From c8abcbc8282cf9732cf9d04b0cdc8f0eb0bfb1cf Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 8 Feb 2024 03:23:52 +0000 Subject: [PATCH] Updated by Github Bot --- cache/RedQueen.dat | 3 +++ data/cves.db | Bin 45993984 -> 45993984 bytes docs/index.html | 56 ++++++++++++++++++++++----------------------- 3 files changed, 31 insertions(+), 28 deletions(-) diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index 77e81f8ebea..4347fcf5d25 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -160,3 +160,6 @@ b034cd2cfcf5b7c5740fea73e5ff490e 6e8a16d900ab46d516f7ef5baaf644d5 e223f0ed6e9771513b5a084210af0d9d 1657b0c1d0369c921b9ab17255b6283f +d5bcaf0aa6c33e9f9d43754957364a4b +666fb7b2eea05aa87729ef32e549079f +c56815340bcd55e8f5a55a8f2ce59ec9 diff --git a/data/cves.db b/data/cves.db index d2222f7b1eae4464883ef8361da50542bf26bd6f..92c378a7859dc3178c386cd77581bbea95fbf5b5 100644 GIT binary patch delta 2751 zcmWmDWpow<0EJ=p(cRshgRy=4#%LJb-Eo(6cQfG9-MP`-ouVR$jfpJ=qA0dvvRGNIY*uzFhn3UHW#zW=Sb42{ zR(`91RnRJA6}F04MXh31ajS$?(kf+@w#ry#t#Vd*tAbV0s$^BRs#sO6YF2fthE>z5 zWrbU{tvXhORo9BNqO715ZH25DtDY5W)wdd04Xs92W2=eP)M{omx8kf8R!ggu)!J%f zwYAz=?X3=0N2`<7+3I3-wYpi|tsYiStC!W=>SOh_`dR(00oFikkTuw%PrQ|2C0a>V zvXx>Dv4&d1tl`!OYos;G8f}fS##-a7@zw-uqBY5yY)!GITGOoQ)(mT=HOrc9&9UZM zsn$GezO}%zwa{8*Ew+|eORZ(ra%+XP(pqJ$w$@l{t##IVYlF4X+GK6Ewpd%OZPs>c zhm~ffTRW{?)^2N$wb$Bb?Y9nC2dzWaVe5!>)H-Gzw@z3mty9)%>x^~QI%l1?E?5_> zOV(xUignexW<6zHx1P41v7WVVSkGBEty|Xf)@|zr>qYA&>t*W|>s9MD>yGuh^@jDP z^_KOv^^SGdde?f-df)oM`q28w`q=u!x@UcAeP(@bePP|VzO)`#Us+#U53O&kZ>>kx zch>jT57v*?Pu9=YFV?TtZ`Nb$ck2)9PwOx1Z|fiHU+c*dg{@E+0?3F=$c!w=ifqV^ z9LR}W$c;S6i+sqB0w{<=D2yT~iee~^5-5pMD2*~Gi*hKB3aE%msEjJ8ifX8i8mNg{ z2uE$yK?Ld|5>W^u8X?4>9%4}+4bTvc&=^h76wS~aacF^-Xoc2jgSKdg_UM3)=!DMb zg0AR>?