From f2f78371cbb72b792c0a4b9959868134789e689a Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 28 Sep 2023 19:18:42 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 43057152 -> 43065344 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index f72fb76c29c..a5cc58d10a2 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -190,3 +190,13 @@ af0a8b9ddc2ec226d9c40e6b963d3123 1fb752e8abf33c31bd2b0595be0341a3 49ae44d682e1640ec6faa637950432db 1276656175991a04dc30804d7d5d3d67 +bd49c458aa5676b74d77c59df667daca +060ebb790e855bc37933e65b3c4dbc0d +cbb5a81fac5dcc23349eeb2d9caa2405 +ee971b3d0f69b61d5149b437f2b8612c +18397e39e33564abd5cb1943c029510a +f078dc504f2d31eacf03b6ae6c8bc4c8 +298da2c147a6612880bd5bcdbe6fb472 +08c7e55b988aba1789f7660db3b84325 +707a20db56c7379d72b9e38f3058d554 +3aa345f401b30d30a53bb28432bb7d6a diff --git a/data/cves.db b/data/cves.db index 527525af748feb14fcc7d8aa8f6bf41d2569aaf2..e862fcc1c25cda7f9dead43fbcb5a87fc52d67e1 100644 GIT binary patch delta 5107 zcmc)Md303O9S3mUO9CMzm_S$)@Bu;ykT5fER$N#D0so6Fe5XomNlVKR)-IIrHwl@Atd+ z{@!hF-d)^$-|ph}lAJAFx|H|Yq>Wd$vy9h!^66_#pvE5E6ongB%Mv4stx?1ju;E1jt0lBuEux zGGq$mM95UgG{|(wNst+knUGnK*^oJqxsZ8~`H%&Wg^-gWiy)^!7DG;joCa9}SqeEF zvJA2u!u%Kz6B3445E~MKR6}YYQOFsP6_8p;9V7;+hcrM|LgJ7FBnfGRG(lED&V;On zoCP@>at>q-d0c0KILdbf^MUV}Uiy<2!?T}57OCXm* zHbZ^@xeStq{19?EEfFF{_0{08z{$SaUn zA+JI9LiR!SLw*POJ>+%B8<004Z$aLMyaRa`@*d<5kOPqSA%BE?067Tx6Ql$3XUK<; zk02jIK7o7+`3&+oP!8oKMkOPR6?aRhz8Tqq|p!>O2g(iyaZYN?K5R8I}GlH!!0BsEeK zt)eq&HJwFg(>b(;&ZV`~OfA$(ZImL=d2~KqKIZlD|KM|2b2Ot;XjbQ|4HchH@*jkeQ|=_mA4 zx{H2BJLu>Q}i@F zL(kH4^gO*lFVai&GW~{rORvzY^cwA@eYBr`N57}n=?!|5-lDhZ9eS7Eqd(9AdY}GC zAJ9Si6Lrv^=|lR6KBiCTQ~HcPr!VMBIz(S7>qO=8CzY}&n{uctb)#JBPI=UW@~MD& z(os}MMbwLWQ!(|SzSNKU(*PPsB~(g-XfPd38V#YLG>nd+;WUEEXe5=>C>l*;sDdhK zEV;-{9@5E6KJrt5f)t{0bSxc5$I}Tko+i*lnnYDJnWoT*G?k{&bUKM<&`g>|vuO^^ zrFk@;7SKXEnHJG0w3tq%(`X4TrPFB{EvHQW4KgWA7TFY`YO0|qok1(8mg*=*_0&Ks zDNYGWQX@6dDms%^(^+&jokMHrTv|)b)IzP)Mk#ftK;61AH=Vt=OXiZaE59A;sI08) zH?wyXZQFK}l3!kw>KMqs3R4}uHy+pwmCbpX=KM@^L8e)kX)eq(>od(onPx+#xj55o zRCgWN+^+UpQd*!Cb}4u>e{PSpc{_8T%gyUn)pd2wot$b=*3xugVf=%N)Kt!rH>;w& zZI0eH$1p8#DD3qG4a4UT_|1UV3IxKwkQMR!1D4?wwVbDxX6wPA*LnH|w^HeyZ%6F7 z9Shsq^vPNzUSFprYizB-h}pH;!nhGj7~y2JK9(4x)km}ijb@xbocl*LE0LjPNA@ja zpSV$HC+&Ep$K}y0T%ih&^V*GWCHOt&==tqAoc*~QRZkY*e%I2Dc6DohaRHa0n-b|# zaHz*8-4Auk&wf2Cdq?3@_I#zHZ2(sxlbF^adg~Cw6$}S#pU(^hgNA9i1Hn)v;P<;M zQ#XTN-7(Btl@e#)@HJ|->Y11>dhq?hy{l#|s52}(5v^;ewY8>7Po>9cnKwi|I{n(K zk903?up(L{%70cxlQmjR)UxcD$ z3I;rFOHv&JIztNUtzp9x3R;FI?Dhr>zu)Z%23@A*GsBi?`y-~;G0t_VUx%dV&i+H= z)yhKK)ZjejF?evYqRWF<6qY^6H|KArd!>; z`P4riYS6zN%GomWab<+Zs|N#mYFMhHf9J*>t+$OfBCbHt3j18%h{w|1wh@lFbklFx z{&3I?d!2)~EdC}KZ~Domvt8-J4fAsTNkG%8>Kj(aqt!J@&4^jr#KvSzeVhT>wN~Pr z2<@byjnJwZ6G`s+g+_JaA4Til^@RUl%{1=2&vZmGyr@fc^kXv0QmgdTs^#vW9tzlc z$kuhA-^)Yo3!CncR}Z^9A)nhRioU9pWcfVq^vc&0eb&}S&6sIbY7@1D9dEMZTG)tb zal4^*_2I2)Xl8AFc!idTo@HybM!cGjBy0GLXPIBuMrIED>`9ZgM1vjH5=kRzCpx!4 z=i||YW@vtIg&9q1jj=?uI%Zp1lTq7fmse^FYxsB6xp~~(N{{ruCvM4ga<3kv7EjQa z?0OCxXP0O!X~!&fGVL0pDVkXZ%FGw8joPtfW-cSCS@m`zR+iL~aob3yC%mwJKu^ZB zyxLAK&%DRTa%cN(%az_ezr7iqgA;4iL2Lh?(I*m(&TULU?*AqM=^2g9$FRI|@qKNL zsgAy#EAoUAvwZcUYXrMJ@UPp{nGQJ!vy&&y9&^;+IPJ>mMt3kO?YlJ_gq&oU^)`;$UTX!RDnm!