|
1 |
| -<!-- RELEASE TIME : 2021-08-26 22:27:17 --> |
| 1 | +<!-- RELEASE TIME : 2021-08-26 23:26:29 --> |
2 | 2 | <html lang="zh-cn">
|
3 | 3 |
|
4 | 4 | <head>
|
@@ -252,6 +252,62 @@ <h2><a href="https://github.com/lyy289065406/threat-broadcast">威胁情报播
|
252 | 252 | <th width="43%">TITLE</th>
|
253 | 253 | <th width="5%">URL</th>
|
254 | 254 | </tr>
|
| 255 | + <tr> |
| 256 | + <td>ab3d2a1baa2de10eb971a8a842d84086</td> |
| 257 | + <td>CVE-2021-39165</td> |
| 258 | + <td>2021-08-26 21:15:00 <img src="imgs/new.gif" /></td> |
| 259 | + <td>Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.</td> |
| 260 | + <td><a href="https://www.tenable.com/cve/CVE-2021-39165">详情</a></td> |
| 261 | + </tr> |
| 262 | + <tr> |
| 263 | + <td>ebd92be6e1cb2b3c7996752785e65879</td> |
| 264 | + <td>CVE-2021-39161</td> |
| 265 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 266 | + <td>Discourse is an open source platform for community discussion. In affected versions category names can be used for Cross-site scripting(XSS) attacks. This is mitigated by Discourse's default Content Security Policy and this vulnerability only affects sites which have modified or disabled or changed Discourse's default Content Security Policy have allowed for moderators to modify categories. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to ensure that the Content Security Policy is enabled, and has not been modified in a way which would make it more vulnerable to XSS attacks.</td> |
| 267 | + <td><a href="https://www.tenable.com/cve/CVE-2021-39161">详情</a></td> |
| 268 | + </tr> |
| 269 | + <tr> |
| 270 | + <td>c08676bf3dd82325a4109bdc94155fcc</td> |
| 271 | + <td>CVE-2021-37715</td> |
| 272 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 273 | + <td>A remote cross-site scripting (XSS) vulnerability was discovered in Aruba AirWave Management Platform version(s): Prior to 8.2.13.0. Aruba has released upgrades for the Aruba AirWave Management Platform that address this security vulnerability.</td> |
| 274 | + <td><a href="https://www.tenable.com/cve/CVE-2021-37715">详情</a></td> |
| 275 | + </tr> |
| 276 | + <tr> |
| 277 | + <td>cdcc7f91716cf5ca9025449fe9ff8c75</td> |
| 278 | + <td>CVE-2021-29862</td> |
| 279 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 280 | + <td>IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 206086.</td> |
| 281 | + <td><a href="https://www.tenable.com/cve/CVE-2021-29862">详情</a></td> |
| 282 | + </tr> |
| 283 | + <tr> |
| 284 | + <td>1cb7ec9f53cb8b76921de6ff2fd35882</td> |
| 285 | + <td>CVE-2021-29801</td> |
| 286 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 287 | + <td>IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to gain root privileges. IBM X-Force ID: 203977.</td> |
| 288 | + <td><a href="https://www.tenable.com/cve/CVE-2021-29801">详情</a></td> |
| 289 | + </tr> |
| 290 | + <tr> |
| 291 | + <td>93630190c62628190ecf6a24dc1a1bcd</td> |
| 292 | + <td>CVE-2021-29772</td> |
| 293 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 294 | + <td>IBM API Connect 5.0.0.0 through 5.0.8.11 could allow a user to potentially inject code due to unsanitized user input. IBM X-Force ID: 202774.</td> |
| 295 | + <td><a href="https://www.tenable.com/cve/CVE-2021-29772">详情</a></td> |
| 296 | + </tr> |
| 297 | + <tr> |
| 298 | + <td>16daee4b5b67a6ab1136a3fa0d738424</td> |
| 299 | + <td>CVE-2021-29727</td> |
| 300 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 301 | + <td>IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 201106.</td> |
| 302 | + <td><a href="https://www.tenable.com/cve/CVE-2021-29727">详情</a></td> |
| 303 | + </tr> |
| 304 | + <tr> |
| 305 | + <td>814322d2982461ad15831a37fd68b25d</td> |
| 306 | + <td>CVE-2021-29715</td> |
| 307 | + <td>2021-08-26 20:15:00 <img src="imgs/new.gif" /></td> |
| 308 | + <td>IBM API Connect 5.0.0.0 through 5.0.8.11 could alllow a remote user to obtain sensitive information or conduct denial of serivce attacks due to open ports. IBM X-Force ID: 201018.</td> |
| 309 | + <td><a href="https://www.tenable.com/cve/CVE-2021-29715">详情</a></td> |
