Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 22, 2023
1 parent 2b9da68 commit cabc560
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 17 deletions.
2 changes: 2 additions & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -195,3 +195,5 @@ d5f9b68a051c497fca8417eb1e6f4095
c067401155eebe16566d819dbbc0fdd9
77fb68b61f9b45e5d5d973d9698f7d7d
c4c8e6fad1208c422fb884063dc408dc
be01985caf3d13a706450396ccdce1b6
55154e097ca9cd9178e1cedd8fe4e00b
Binary file modified data/cves.db
Binary file not shown.
34 changes: 17 additions & 17 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-09-22 14:26:08 -->
<!-- RELEASE TIME : 2023-09-22 18:28:07 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2235,6 +2235,22 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5104">详情</a></td>
</tr>

<tr>
<td>55154e097ca9cd9178e1cedd8fe4e00b</td>
<td>CVE-2023-5074</td>
<td>2023-09-20 16:15:12 </td>
<td>Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5074">详情</a></td>
</tr>

<tr>
<td>be01985caf3d13a706450396ccdce1b6</td>
<td>CVE-2023-5084</td>
<td>2023-09-20 10:15:15 </td>
<td>Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.8.8.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5084">详情</a></td>
</tr>

<tr>
<td>1d49a765844dd4af56f01d5405420162</td>
<td>CVE-2023-5063</td>
Expand Down Expand Up @@ -2451,22 +2467,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-23840">详情</a></td>
</tr>

<tr>
<td>d4b3d6114a20ff6ba8c50b281a8651f7</td>
<td>CVE-2023-3301</td>
<td>2023-09-13 17:15:10 </td>
<td>A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3301">详情</a></td>
</tr>

<tr>
<td>5e24d726519cb9e77e0fd845029e7f16</td>
<td>CVE-2023-3255</td>
<td>2023-09-13 17:15:09 </td>
<td>A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3255">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit cabc560

Please sign in to comment.