Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Mar 4, 2024
1 parent 367a442 commit ded52a7
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 17 deletions.
2 changes: 2 additions & 0 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
Expand Up @@ -121,3 +121,5 @@ b8b879b1e5e65a5de7d453a5c210bda1
418d5a0399cbf83f956de7bf585feb26
898a3ce88e362708bf893ef01a720b9c
9a90584f2f7a3c4c28c4d558263a6074
2187e14abdef7f98b3c63bdb9aaf67de
af78a91b46f2df24813fdf66f66108bb
Binary file modified data/cves.db
Binary file not shown.
34 changes: 17 additions & 17 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-03-04 12:04:03 -->
<!-- RELEASE TIME : 2024-03-04 13:27:34 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -283,6 +283,22 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>2187e14abdef7f98b3c63bdb9aaf67de</td>
<td>CVE-2024-28084</td>
<td>2024-03-03 21:15:49 <img src="imgs/new.gif" /></td>
<td>p2putil.c in iNet wireless daemon (IWD) through 2.15 allows attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact because of initialization issues in situations where parsing of advertised service information fails.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-28084">详情</a></td>
</tr>

<tr>
<td>af78a91b46f2df24813fdf66f66108bb</td>
<td>CVE-2019-25210</td>
<td>2024-03-03 21:15:49 <img src="imgs/new.gif" /></td>
<td>An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the --dry-run flag is used. This is a security concern in some use cases, such as a --dry-run call by a CI/CD tool. NOTE: the vendor's position is that this behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values).</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2019-25210">详情</a></td>
</tr>

<tr>
<td>441d178f5afcf29063848f26054ea317</td>
<td>CVE-2024-2150</td>
Expand Down Expand Up @@ -507,22 +523,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-27747">详情</a></td>
</tr>

<tr>
<td>79515fc1ff735ae61dcdbf39e9f1593f</td>
<td>CVE-2024-27746</td>
<td>2024-03-01 22:15:47</td>
<td>SQL Injection vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the email address parameter in the index.php component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-27746">详情</a></td>
</tr>

<tr>
<td>c2affcc595c8f6e1b46bbe2cde17729c</td>
<td>CVE-2024-27744</td>
<td>2024-03-01 22:15:47</td>
<td>Cross Site Scripting vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the image parameter in the profile.php component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-27744">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit ded52a7

Please sign in to comment.