&yJ@=!M?sgTCm8{uqFP7=*$2zkfUukccECBLzb+6vHqaBQO%9FdAbp7UM7; z6EG2zFd0)Y71J;sGcXggFdK6)7pa(s`B(sBAr@gVmS8ECVL4V{C01cI)?h8xVLdir zBQ{|(wqPr^VLNsp4e8j4UD%C1*o%GGj{`V}LpY2hIErI9juSYEQ#g$?IE!;Qj|;en zOSp_HxQc6d3fJ*8p24%Yf#+}&x9~h};|08km+&%P!K-);cknviz?*mrZ{r=@#k+V9 z@8bh}h>!3wKEXYFiqG&lzQBEai3j)!U*jRZ!MAvX@9;f-z>oL|KjRntir?@UzvB=5 ziNEkS{=vU^61GGE?vDU6A`>zr3$h{`vLgp_A{TNa5Aq@(@}mF>q7VwB2#TT@ilYQd zq7+J_49cP$%A*1*q7o{j3aX+Ss-p&Kq87qY8+8zYx`;#+f`~>4F{p=F)JFp}L?bjt z6EsCLG)Ej-pe0(NHQJyp+Mzuva@jK>5_#3W3{6imf5OvenOCl9Lz;3=3zb- zz*vYySd1lDie*@i6?rvPT~|!;|$K?9M0ncF5(g{;|i_@uIXA}@AdL|GaSi~J5P>V*&k*v zo^4>(?OE<+sgQYKrp+1eW-J(p3!9Q*Q~o<67iLav?X=nH%c9N&Zf9c7O24`OMBsL_ z_D-9bqhs-^sbLv%r$#45CnUzFM8wC35~HG$V^d<2f>ANi!Pw}Ss8BFInDF58?)$4( z#`S6$9vKlC437u}L+N1~P6R5Y)jb_(RVfq`5gi>$i3pERN=yz9#ze)2$0kQ6ghxk& VBI6T+DRq;hLe~r4xE6Sn>pzTo3yuH) delta 2609 zcmWmFWp@w+0EJ-}3^q1ujPCC4?(VL^rMtUFTwru}cXz`Wic+?qbSR;ssFX+;uOFU2 z@SbzejamOXDhBh@2gEGMP(2`KlB@tL&}~R90#$jg{6)XQj6?SQ)KMR%R=UmDS2-Ww&xzIjvk)ZYz(K*UD$*w+dJV ztwL5|tB6(9DrOb8N?0YWQdViJj8)buXO*`qSQV{GR%NS-Rn@9yRkvzbHLY4!ZL5w| z*Q#gLw;EUttwvU3tBKXrYGyUJT39WuR#t1Pjn&p_XSKIFSkYETtCK~a&Q=$ztJTfw zZuPKwTD`2^Rv)Xc)z9j04X_4UgRH^U5NoJ4%o=Wuutr*=tkKpOYpgZS8gEUoCR#Dp zBx|xY#hPl_nr2P6W>~S-Oly`k+nQs|wdPs#tp(OXYmv3sT4F7=mRZZK71l~?m9^Sh zW39E;S?jG0)<$cSwb|NYZMC*p+pQhePHUI7+uCF8wf0&2tpnCU>yUNWI$|BQj#-RA>m%!&^|AGdb>6yQU9>J)m#t5&&#cd_FRU-EudJ`FZ>%fU zRqI>pJL{Tt-MV4jv~F3qtvl9T>z;Mr`ri7%dSE@Y9$AmAAFZFPpRFg>FV?TtQ|mYD zck2)9nf2UyVZF3oS$|rut-q`{)?4eH_1^m1`p5b=RsnMqfItKx7zq%9gh+%?gds7) z5rHH~ieyNR6o^DhL?IPYBMs6b9nvEMG9nW)BMY)38?qw@av~RUBM$k7>c6=N}?1>qYTQT9Ll2tDxwl9qYA2`8mglPYN8fuqYmn#9_ph38ln*zqY0X# z8JeR7TA~$NqYc`k9onMcxQ6Svft$F6 z+qi?fxQF}r9zWm#9^w%m<4632pYa60;8#4wZ}=U5;2ECd1zzG6{={qig*SMMcX*G# z@elqDh*co-M<9X_j06ZlLL@>c!jKr@h(Hn~MKUBu3Pd6$qL2!ykp^jz4(X8r8IcK@ zkp)?i4cU6bB~c2cQ3hpE4&_k+6;TP5Q3X{| z4b@QtHBk$-Q3rKV5B1Ri4bcdV(F9G=49(F3Ezt_C(FSeN4(-ta(ddXy_`iQ=bU{~i zLwEE*PxL}>^g& + @@ -30,7 +30,7 @@