| 310 | + </tr> |
255 | 311 | <tr>
|
256 | 312 | <td>af0b0f7a87448ee32d72a64ad58c0dcc</td>
|
257 | 313 | <td>CVE-2021-32648</td>
|
@@ -406,62 +462,6 @@ <h2><a href="https://github.com/lyy289065406/threat-broadcast">威胁情报播
|
406 | 462 | <td>thinkphp-zcms as of 20190715 allows SQL injection via index.php?m=home&c=message&a=add.</td>
|
407 | 463 | <td><a href="https://www.tenable.com/cve/CVE-2020-19705">详情</a></td>
|
408 | 464 | </tr>
|
409 |
| - <tr> |
410 |
| - <td>dcde5a0159d9522271474fe94fdc9585</td> |
411 |
| - <td>CVE-2020-19704</td> |
412 |
| - <td>2021-08-26 03:15:00 <img src="imgs/new.gif" /></td> |
413 |
| - <td>A stored cross-site scripting (XSS) vulnerability via ResourceController.java in spring-boot-admin as of 20190710 allows attackers to execute arbitrary web scripts or HTML.</td> |
414 |
| - <td><a href="https://www.tenable.com/cve/CVE-2020-19704">详情</a></td> |
415 |
| - </tr> |
416 |
| - <tr> |
417 |
| - <td>eb39d6388eb8babace6dd1df725ab323</td> |
418 |
| - <td>CVE-2020-19703</td> |
419 |
| - <td>2021-08-26 03:15:00 <img src="imgs/new.gif" /></td> |
420 |
| - <td>A cross-site scripting (XSS) vulnerability in the referer parameter of Dzzoffice 2.02 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.</td> |
421 |
| - <td><a href="https://www.tenable.com/cve/CVE-2020-19703">详情</a></td> |
422 |
| - </tr> |
423 |
| - <tr> |
424 |
| - <td>d404f28ea272b1e90e4736841d704701</td> |
425 |
| - <td>CVE-2021-20815</td> |
426 |
| - <td>2021-08-26 02:15:00 <img src="imgs/new.gif" /></td> |
427 |
| - <td>Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.</td> |
428 |
| - <td><a href="https://www.tenable.com/cve/CVE-2021-20815">详情</a></td> |
429 |
| - </tr> |
430 |
| - <tr> |
431 |
| - <td>b970dabecc87e56239944e48e15ffc62</td> |
432 |
| - <td>CVE-2021-20814</td> |
433 |
| - <td>2021-08-26 02:15:00 <img src="imgs/new.gif" /></td> |
434 |
| - <td>Cross-site scripting vulnerability in Setting screen of ContentType Information Widget Plugin of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.</td> |
435 |
| - <td><a href="https://www.tenable.com/cve/CVE-2021-20814">详情</a></td> |
436 |
| - </tr> |
437 |
| - <tr> |
438 |
| - <td>071fb31e940d792d271ad5519da8d763</td> |
439 |
| - <td>CVE-2021-20813</td> |
440 |
| - <td>2021-08-26 02:15:00 <img src="imgs/new.gif" /></td> |
441 |
| - <td>Cross-site scripting vulnerability in Edit screen of Content Data of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series) and Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series)) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.</td> |
442 |
| - <td><a href="https://www.tenable.com/cve/CVE-2021-20813">详情</a></td> |
443 |
| - </tr> |
444 |
| - <tr> |
445 |
| - <td>3fa3baeea365f0939758188139d5b97f</td> |
446 |
| - <td>CVE-2021-20812</td> |
447 |
| - <td>2021-08-26 02:15:00 <img src="imgs/new.gif" /></td> |
448 |
| - <td>Cross-site scripting vulnerability in Setting screen of Server Sync of Movable Type (Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series) and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.</td> |
449 |
| - <td><a href="https://www.tenable.com/cve/CVE-2021-20812">详情</a></td> |
450 |
| - </tr> |
451 |
| - <tr> |
452 |
| - <td>c35c9099f35baa426b9fdcea1172d5ab</td> |
453 |
| - <td>CVE-2021-37334</td> |
454 |
| - <td>2021-08-25 22:15:00 <img src="imgs/new.gif" /></td> |
455 |
| - <td>A security issue in Umbraco Forms 4.0.0 to and including 8.7.5 could lead to a remote code execution attack and/or arbitrary file deletion.</td> |
456 |
| - <td><a href="https://www.tenable.com/cve/CVE-2021-37334">详情</a></td> |
457 |
| - </tr> |
458 |
| - <tr> |
459 |
| - <td>7dc6a625d3f07b2e68db30fa48cf0545</td> |
460 |
| - <td>CVE-2021-37154</td> |
461 |
| - <td>2021-08-25 21:15:00 <img src="imgs/new.gif" /></td> |
462 |
| - <td>In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion.</td> |
463 |
| - <td><a href="https://www.tenable.com/cve/CVE-2021-37154">详情</a></td> |
464 |
| - </tr> |
465 | 465 | </tbody>
|
466 | 466 | </table>
|
467 | 467 | </div>
|
|
0 commit comments