Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 19, 2023
1 parent 1c01ab0 commit eed5350
Show file tree
Hide file tree
Showing 4 changed files with 47 additions and 141 deletions.
6 changes: 6 additions & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -141,3 +141,9 @@ d0568f9dd11713d1c03652f9a0c6e617
c8091e71622b885fb6d1995d39688d9a
928f5b89c21c3c373703726bca758187
47a8e67adf22340ed7cc272ff8ef66d6
dce005099e3f20c29b009557c11b6cc0
441f4690d53109837772a720a95b63fa
9f7d82dd7f4ba340f04a08f251e6b9f6
74d33fe152547c62bfe69955d3270806
f57a585c15991bae1d4618bd856384aa
7e6ca1a5a271c50671bea04219928642
100 changes: 0 additions & 100 deletions cache/Tenable (Nessus).dat
Original file line number Diff line number Diff line change
@@ -1,103 +1,3 @@
b19c001938e3bc1b04159c108468291e
aa6f5e13e725bb7cdb1055a20106e830
91d289b7ec0cc2efb4b198315f5113d0
3fcbe3a80518d4b8960546e7e1ae79e9
aa8f046b081ff8f82081c435355a2e58
79ca27750a8c2389d283ce040e07dc39
f27c1cc4d574eb4fe505f940c1900305
ec8ca59b2a72dfaab94eb9ff1fd28819
18667666e6ae191fdb1cff9af7cf4d89
e56d7803cef276ca08224b9b82c084a5
66d950e3cd3d4afdc750485273c26a70
fd4db62e912cd5b197e7830790d8feb8
7781abcbbf3718db06c9f19a2597e977
94a723514c7787f6d3ff573f1ac220a6
52cafe7fc2d05288c52a92c9b60e9bbe
d2bcff274e271d82653a17421d5c7519
634de1fdf57e58f2659baa2788ca5284
8db761a0956e39f43df6f20f0f4b59c6
f4f874a77cabdba3a8cc5f5e9595e5f3
9a59d14e459e7edfea318d0d92819fde
15bc8e4e8734b18119ca97ed448b19f0
4dad27b88ef0848ae43c3ecb31c23f5d
7d016c64a71d29633cc6fb1751368d70
145eaa8e660d5bec00c3014137b12c32
184f225c5ca61c1772f4ce950951076d
7e244dcbedb1f46abae298acfd1dcc39
d83c6f5b36c42c2879ba87a038af04ae
e5714d21ce7eed0d30bd026a9fb8b154
21ad49f3cc2754b981aaaf1947d94838
472a25b2ad05a91cd162e06fe7d53ff4
3658c3574d295a407039612ebcfa21ca
178513411de16dc0bd066254b7bea702
7ce40952bf546afa73361aac3e658b6f
53647c62f91e76035164ac98652e628e
f66867132d966049e4448716423a62b8
542b9987bd207dc8f9dfb84780653ff6
1b3488efc1260a29f38458155f3b70b1
a3aa8d8b42b123bb2b1e84adc9fdfd0f
d60d5b36f328d3f9f05a6ff7f59903f4
27d600181a095cdf1d1f2295b2aafdf3
64dc6980359800422f73759951a9b3e8
bfde77fc9620c99f38d9724083847513
ff959d24c7f917f19d880e199a7558cd
6daac3ab26d6f73f941dca4a3b63c9a2
424aca34d0646e52aad3f7c4975f0360
e335d436179d97f11310a70bcd99c104
b31ed52da226110620fea72d1df32093
436a1d1146419571afb63b60079672a4
0686da1ed4133ca2261ca71dc5c24031
cd6b936570afb701b9ebde68a9b66a9d
e23577e20247d8fbca501336aefba0e9
d0d28b3033b340a334854054259889dc
295ba82d300748b80acdb6109806335a
f6e766191ad638044399ec062a3fbb0b
8a12b1b1c951d58aa541742292394cdb
f2de48806e5929142a12d3514683b921
2e74ad6fe9367bf669d04f4b3a4f0d4b
e92b9cc02fedb141d4208c8591e7faf7
5750a2678faec39d41a6c341cf3352ef
7adb0d53f8af6e978fd039db4612f5c4
5dee43a1216bdaf68a97f92e356652f0
948bbfd6959e6ee141e73d3435b04807
d178eb7b9d194b8e1b3a0f8431abd55a
16c47f2ec1c582247a5c57f3cdb6a313
8410eebf33f34fc1f688b6d0a732c6c9
58d07f74c2230c64701fc38ee882101d
a4bb394e486ff1358b7adb3a39597685
e6145f7dd3fa9151340c8f8c79d73f30
19fd1260b4c759680f53c86f50ce7c75
6f38a0cede8657a7e2ede47b72f69433
1bcf1b7b5eb3dc2be9158c2b2e819763
8474d6d428844255b037c74eef64f450
021fa0d085b3d0f112f5b88b5c948d36
d83fd65e7384ca367900f4078941b9d3
e324e34fa330f3b8e8cfe453d2e5269e
aa406a7656a4846a4182281d02a8149f
ebd8cbc67749336dd66b12f9fb0449d3
5142d126983a795bf9db99a9d1b54043
db38d96136ec0b54243b3ed3b5ffe33e
0e12677cad70efef8db68c3ada181fe9
0bdb754fb0e3b5ee5c1f5a9e3b110692
3a9169ea55600380f72f5fd680c30dcb
2c872dee7716db6b6dc359e30c9157f8
1433146ef4661c0d5a236d6fc8a6b575
0a205609777db385a4daf2fcd8610d7d
2c660853d9eb766c70261b98d7b8b23f
97582f290eca3972d47d951b25f83403
01432bc9459661e4f9a6833f1515138f
9f15a269714786405640cbdb70a01053
7ec7204c17c7db5ffb059c7d0bc1db2f
a5694fb5f148d7ceb3fefb1ec0869232
3f11b7ee70be1f8c49b5dfbdecbd1ccd
6929f17e4da2a369cd7fc4c6ca19d9ef
bdae53a6c813abbbb3a3f7ecf0b75ced
3a6b0e6ca2218a2a2ae90f70854c281c
439a03cfe018bfb8458ac8daf0729b1f
dc74f00c6c67b619d4bcbfe6032502b5
7ddc59bd71bf181d69c0e4a3619b5da4
23024a50f3c55c6dd24c3850bc0cdf68
7cd601a6bc844ac8a42deab049e0d9e7
efbe228815172b1b8c6a3ebfe5071f35
8720e8b3f56dc689e7bd1f1216c7b5cd
b3342db0e92c968ddcd4625ecdc7179a
Expand Down
Binary file modified data/cves.db
Binary file not shown.
82 changes: 41 additions & 41 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-09-19 11:19:34 -->
<!-- RELEASE TIME : 2023-09-19 12:42:11 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2404,67 +2404,67 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>52111c8632e4ec561c38e328a922251e</td>
<td>CVE-2023-33136</td>
<td>2023-09-12 17:15:09 </td>
<td>Azure DevOps Server Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33136">详情</a></td>
<td>dce005099e3f20c29b009557c11b6cc0</td>
<td>CVE-2023-36800</td>
<td>2023-09-12 17:15:15 </td>
<td>Dynamics Finance and Operations Cross-site Scripting Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36800">详情</a></td>
</tr>

