From eed5350395123cac9a9f28ecfe6d259f984da516 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Tue, 19 Sep 2023 12:42:13 +0000 Subject: [PATCH] Updated by Github Bot --- cache/NVD.dat | 6 +++ cache/Tenable (Nessus).dat | 100 ------------------------------------- data/cves.db | Bin 42889216 -> 42893312 bytes docs/index.html | 82 +++++++++++++++--------------- 4 files changed, 47 insertions(+), 141 deletions(-) diff --git a/cache/NVD.dat b/cache/NVD.dat index fa7d10a7a80..44c22591b9a 100644 --- a/cache/NVD.dat +++ b/cache/NVD.dat @@ -141,3 +141,9 @@ d0568f9dd11713d1c03652f9a0c6e617 c8091e71622b885fb6d1995d39688d9a 928f5b89c21c3c373703726bca758187 47a8e67adf22340ed7cc272ff8ef66d6 +dce005099e3f20c29b009557c11b6cc0 +441f4690d53109837772a720a95b63fa +9f7d82dd7f4ba340f04a08f251e6b9f6 +74d33fe152547c62bfe69955d3270806 +f57a585c15991bae1d4618bd856384aa +7e6ca1a5a271c50671bea04219928642 diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index 9d97bb2720a..9160c23c027 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -1,103 +1,3 @@ -b19c001938e3bc1b04159c108468291e -aa6f5e13e725bb7cdb1055a20106e830 -91d289b7ec0cc2efb4b198315f5113d0 -3fcbe3a80518d4b8960546e7e1ae79e9 -aa8f046b081ff8f82081c435355a2e58 -79ca27750a8c2389d283ce040e07dc39 -f27c1cc4d574eb4fe505f940c1900305 -ec8ca59b2a72dfaab94eb9ff1fd28819 -18667666e6ae191fdb1cff9af7cf4d89 -e56d7803cef276ca08224b9b82c084a5 -66d950e3cd3d4afdc750485273c26a70 -fd4db62e912cd5b197e7830790d8feb8 -7781abcbbf3718db06c9f19a2597e977 -94a723514c7787f6d3ff573f1ac220a6 -52cafe7fc2d05288c52a92c9b60e9bbe -d2bcff274e271d82653a17421d5c7519 -634de1fdf57e58f2659baa2788ca5284 -8db761a0956e39f43df6f20f0f4b59c6 -f4f874a77cabdba3a8cc5f5e9595e5f3 -9a59d14e459e7edfea318d0d92819fde -15bc8e4e8734b18119ca97ed448b19f0 -4dad27b88ef0848ae43c3ecb31c23f5d -7d016c64a71d29633cc6fb1751368d70 -145eaa8e660d5bec00c3014137b12c32 -184f225c5ca61c1772f4ce950951076d -7e244dcbedb1f46abae298acfd1dcc39 -d83c6f5b36c42c2879ba87a038af04ae -e5714d21ce7eed0d30bd026a9fb8b154 -21ad49f3cc2754b981aaaf1947d94838 -472a25b2ad05a91cd162e06fe7d53ff4 -3658c3574d295a407039612ebcfa21ca -178513411de16dc0bd066254b7bea702 -7ce40952bf546afa73361aac3e658b6f -53647c62f91e76035164ac98652e628e -f66867132d966049e4448716423a62b8 -542b9987bd207dc8f9dfb84780653ff6 -1b3488efc1260a29f38458155f3b70b1 -a3aa8d8b42b123bb2b1e84adc9fdfd0f -d60d5b36f328d3f9f05a6ff7f59903f4 -27d600181a095cdf1d1f2295b2aafdf3 -64dc6980359800422f73759951a9b3e8 -bfde77fc9620c99f38d9724083847513 -ff959d24c7f917f19d880e199a7558cd -6daac3ab26d6f73f941dca4a3b63c9a2 -424aca34d0646e52aad3f7c4975f0360 -e335d436179d97f11310a70bcd99c104 -b31ed52da226110620fea72d1df32093 -436a1d1146419571afb63b60079672a4 -0686da1ed4133ca2261ca71dc5c24031 -cd6b936570afb701b9ebde68a9b66a9d -e23577e20247d8fbca501336aefba0e9 -d0d28b3033b340a334854054259889dc -295ba82d300748b80acdb6109806335a -f6e766191ad638044399ec062a3fbb0b -8a12b1b1c951d58aa541742292394cdb -f2de48806e5929142a12d3514683b921 -2e74ad6fe9367bf669d04f4b3a4f0d4b -e92b9cc02fedb141d4208c8591e7faf7 -5750a2678faec39d41a6c341cf3352ef -7adb0d53f8af6e978fd039db4612f5c4 -5dee43a1216bdaf68a97f92e356652f0 -948bbfd6959e6ee141e73d3435b04807 -d178eb7b9d194b8e1b3a0f8431abd55a -16c47f2ec1c582247a5c57f3cdb6a313 -8410eebf33f34fc1f688b6d0a732c6c9 -58d07f74c2230c64701fc38ee882101d -a4bb394e486ff1358b7adb3a39597685 -e6145f7dd3fa9151340c8f8c79d73f30 -19fd1260b4c759680f53c86f50ce7c75 -6f38a0cede8657a7e2ede47b72f69433 -1bcf1b7b5eb3dc2be9158c2b2e819763 -8474d6d428844255b037c74eef64f450 -021fa0d085b3d0f112f5b88b5c948d36 -d83fd65e7384ca367900f4078941b9d3 -e324e34fa330f3b8e8cfe453d2e5269e -aa406a7656a4846a4182281d02a8149f -ebd8cbc67749336dd66b12f9fb0449d3 -5142d126983a795bf9db99a9d1b54043 -db38d96136ec0b54243b3ed3b5ffe33e -0e12677cad70efef8db68c3ada181fe9 -0bdb754fb0e3b5ee5c1f5a9e3b110692 -3a9169ea55600380f72f5fd680c30dcb -2c872dee7716db6b6dc359e30c9157f8 -1433146ef4661c0d5a236d6fc8a6b575 -0a205609777db385a4daf2fcd8610d7d -2c660853d9eb766c70261b98d7b8b23f -97582f290eca3972d47d951b25f83403 -01432bc9459661e4f9a6833f1515138f -9f15a269714786405640cbdb70a01053 -7ec7204c17c7db5ffb059c7d0bc1db2f -a5694fb5f148d7ceb3fefb1ec0869232 -3f11b7ee70be1f8c49b5dfbdecbd1ccd -6929f17e4da2a369cd7fc4c6ca19d9ef -bdae53a6c813abbbb3a3f7ecf0b75ced -3a6b0e6ca2218a2a2ae90f70854c281c -439a03cfe018bfb8458ac8daf0729b1f -dc74f00c6c67b619d4bcbfe6032502b5 -7ddc59bd71bf181d69c0e4a3619b5da4 -23024a50f3c55c6dd24c3850bc0cdf68 -7cd601a6bc844ac8a42deab049e0d9e7 efbe228815172b1b8c6a3ebfe5071f35 8720e8b3f56dc689e7bd1f1216c7b5cd b3342db0e92c968ddcd4625ecdc7179a diff --git a/data/cves.db b/data/cves.db index 52f61d4520636340e2be3c7f25f6fe503db3e6ba..0f69253360be8e6a9751a7029a9b9eba7a900007 100644 GIT binary patch delta 3110 zcma*pcW_ko8pd(c?o|$uI=dQcESOh_`dR(00anC{S}`kb zC9I^CveH(@%31@hLDpbv7i)+$)Y{b=W(~J?vqo4Wt=+9XtUaw!)