Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 27, 2024
1 parent 3508ed8 commit bd9281e
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 17 deletions.
2 changes: 2 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -140,3 +140,5 @@ c37d2f2b00567a070d842367ddd413eb
8e0680838acd7b7a0d5c1637057c0d8f
d490b80eeece4c355200325bc0b2b3b1
fdad9fb02646a816f9cbdfdc53b0ebc7
34ba522c94cfe9e63a33aff7ea31855b
8f3321759648d249f49a4727f56f0699
Binary file modified data/cves.db
Binary file not shown.
34 changes: 17 additions & 17 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-27 05:26:07 -->
<!-- RELEASE TIME : 2024-04-27 07:20:07 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -363,6 +363,22 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3052">详情</a></td>
</tr>

<tr>
<td>34ba522c94cfe9e63a33aff7ea31855b</td>
<td>CVE-2024-3051</td>
<td>2024-04-26 22:15:08 <img src="imgs/new.gif" /></td>
<td>Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3051">详情</a></td>
</tr>

<tr>
<td>8f3321759648d249f49a4727f56f0699</td>
<td>CVE-2024-28322</td>
<td>2024-04-26 22:15:07 <img src="imgs/new.gif" /></td>
<td>SQL Injection vulnerability in /event-management-master/backend/register.php in PuneethReddyHC Event Management 1.0 allows attackers to run arbitrary SQL commands via the event_id parameter in a crafted POST request.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28322">详情</a></td>
</tr>

<tr>
<td>9e95c83848c0c8eaab3691d3162c11e5</td>
<td>CVE-2024-33664</td>
Expand Down Expand Up @@ -507,22 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20356">详情</a></td>
</tr>

<tr>
<td>ef2542d61fa43716271a236b1da93dc7</td>
<td>CVE-2024-20295</td>
<td>2024-04-24 20:15:07</td>
<td>A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20295">详情</a></td>
</tr>

<tr>
<td>cb2e14c07e543abe95671cb4d31df54d</td>
<td>CVE-2024-4141</td>
<td>2024-04-24 19:15:47</td>
<td>Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by an invalid character code in a Type 1 font. The root problem was a bounds check that was being optimized away by modern compilers.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-4141">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit bd9281e

Please sign in to comment.