}wju>H| z6%KoJ-5auP(_@9ghT-u#^E%qp(qh(@;QVOP?ksb9rAwHRf^N?TNe&bKebu%oQBp(N;l`;_4!I)_3Ma7 z{kswWCxadlSYalxQ05!17M#?jXH&thq7Uv-LfJc9g^NAi?wT7Fy35jChEF$555M3ZCc|=+wytW)Ko08e`#^Et-*)Q$O(&=2rG=_1vqSyC zwwzQ)N#_|X&|3?PfGc2lc&YID!vQXd74VoW;=zdS@&zrQ(=r=sX%2&SAHEdyIAv1R c6dpErrJt`>VJU;Y%hlpP8s&&9MHb)VFA~27C;$Ke delta 2478 zcmWmG=XVYU7>03qlMoREF(dZgd+)vX7TosUdnUn+Sc%qZY3)v`EvjZv-P@+6wP~wX zcd1_Qhu`%F+~+*!Jc-9n#v~@5j7g0RUzaXj>F8C38iuS(k`-bFtWYb=3b)c*8LS8^ zqZMgovZAcaRu(I(6>Vj+vRgT<7%Qih%gSx#vGQ8^tXM0*6=xN&3R;D%!d4Nhs8!4= zZk4b~TBWSgRvD|TRn97JRj?{rm8{BE6|1UM&8lwIuxeVhtlCx`tFBegs&6&08d{C4 z##R%nsnyJCZndylTCJ?sRvW9W)y`^fb+9^GovhAQ7ptq)&FXITuzFg(tlm~1tFIMr z^|Sh011$C#XbrLkTSKg&)-Y?hHNqNcjj~2tW2~{(IBUE$!J24IvL;(otf|&CYq~YV znrY3lW?OTtxz;=@!Ai7}tohagYoTRpk+s-bVkKKkt!377YlXGaO0iO{Rn~LX^VVu> zjkVTVXRWthuwJw_SR1XEte34#)@Eyqwbj~YZMSwjXYIG%w+>hbtwYvf>xgyKO0$kx$E_3A2i8gJL+c~!W9t*^Q|mM9 zbL$K1OY1A^YwH{9TkDi{+B##Mwa!`Rtqayg>yq`I^}Ti3x?=rc{b*gau36Wu8`e$h zmUY{@W8JlWvVOLHvF=&FTKBC7)_IxQ_>T zh(~yg-|##Bz@PXFf8!tgizj%B|L`m%Spm);0fZt9;Yg1Rh(Ja}A`_yJ8Cj4O(a47E z$blH-L@wk;9^^$n#3Dc9Pyhu{2!&AuMNtgJQ354V3Z+p7Wl;|0Q2`ZE36)U=RZ$Jq zQ3Ewm3$;-Pbx{xX(Ett62#wJMP0? z2_`w1rNJx{|%N+9k2>eN8azOhlE@#!+(it3apA@WGXnTW^?P1DZ|-yL=< bEG~3^wh1%ZhU{z9;ZaCh{NvQX_Ne~>B;l@K diff --git a/docs/index.html b/docs/index.html index 100c7596804..b206d2992ab 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + bd49c458aa5676b74d77c59df667daca + CVE-2023-43884 + 2023-09-28 15:15:00 + A Cross-site scripting (XSS) vulnerability in Reference ID from the panel Transactions, of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Reference ID' parameter. + 详情 + + + + 060ebb790e855bc37933e65b3c4dbc0d + CVE-2023-43879 + 2023-09-28 15:15:00 + Rite CMS 3.0 has a Cross-Site scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload into the Global Content Blocks in the Administration Menu. + 详情 + + + + cbb5a81fac5dcc23349eeb2d9caa2405 + CVE-2023-43878 + 2023-09-28 15:15:00 + Rite CMS 3.0 has Multiple Cross-Site scripting (XSS) vulnerabilities that allow attackers to execute arbitrary code via a crafted payload into the Main Menu Items in the Administration Menu. + 详情 + + + + ee971b3d0f69b61d5149b437f2b8612c + CVE-2023-43876 + 2023-09-28 15:15:00 + A Cross-Site Scripting (XSS) vulnerability in installation of October v.3.4.16 allows an attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost field. + 详情 + + + + 18397e39e33564abd5cb1943c029510a + CVE-2023-5215 + 2023-09-28 14:15:00 + A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly. + 详情 + + + + f078dc504f2d31eacf03b6ae6c8bc4c8 + CVE-2023-43874 + 2023-09-28 14:15:00 + Multiple Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Copyright and Author fields in the Meta & Custom Tags Menu. + 详情 + + + + 298da2c147a6612880bd5bcdbe6fb472 + CVE-2023-43873 + 2023-09-28 14:15:00 + A Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Name filed in the Manage Menu. + 详情 + + + + 08c7e55b988aba1789f7660db3b84325 + CVE-2023-43872 + 2023-09-28 14:15:00 + A File upload vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS). + 详情 + + + + 707a20db56c7379d72b9e38f3058d554 + CVE-2023-43871 + 2023-09-28 14:15:00 + A File upload vulnerability in WBCE v.1.6.1 allows a local