From cabc56083cbaead9939fadc430eaa7c733f8b461 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 22 Sep 2023 18:28:08 +0000 Subject: [PATCH] Updated by Github Bot --- cache/NVD.dat | 2 ++ data/cves.db | Bin 42983424 -> 42983424 bytes docs/index.html | 34 +++++++++++++++++----------------- 3 files changed, 19 insertions(+), 17 deletions(-) diff --git a/cache/NVD.dat b/cache/NVD.dat index f713b103a7d..99cd6181268 100644 --- a/cache/NVD.dat +++ b/cache/NVD.dat @@ -195,3 +195,5 @@ d5f9b68a051c497fca8417eb1e6f4095 c067401155eebe16566d819dbbc0fdd9 77fb68b61f9b45e5d5d973d9698f7d7d c4c8e6fad1208c422fb884063dc408dc +be01985caf3d13a706450396ccdce1b6 +55154e097ca9cd9178e1cedd8fe4e00b diff --git a/data/cves.db b/data/cves.db index e2da8b76be9c4f60be38e55bbd5beaea4829ba7d..8ea07a4641b6e032f499be17a16f28193376da08 100644 GIT binary patch delta 2842 zcmb``Rd5y78pZLO-~M1SM4cbC!i?yZR zQg>?9sQ{%e^iQAe(|x)Rzu7b2>^<|XHM7?oJ6dxMb~cEK-_@{pOnjlN7%SE)WtFzd zSY@qpR(Y#}RndyGDp{4SDppminiX$Vw`y25ty)%XtBzIIs%O==8dwdjMpk31i50M# zTFtEHRtu}8)yisZwXxb-?X31z2P?r!v^rWrD`X{E$ySOLwo>5o zo7LUwVfD0nS-q`3R$r^1)!!Om4YUSXgRLRfP-~bq+!|qxv_@H@tufYEYn(OSnqW<| zCRvlMDb`eLnl;^`pG<3p6|u6csFiKav}Rd3)@&=+nq$qi@~nJoo;BZEU@f!?tVPyh zYl*egT4pV`R#+>oRn}$JYHN*EXcbv&t#y{I_0|S!qqWJ}Y;Cc&THCDc)(&f@wadEP zy285By2`rRDz>h%uC=bSuD5QmZnSQ)O01i$-PSGEt=1lEuXUSsyLE?kr*)Tgw{?$o zuXUewzx9B%&)RQ2Xgy>-Y#p!;T8~(VtVgZKtjDdx))DKdb<8?$Jz+g*J!PG+p0=K` zp0%E{p0{4GUbJ4aUbaqJuUM~IuUW5KZ&+_yZ&`0!?^y3z?^*9#A6TcX53P@^kF8Iv zPp#9|XV&M|7uJ{7SJv0oH`W>JTkAXPd+P`5taZ*hZ~bUpuzs?BwtlgGwSKdHxBjsH zwEnXGwk~c`%r?a!7Nt-cWl$F7P#zUf5pk%5%BX^>sD^k{M-9|OE!0LG)I~kiM*}oO zBQ!=61ke=C&>St$60Oi0ZO|6&&>kI-fJAge5FsQX87T-O6=_IE20EcLx}Yn%p*wn@ zCwieb`k*iRp+5#-AO>MDhF~a$VK_!$Bt~I0#$YVQVLT>aA|_!nreG?jVLC4LpNScW zAPZ4sVha<7zc0=kKhm<#bbCJhj9c)aSX@t1fIlGIDx0}44%bv zcpfj{MZAQUaT2fKRlJ7R@dn<+TX-Aq;9b0j_wfNv;X{0ckMRjU#c6zo&+!Gm#8>zl z-{1_s#dr7~Kj19R;XHoC1^k4c@e6*%Z}=U5;7|O8zi}~UlVbV)h(#%sMj4bvIh02Q zR74yqp)#tVDyktK)lmaAQ46(E2X#>o_0a$g(Fl#v1OYTfGc-pFv_vbkMjNz6JG4g! zBp?wT5kv?