Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 25, 2023
1 parent b581777 commit f0f2082
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 9 deletions.
1 change: 1 addition & 0 deletions cache/NVD.dat
Original file line number Diff line number Diff line change
Expand Up @@ -192,3 +192,4 @@ fe5bf87ad64ea55642c4d0e4638e7d70
8705433becdcbc9e18ef1a391d29c003
128b17765083a4832013f2039b8b0be9
8bc481861646a25a6e84624862c1807e
a160970831fc3fae1bdc2afb91c8e24e
Binary file modified data/cves.db
Binary file not shown.
18 changes: 9 additions & 9 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-10-25 16:30:07 -->
<!-- RELEASE TIME : 2023-10-25 18:27:08 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2259,6 +2259,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5631">详情</a></td>
</tr>

<tr>
<td>a160970831fc3fae1bdc2afb91c8e24e</td>
<td>CVE-2023-5632</td>
<td>2023-10-18 09:15:10 </td>
<td>In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-5632">详情</a></td>
</tr>

<tr>
<td>8705433becdcbc9e18ef1a391d29c003</td>
<td>CVE-2023-5621</td>
Expand Down Expand Up @@ -2459,14 +2467,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38740">详情</a></td>
</tr>

<tr>
<td>b825285c421c653f48c597b72e4bef7b</td>
<td>CVE-2023-44391</td>
<td>2023-10-16 22:15:12 </td>
<td>Discourse is an open source platform for community discussion. User summaries are accessible for anonymous users even when `hide_user_profiles_from_public` is enabled. This problem has been patched in the 3.1.1 stable and 3.2.0.beta2 version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.</td>
<td><a target="_blank" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44391">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit f0f2082

Please sign in to comment.