attacker to upload a pdf file with hidden Cross Site Scripting (XSS). + 详情 + + + + 3aa345f401b30d30a53bb28432bb7d6a + CVE-2023-43868 + 2023-09-28 14:15:00 + D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via websGetVar function. + 详情 + + 6ca126e0c0ef5582d3c8dc25fe70dfbf CVE-2023-43325 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - adef21e65acb244b2799e2385716c9bb - CVE-2023-39408 - 2023-09-25 09:15:00 - DoS vulnerability in the PMS module. Successful exploitation of this vulnerability may cause the system to restart. - 详情 - - - - dacf6749ce99abed57535417068efd43 - CVE-2023-39407 - 2023-09-25 09:15:00 - The Watchkit has a risk of unauthorized file access.Successful exploitation of this vulnerability may affect confidentiality and integrity. - 详情 - - - - df45022cf6671b189c9d623f3b96bf22 - CVE-2015-6964 - 2023-09-25 05:15:00 - MultiBit HD before 0.1.2 allows attackers to conduct bit-flipping attacks that insert unspendable Bitcoin addresses into the list that MultiBit uses to send fees to the developers. (Attackers cannot realistically steal these fees for themselves.) This occurs because there is no message authentication code (MAC). - 详情 - - - - 623d7bd65a0f8568f396c63a1df26193 - CVE-2023-5154 - 2023-09-25 03:15:00 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-8000 up to 20151231 and classified as critical. This vulnerability affects unknown code of the file /sysmanage/changelogo.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240250 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - - - - b2f60dc31292aa9f5768b2d439fda37a - CVE-2023-5153 - 2023-09-25 03:15:00 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-8000 up to 20151231. This affects an unknown part of the file /Tool/querysql.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - - - - 57872237bd7c9101606e445879ba4499 - CVE-2023-5152 - 2023-09-25 02:15:00 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-8000 up to 20151231. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation of the argument sql leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240248. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - - - - 247ce7e005098dccd941c97106355d38 - CVE-2023-5151 - 2023-09-25 02:15:00 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DAR-8000 up to 20151231. Affected by this vulnerability is an unknown functionality of the file /autheditpwd.php. The manipulation of the argument hid_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240247. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - - - - a0c275e58017500731ab01a930a918f1 - CVE-2023-5150 - 2023-09-25 02:15:00 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /useratte/web.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240246 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - - - - c1a94b28efbdab10aaddc13f2e04db9d - CVE-2023-41872 - 2023-09-25 02:15:00 - Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Xtemos WoodMart plugin <= 7.2.4 versions. - 详情 - - - - 78cf826dd92e31873c6a55c7bbf111f6 - CVE-2023-5149 - 2023-09-25 01:15:00 - ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240245 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. - 详情 - -