@W;twU;&4+S}U4 zs1T&uyFXPs)zw`?u2 z7FwrSi>$@g5^Jfo%vx@(uo|t?tuw4Mt+TANt(8`jb&hqeb)I#;b%AxEb&*xDF19YQ zF10SRF1N0*uC%VQuC}hRuC=bSuD5QmZnSQ)R#`V&w^+AYw^_GacUX5?cUgB^_gME@ z_gVK_4_M9CYHN-4p!JaTu=R-bsP&ljxb=kfr1g~bwDpYjto5Ary!C?hqV!+O(t%X-^-$9mUVXT4{=Z+&2WXnkaTY<*&_w?4H#vp%;rSYKFQT3=Zk zt*@r4tY59)tlzCatUnhiv`ircC_yR0Xo=0x3azm@%219r zXp44ej|z0a7U+mAu@$yPCv1al(HULP72Ba3D$yO=qX%}tj_8S<&Gy0$}`k_At zAc81jh$Dd{Qb;3%ECyl_24fct!BFgqVHl3xFajg7JNCey7=_UogS{{odt)C|VI20w zei)Al*dG&d01m`Kn1q8d8HeCd6#LJi8hO;97Iiobhhqw+;s_jxX_$@~n2Dn>3$t-F zj=`}w4#%S&Ctwav#7Q_Ar(iA`Fb}63veMWLID@!5?qSQa5=8PmADF5;~HFx>u^18z>T;Gt8g=J!L7Irx8n}n ziMwz&?!mpd5BK8%G-EZ^;6Xfuhw%s=#bbCJPvA*Bg{Schp2c%`9xvcUyo8tW3fAIP zyoT5D2HwP5cpLBFU97`oJ;OMHcm_!{5fTYQJ_@dJLu zPxu+X;8*;H-|+|j3@uW?>u(=h`xaTI1@Hjc(II2Om@c+}$r%)yB`2`A$e z%tZs{;Z)2I?w5nhSG1ZQ{-Z_lPf~Mvqk}hsQ25U7kJQz@Ja`a z1;w$jI8G~$Ma8kWIF=O0(x5rKa#`@_6C=Ydy0&O_PRYt(awx{nzd!TZv#s^m3B6|| zXEc;$>(VuuSWQj3E>WF}Cn9x`L@tu4izTDAsp@PYG-rGeElFong&}!z9a}2 zhJ3#?Xjw=$)CUz!kqxVR6so>{Cp0h~PjPTw&-oiOWvp)~Nj8);lqC|;xNj*RU{iK8p>+&wUJ0NlFin}>td07EL$CkWRuBsJ{qk~ z<@1GxaqC0<3o}P84@z4{M$}KwO`DRR-L$5rZKuNUXTJ*d`e$5OG+FtdM`E+egFb~- zchv`pAQEX_nO`1EEpO9?YD>!3v}pTzo3-W56;%U5t3u6{t44>u32*x95bj&7eDGhD zr)yLBTr`)=#nRDyGLlM1t7~(SL@b)k#xkkGCAYj98W1ktUhKb152A^t?i*Ie{@r+V z)2ZV2L4R$pOQv(lOfnx$X0y@iTy3-_k&0%jYck1HJd057js-A!bdBzAMt67TO?P*XxPj5243tzF3{VU}dy2S(&XYR#q#UmEFo=<+O5HF;;FXkCoTTXXUpF zSOu*@R$;4%Rn#hG6}L)QC9P6cX{(G?)+%R}w<=f_tx8s9tBMtCRkf;F)vX#mBP|YooQv+H7sHwp!b)?bZ%!r}duozV(6ip|#7} zZGB{YZ0)i3TKla1)&c9Fb;vqwePSK4KD839qt-F&GwXBf3+qekxOKuhX`Ql8TVGjU zTW74Z);a6Eb-}u5U9v7)SFEenHS4lf=+>o@Cn>%R5CdT2ee9$SA{e_DT8e_Kzir`9v;x%H3rul2%uX}z-kvtGw5WRXG; zKq!(T4B?1CB$6RHQXmQ`kqW7i25FHF=@E?#$cRkHj4a5CY{-rr$cbEtL2l$hUgSf5 z6hJ`~LSYm^Q4~XQlt4+8LTQviS(HP0R6s>kLSZ1V~ zq7fRS37VoAnxh3;q7_=B4cej|+M@$Hq7yo!3%a5kx}yhz`}agI^hO`_ML+b%01U(+ z48{-)#V`!V2#mxijK&y@#W;+|1Wd#vOvV&U#WYMu9A;o9W??prIhc!ih{t>^z(Op- zVl2T@EW>iVfj6-N30R3$cnfc1HP&D))?qz1;2pe+jo5_E*n+LthV9saop=xL;{$w% zUD%C}@Ge@d|MM2p|+m5r%L?AQH)t94Qcmlt_itNQ1OUhxCX> z24qAgWJVTbMK)wd4&+2G#2`2FATRPEKMJ5A3ZXEHpeTx=I7*--N})8$pe)LvJSw0f zDxor}AQn|o4b@QtHBk$-Q3rKV5B1Ri4bcdV(F9G=49(F3Ezt_C(FSeN4(-ta9nlG$ z(FI-64c*ZL!To!p7kZ-)`l28DV*mzX5C&rihGH0oV+2NG6h>nV#$p`CV*(~(5+-8` zreYeVBMvh#6SFWoa6}GlS`s-lJS<7@NlJ`b>cEY_{&bJ~CKC6U^LT<^>ZU u%=};$1hX)Z7?H3j@aj}VAT%LK + @@ -2404,67 +2404,67 @@