眈眈探求 | + 2024-02-06 07:10:07 安全事件周报 2024-01-29 第5周 详情 @@ -438,7 +438,7 @@

眈眈探求 | + 2024-02-06 22:16:15 An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings. 详情 @@ -446,7 +446,7 @@

眈眈探求 | + 2024-02-06 22:16:15 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2. 详情 @@ -454,7 +454,7 @@

眈眈探求 | + 2024-02-06 22:16:15 libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_revparse_single` can cause the function to enter an infinite loop, potentially causing a Denial of Service attack in the calling application. The revparse function in `src/libgit2/revparse.c` uses a loop to parse the user-provided spec string. There is an edge-case during parsing that allows a bad actor to force the loop conditions to access arbitrary memory. Potentially, this could also leak memory if the extracted rev spec is reflected back to the attacker. As such, libgit2 versions before 1.4.0 are not affected. Users should upgrade to version 1.6.5 or 1.7.2. 详情 @@ -462,7 +462,7 @@

眈眈探求 | + 2024-02-06 22:16:15 PX4 Autopilot 1.14 and earlier, due to the lack of synchronization mechanism for loading geofence data, has a Race Condition vulnerability in the geofence.cpp and mission_feasibility_checker.cpp. This will result in the drone uploading overlapping geofences and mission routes. 详情 @@ -470,7 +470,7 @@

眈眈探求 | + 2024-02-06 22:16:14 An issue discovered in Dronetag Drone Scanner 1.5.2 allows attackers to impersonate other drones via transmission of crafted data packets. 详情 @@ -478,7 +478,7 @@

眈眈探求 | + 2024-02-06 22:16:14 An issue discovered in OpenDroneID OSM 3.5.1 allows attackers to impersonate other drones via transmission of crafted data packets. 详情 @@ -486,7 +486,7 @@

眈眈探求 | + 2024-02-06 22:16:14 A vulnerability classified as critical was found in Juanpao JPShop up to 1.5.02. This vulnerability affects the function actionIndex of the file /api/controllers/merchant/app/ComboController.php of the component API. The manipulation of the argument pic_url leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253000. 详情 @@ -494,7 +494,7 @@

眈眈探求 | + 2024-02-06 22:16:14 A vulnerability classified as critical has been found in Juanpao JPShop up to 1.5.02. This affects the function actionIndex of the file /api/controllers/admin/app/ComboController.php of the component API. The manipulation of the argument pic_url leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252999. 详情 @@ -502,7 +502,7 @@

眈眈探求 | + 2024-02-06 22:16:14 A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device. 详情 @@ -510,7 +510,7 @@

眈眈探求 | + 2024-02-06 22:16:14 An attacker with access to the web application with vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "dns.0.server" parameter. 详情 @@ -518,7 +518,7 @@

眈眈探求 | + 2024-02-06 12:15:55 An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values. 详情 @@ -1974,7 +1974,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Zoom Rooms for macOS后置链接漏洞 详情 @@ -1982,7 +1982,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Zoom Rooms for macOS权限管理错误漏洞 详情 @@ -1990,7 +1990,7 @@

眈眈探求 | + 2024-02-06 05:24:32 yt-dlp HTTP请求走私漏洞 详情 @@ -1998,7 +1998,7 @@

眈眈探求 | + 2024-02-06 05:24:32 PrestaShop Newsletter Popup PRO SQL注入漏洞 详情 @@ -2006,7 +2006,7 @@

眈眈探求 | + 2024-02-06 05:24:32 ASUS RT-AC87U访问控制错误漏洞 详情 @@ -2014,7 +2014,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Schneider Electric ION8650和ION8800缺少完整性检查漏洞 详情 @@ -2022,7 +2022,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Schneider Electric ION8650和ION8800跨站脚本漏洞 详情 @@ -2030,7 +2030,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Schneider Electric EcoStruxure Power Monitoring Expert开放重定向漏洞 详情 @@ -2038,7 +2038,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Schneider Electric Galaxy VS和Galaxy VL路径遍历漏洞 详情 @@ -2046,7 +2046,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Fuji Electric TELLUS和TELLUS Lite任意代码执行漏洞 详情 @@ -2054,7 +2054,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Fuji Electric TELLUS和TELLUS Lite越界读取漏洞 详情 @@ -2062,7 +2062,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Fuji Electric TELLUS和TELLUS Lite越界读取漏洞 详情 @@ -2070,7 +2070,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Fuji Electric TELLUS Simulator越界读取漏洞 详情 @@ -2078,7 +2078,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Fuji Electric V-Server和V-Server Lite越界写入漏洞 详情 @@ -2086,7 +2086,7 @@

眈眈探求 | + 2024-02-06 05:24:32 Fuji Electric V-Server和V-Server Lite越界读取漏洞 详情