<tr>
<td>56980fa910a888df15e2779dc1e99b4e</td>
<td>CVE-2023-29463</td>
<td>2023-09-12 17:15:09 </td>
<td>The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users&acirc;&euro;&trade; session data and or log users out of their session.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29463">详情</a></td>
<td>441f4690d53109837772a720a95b63fa</td>
<td>CVE-2023-36799</td>
<td>2023-09-12 17:15:15 </td>
<td>.NET Core and Visual Studio Denial of Service Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36799">详情</a></td>
</tr>

<tr>
<td>5f58f41ffc21ccc1c1ae15c898cd7e74</td>
<td>CVE-2023-29332</td>
<td>2023-09-12 17:15:08 </td>
<td>Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29332">详情</a></td>
<td>9f7d82dd7f4ba340f04a08f251e6b9f6</td>
<td>CVE-2023-36796</td>
<td>2023-09-12 17:15:15 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36796">详情</a></td>
</tr>

<tr>
<td>ed65bc8594926fc00870198104820a56</td>
<td>CVE-2023-34470</td>
<td>2023-09-12 16:15:09 </td>
<td>AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34470">详情</a></td>
<td>74d33fe152547c62bfe69955d3270806</td>
<td>CVE-2023-36794</td>
<td>2023-09-12 17:15:14 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36794">详情</a></td>
</tr>

<tr>
<td>2306c301d8d58c27b7ea696df5821621</td>
<td>CVE-2023-34469</td>
<td>2023-09-12 16:15:09 </td>
<td>AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the physical network. A successful exploit of this vulnerability may lead to a loss of confidentiality.&Acirc;&nbsp;</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-34469">详情</a></td>
<td>f57a585c15991bae1d4618bd856384aa</td>
<td>CVE-2023-36793</td>
<td>2023-09-12 17:15:14 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36793">详情</a></td>
</tr>

<tr>
<td>3cdc237190d7ea77f1ac56c0f405f26f</td>
<td>CVE-2023-0119</td>
<td>2023-09-12 16:15:08 </td>
<td>A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0119">详情</a></td>
<td>7e6ca1a5a271c50671bea04219928642</td>
<td>CVE-2023-36792</td>
<td>2023-09-12 17:15:14 </td>
<td>Visual Studio Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-36792">详情</a></td>
</tr>

<tr>
<td>fc52900b5b2a1a05f20633c8b0c97e14</td>
<td>CVE-2023-4914</td>
<td>2023-09-12 15:15:24 </td>
<td>Relative Path Traversal in GitHub repository cecilapp/cecil prior to 7.47.1.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4914">详情</a></td>
<td>52111c8632e4ec561c38e328a922251e</td>
<td>CVE-2023-33136</td>
<td>2023-09-12 17:15:09 </td>
<td>Azure DevOps Server Remote Code Execution Vulnerability</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33136">详情</a></td>
</tr>

<tr>
<td>f3d7f4147503885748dbe980d7f81ae9</td>
<td>CVE-2023-4913</td>
<td>2023-09-12 15:15:24 </td>
<td>Cross-site Scripting (XSS) - Reflected in GitHub repository cecilapp/cecil prior to 7.47.1.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4913">详情</a></td>
<td>56980fa910a888df15e2779dc1e99b4e</td>
<td>CVE-2023-29463</td>
<td>2023-09-12 17:15:09 </td>
<td>The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users&acirc;&euro;&trade; session data and or log users out of their session.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-29463">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit eed5350

Please sign in to comment.