{NJa|6NJSdbk%3O=j4tSkZs?94=!stFjXvm$e&~+@7>Gd_j3F3`VHl1P z7>Q9BjWHODaTt#Yn21T3j47CkX_$^n{bynZBFI7%*_er0$iZynVh-ja5BZpf`B;F3 zD8M2t#u6;WGAzdmti&o@hSgYuLKI;w*1=eh4cLfH*o-aMifz~)dssVS_neF?UGczw zs&=h>w$j>)2ji=q-Wz*3kQNhLK5^}Ub>}O^4ISIMsCBrgbzy~YI22Ba1~bwknHiC+ zj8Iy7G!%(uWu<3F8JFx^8Hw$f8V;tVj9nNF3vwcX+~~4EL4IJ~g8YJL zq=5OL@naa|M)LxT7DlrIIe8^bi>AlaEWTKAK$-HHbLQkP31sFK@4ny~#mDBXi<^;? z7wD5PBquMIV_Z&jNgzG2I4Loh7)ne^PYNa_Cj>JRl7fLyYNt@RQz$9$|6ZWs|5~8r z`07J3osupEFPgRPeB7nR3j2o(`xjQ25e2ytcX@5E3y^EifTo(qFXVnm{zbA%L=h#TXC$oRy-@d zmB319C9)D*Nvxz+GAp^2!b)kSvQk@Vth81-E4`J$%4lV>GFw@!tX4KFyOqPrY2~tV zTY0R!Rz54gRlq7}6|xFjMXaJ$F{`*$!YXN%vPxTJtg==)tGrdgs%TZRDqB^os#Z0t zx>dufY1Oi7TXn3uRz0h})xc_KHL@C8O{}I?Gpo7P!fI)?vgp&=YGbvv+F9+b4pv92 zlhxVkVs*8;S>3H3R!^&!)!XW0^|kt0{jCAkKx>dS*cxIDwT4;4tr6BpE7Tfgjkd;E zV=Y_btnt>}hG;6vw!kn(awZYnGZL#TLoI&WRD zE?R$E|5%r-%hna^s&&n}Zr!kMTDPp*)*b7vb2X>#g<9`q%o;dT)KOK3bow&(;^~YnXzjC7MKuiQ97D5mk zaS#{r5FZJU5Q&f&NstuDkQ^zH5~+|HX^St$60Pv9e`~ZsTeL%abU;URLT7YAS9C*n^gvJaLT~gzU-UzN48TAP z!e9)+Pz=LxjKD~QViZPW493D3hw+$zFigZGOvV&U#WYOE49vv$_yIrSC(OcZ%)wmz zj9)Mh^YJTw!vZYCA}q!dEX6V`#|o^(Dy+sDti?L~jz6#-8?X_Z@F)JlW^BP$Y{Pc! zz)pl?7j|P0_F^CQ;{Xog5Dw!Aj^Y@O;{;CP6i(v|&f*--;{qLiLj|51FL`aMzNQz`gjuc3VR7j09NQ-nx zj||9&OvsEZ$ck*pjvUB|T*!?)$cuc)j{+!&LMV(PD2iezjuI$|QYeiwD2s9^j|!-W zN~nw~sETT+jvA + @@ -2235,6 +2235,22 @@

眈眈探求 | 详情 + + 55154e097ca9cd9178e1cedd8fe4e00b + CVE-2023-5074 + 2023-09-20 16:15:12 + Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28 + 详情 + + + + be01985caf3d13a706450396ccdce1b6 + CVE-2023-5084 + 2023-09-20 10:15:15 + Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.8.8. + 详情 + + 1d49a765844dd4af56f01d5405420162 CVE-2023-5063 @@ -2451,22 +2467,6 @@

眈眈探求 | 详情 - - d4b3d6114a20ff6ba8c50b281a8651f7 - CVE-2023-3301 - 2023-09-13 17:15:10 - A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service. - 详情 - - - - 5e24d726519cb9e77e0fd845029e7f16 - CVE-2023-3255 - 2023-09-13 17:15:09 - A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service. - 详情 - -