
+
+
+
+ 19e81956afd96fb3acc34f99face50ff |
+ CVE-2023-38035 |
+ 2023-10-07 05:22:33 |
+ Mobileiron MobileIron Sentry授权错误漏洞 |
+ 详情 |
+
+
+
+ 95d2b3ad06708b6600e534020f77707e |
+ CVE-2023-3954 |
+ 2023-10-07 05:22:33 |
+ WordPress MultiParcels Shipping For WooCommerce Plugin跨站脚本漏洞 |
+ 详情 |
+
+
9960c7e963f7e9c4e1cf3ada51765a3f |
CVE-2023-35009 |
@@ -2091,126 +2211,6 @@
-
- 3b78f26f11bdc7722b9237a87dfddcd7 |
- CVE-2023-5009 |
- 2023-09-25 03:20:55 |
- GitLab EE越权调用漏洞 |
- 详情 |
-
-
-
- a3ccbfc8519028244f43a9269d13178d |
- CVE-2023-42442 |
- 2023-09-25 03:20:55 |
- JumpServer未授权访问漏洞 |
- 详情 |
-
-
-
- 29e4b91694ff97afc08cf4b13c09dcf6 |
- CVE-2023-26369 |
- 2023-09-25 03:20:55 |
- Adobe Acrobat多款产品任意代码执行漏洞 |
- 详情 |
-
-
-
- f6887fad33d6470c40eb5b3cf6dcc6f3 |
- CVE-2021-44188 |
- 2023-09-25 03:20:55 |
- Adobe After Effects越界读取漏洞 |
- 详情 |
-
-
-
- a0373daeff2596e5becc4d13372e8d1a |
- CVE-2023-39531 |
- 2023-09-25 03:20:55 |
- Mobileiron Sentry身份验证错误漏洞 |
- 详情 |
-
-
-
- 1e70c2d5dff500104f3b2e6c691d24e8 |
- CVE-2023-34545 |
- 2023-09-25 03:20:55 |
- CSZCMS SQL注入漏洞 |
- 详情 |
-
-
-
- bd4ce3b0846b12d9980dc466bae7d6bc |
- CVE-2023-38212 |
- 2023-09-25 03:20:55 |
- Adobe Dimension堆缓冲区溢出漏洞 |
- 详情 |
-
-
-
- 08c84b09ea6cebe263181805cd9f539e |
- CVE-2023-3471 |
- 2023-09-25 03:20:55 |
- Panasonic KW Watcher缓冲区溢出漏洞 |
- 详情 |
-
-
-
- d546f5045cc074653ee9f9351c217d24 |
- CVE-2023-4485 |
- 2023-09-25 03:20:55 |
- ARDEREG Sistemas SCADA SQL注入漏洞 |
- 详情 |
-
-
-
- ee24cf375f6e3db0ffe5e07b655b75d2 |
- CVE-2023-41507 |
- 2023-09-25 03:20:55 |
- Super Store Finder SQL注入漏洞 |
- 详情 |
-
-
-
- a7bc45fc076f7bd10405107ffca15085 |
- CVE-2023-39361 |
- 2023-09-25 03:20:55 |
- Cacti SQL注入漏洞 |
- 详情 |
-
-
-
- a2ec49665ad7b51198c1c56e9284c903 |
- CVE-2023-35068 |
- 2023-09-25 03:20:55 |
- BMA Personnel Tracking System SQL注入漏洞 |
- 详情 |
-
-
-
- ef5980a94862c5b87c6368d9d5079d19 |
- CVE-2023-34353 |
- 2023-09-25 03:20:55 |
- Open Automation Software OAS Platform身份验证绕过漏洞 |
- 详情 |
-
-
-
- 092bdfe76d3acc09a71385017a9821d5 |
- CVE-2023-36492 |
- 2023-09-25 03:20:55 |
- SHIRASAGI跨站脚本漏洞 |
- 详情 |
-
-
-
- 5f5e7fad3384df5d6d56c71887d17bbe |
- CVE-2023-35892 |
- 2023-09-25 03:20:55 |
- IBM Financial Transaction Manager for SWIFT Services XML外部实体注入漏洞 |
- 详情 |
-
-
@@ -2227,6 +2227,30 @@ 眈眈探求 | TITLE
URL |
+
+ b95b9e70cb6800ca35fe741b43ec3125 |
+ CVE-2023-44839 |
+ 2023-10-05 16:15:12 |
+ D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Encryption parameter in the SetWLanRadioSecurity function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
+ 详情 |
+
+
+
+ 6f158425cbcecf25b03a1e6a982fbf55 |
+ CVE-2023-44838 |
+ 2023-10-05 16:15:12 |
+ D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the TXPower parameter in the SetWLanRadioSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
+ 详情 |
+
+
+
+ 6f6501d87401a3e4c6520a7fe54cd29f |
+ CVE-2023-44837 |
+ 2023-10-05 16:15:12 |
+ D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the Password parameter in the SetWanSettings function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. |
+ 详情 |
+
+
4cf5001e80b7ec5cbf1ab6b91e423be6 |
CVE-2023-5374 |
@@ -2283,6 +2307,22 @@
+
+ 8ae724385b9efc96d9e3a775fba15669 |
+ CVE-2023-4492 |
+ 2023-10-04 13:15:25 |
+ Vulnerability in Easy Address Book Web Server 1.6 version, affecting the parameters (firstname, homephone, lastname, middlename, workaddress, workcity, workcountry, workphone, workstate and workzip) of the /addrbook.ghp file, allowing an attacker to inject a JavaScript payload specially designed to run when the application is loaded |
+ 详情 |
+
+
+
+ 8484932beeca0daadc7e55c549f1c679 |
+ CVE-2023-4491 |
+ 2023-10-04 13:15:25 |
+ Buffer overflow vulnerability in Easy Address Book Web Server 1.6 version. The exploitation of this vulnerability could allow an attacker to send a very long username string to /searchbook.ghp, asking for the name via a POST request, resulting in arbitrary code execution on the remote machine. |
+ 详情 |
+
+
310d0d3e9d94763c028edd46af7d0ac8 |
CVE-2023-4997 |
@@ -2427,46 +2467,6 @@
-
- 581dedd89ede305266161dac2688449c |
- CVE-2023-5345 |
- 2023-10-03 03:15:09 |
- A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.
In case of an error in smb3_fs_context_parse_param, ctx->password was freed but the field was not set to NULL which could lead to double free.
We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705. |
- 详情 |
-
-
-
- 738d7f9d1ad4d0dfdd5c062178d466a8 |
- CVE-2023-5334 |
- 2023-10-03 02:15:10 |
- The WP Responsive header image slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sp_responsiveslider' shortcode in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
- 详情 |
-
-
-
- 7572bbce3134e8813a6da17104112118 |
- CVE-2023-5344 |
- 2023-10-02 20:15:10 |
- Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969. |
- 详情 |
-
-
-
- a66088352c52a7edcfa7a8332841740f |
- CVE-2023-4659 |
- 2023-10-02 15:15:15 |
- Cross-Site Request Forgery vulnerability, whose exploitation could allow an attacker to perform different actions on the platform as an administrator, simply by changing the token value to "admin". It is also possible to perform POST, GET and DELETE requests without any token value. Therefore, an unprivileged remote user is able to create, delete and modify users within theapplication. |
- 详情 |
-
-
-
- 1ddd7b203d4442582fb039d4e7a6a2e0 |
- CVE-2023-5106 |
- 2023-10-02 12:15:09 |
- An issue has been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports. |
- 详情 |
-
-