眈眈探求 | 详情 + dce005099e3f20c29b009557c11b6cc0 + CVE-2023-36800 + 2023-09-12 17:15:15 + Dynamics Finance and Operations Cross-site Scripting Vulnerability + 详情 - 56980fa910a888df15e2779dc1e99b4e - CVE-2023-29463 - 2023-09-12 17:15:09 - The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session. - 详情 + 441f4690d53109837772a720a95b63fa + CVE-2023-36799 + 2023-09-12 17:15:15 + .NET Core and Visual Studio Denial of Service Vulnerability + 详情 - 5f58f41ffc21ccc1c1ae15c898cd7e74 - CVE-2023-29332 - 2023-09-12 17:15:08 - Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability - 详情 + 9f7d82dd7f4ba340f04a08f251e6b9f6 + CVE-2023-36796 + 2023-09-12 17:15:15 + Visual Studio Remote Code Execution Vulnerability + 详情 - ed65bc8594926fc00870198104820a56 - CVE-2023-34470 - 2023-09-12 16:15:09 - AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability. - 详情 + 74d33fe152547c62bfe69955d3270806 + CVE-2023-36794 + 2023-09-12 17:15:14 + Visual Studio Remote Code Execution Vulnerability + 详情 - 2306c301d8d58c27b7ea696df5821621 - CVE-2023-34469 - 2023-09-12 16:15:09 - AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the physical network. A successful exploit of this vulnerability may lead to a loss of confidentiality.  - 详情 + f57a585c15991bae1d4618bd856384aa + CVE-2023-36793 + 2023-09-12 17:15:14 + Visual Studio Remote Code Execution Vulnerability + 详情 - 3cdc237190d7ea77f1ac56c0f405f26f - CVE-2023-0119 - 2023-09-12 16:15:08 - A stored Cross-site scripting vulnerability was found in foreman. The Comment section in the Hosts tab has incorrect filtering of user input data. As a result of the attack, an attacker with an existing account on the system can steal another user's session, make requests on behalf of the user, and obtain user credentials. - 详情 + 7e6ca1a5a271c50671bea04219928642 + CVE-2023-36792 + 2023-09-12 17:15:14 + Visual Studio Remote Code Execution Vulnerability + 详情 - fc52900b5b2a1a05f20633c8b0c97e14 - CVE-2023-4914 - 2023-09-12 15:15:24 - Relative Path Traversal in GitHub repository cecilapp/cecil prior to 7.47.1. - 详情 + 52111c8632e4ec561c38e328a922251e + CVE-2023-33136 + 2023-09-12 17:15:09 + Azure DevOps Server Remote Code Execution Vulnerability + 详情 - f3d7f4147503885748dbe980d7f81ae9 - CVE-2023-4913 - 2023-09-12 15:15:24 - Cross-site Scripting (XSS) - Reflected in GitHub repository cecilapp/cecil prior to 7.47.1. - 详情 + 56980fa910a888df15e2779dc1e99b4e + CVE-2023-29463 + 2023-09-12 17:15:09 + The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session. + 详情