From aba458a9621a964b79b2e790e4947c2ec87ed1d2 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 14 Jun 2024 03:23:11 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++++ cache/RedQueen.dat | 1 + data/cves.db | Bin 47972352 -> 47976448 bytes docs/index.html | 152 ++++++++++++++++++++++----------------------- 4 files changed, 92 insertions(+), 76 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 7f8db065ca7..b4725f7e93c 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -138,3 +138,18 @@ ed88ef1b5948418947899da8bfc082e7 9c49300ba4bfe7ddf4dab6bbaab0460a 4087af4230b47a5a2c8f5c596a0ed14b 020bffe383a724b304fe1e4271e2570f +01c81f53ed5a527da06674c401c4bda8 +b76d099b521be2eb0f9590cc56ef7ebb +83d380fda743eb13e2f4286b9b3cd0c6 +7d0083ce8f233c81829b9cbdef4c47c0 +ffdfd88a74d7ed59a59269160d4a0486 +b911c3ea577e53b6f33757067ced8cd0 +bd2ba2292cdf8faebc6ba545310739ce +2a00aac6d8689cf7cb4fff90818eb4f6 +da9ed577f17bf3b7938592879bc7b983 +cb813db551439ab9abb472f6eb91fe42 +353fd56e1c045e7498ded93097c30c05 +e41d1a9d4eeebc4acc35b3939ce4aaa8 +72da614e45b2f81bac411fe7bb1bdfc3 +3052005e47baa13b70c4c26f47ee55ea +768e0a02c1880ebcc7e45411307d32b6 diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index 79ecf281117..862449ebb84 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -114,3 +114,4 @@ b8457168af4d949e7336edf049aad644 8d1fbede33f167c952b5d1bec8185213 ae1b2e2912ace41f968533d024ac150b d4811d28056614f9454fae338deca17b +a6a2bc20ab3f7f9335f2dc243c524575 diff --git a/data/cves.db b/data/cves.db index 361463174fd3927f156bb8df52bf338d79901a73..56ef9160ef1350da96c5581e6389a7b45948f60b 100644 GIT binary patch delta 4335 zcma*p2apui76xFpVSy#H7E|RgX|(naYy{sRgwW$ zMICbhBPfV04j4cY6pRQ4jF<&;e7=8tzIracSM{pqyS24bbdNz@|piP}URqApQD)FbK>4Ty$BBcd_UglI|>63vL_ zL<^!N(TZqIv?1CO?TGfo5yX+iQA82Zf#^saO&miUOLQVS6J3a|L^t9%;&`H%=uY$? zOd>>t35&3a2oWV5B1X7GPvQjPMB*gkWTF?*o9ILICHfKli4x)z;#A@^VgNCaIGq?o z3?_yULy2L;8N_g61Tm5rMT{oK5MzmP#F@l+;w)kUaW*lLP=DftNBBg72#6$c4l#+C zOiUrB64Qw3#0(-u%p}ewW)Y=C88MqUkC;QuCFT+Hi3P;@#0A7c;zFXFND~(ki-?N} z5|~M&c&oW+Fq} zLflH+M%+%^LEK5)Mchr?L)=TOB32Xk5%&`h5DyX$5f2k?QUQZxU}2Zxinj`-yjn_lWn24~P$mkB9@r$HXVZr^IK(=foGpm&8}Z zLE;ecHSrDcE%6=kJ@EtaBk>dQGw}=YEAbog590R<duO{GwpNpoo-Ev1#TmNwE>+DUskLXMQ9q)0kQM>$%Kkz=Kkbe1mCRl3P> za=a8vcj+Ofgd{AM*b>`X3ihd`UaxDk-0KY=F0*(UoMb^a-oz4cROE0`9{8#@8o;=L4K5<EoNIj`94WywolE%_Rno6NGljhPwT1qQvEp4Q&w3GI7gd8bHNs)Arj&igdBgaZ7 z=`3BOt8|m&?L^pq3iL^(-LmR{0Z`bb~tC;g>FPLWgP zG#MZR<#ZV&gJp;em0@y*43`lyQbx&W86#t5oSZ4+z!7l5&nr zlF2efrph##E;A%0Gv!>FC8bg(v*kRQBXeb*%$EgnzFZ&+MopP7l zE%(U1vPxFVeR97%AP>qz^02ItwepBOD(hsuJSH3DaoH$UvPqthtZbGo@}xW^Ps=m1 zRkq2q@|n_Y+S|j&QWwt^2ZsTVoFF)IKdC$BGBfoev zv*VVn;BG_9OS$Fc-116pc{R7ZmRnxWEqijy8@Xk#kzK)kMrumeW;L#>(O`T1FY3GX z78a~4D5yKV&dYV|+RWdP-?rAAnj31iG*Wr*=9Sc_Y`TBz)IRAh%2s!9o38V$h9fL9 z5;o09U^`ws9m6?8{ONzs0*ebT1NZ6?iO*z;iGi-H* z(YUf()rp0f@|WH)>gI>6BGbxrn6<|^c5Kv+Sm{>Gj#Zw{^X|@lM!Q=7$uv-z z>~sOMV{(~JQl`KTB|>pGVFy9r`F7m*t%zs2mg@(0JRXnzEt4Bd%?xJr9gx{Q=UJn5 zooMl23hA%#k#t99N9V$)at(`E$wVX?gnZME1di>-5<$YXOxN)((>Ei35AS9|tF{?O zRW2}k6lM;V?lTJhvVTVjqUj@<9hI9%pai}b3t0&-5((Ls8~60_Y$u$I2A->i+2MaB z$ZQx~WwfhoGN4PH$|i-aYF8R-o@tTU)n%`d|JOm3D7=$)nH^c6@aZ;+pNP9bBH}p7 zkmDsaaMy}O+;GfsJ>T)%SoKM0;->3nitH+*Qzl(z=e5Z6cx1g%SiMWRB4W8BM*O>o zaNIQGaX*@fMPsg?bbQZFCX=oi3&jHc82z(|Lj!X~oV*5dt7{2-Az)UmD6EMqp>Welob_b>$t zrModZELZmhijzzxl8IO>?$`-OU3TMYZPX1#&4e8{?bx4n|9PG4;&3=*#!emCx2Rt* zqij}uT4lETq}G{jYxfzAn&-ays;WZQ?(qE&Qrd93Ewe*&X(uSHlQ7Mgz zIqZ6_?Hj~~waW}EKJ1K+RvtU|SPahP8Izla6HVyYd696)3&MeCCf$f@ z`o6AR(g{58@N(2D=Pz9>>X({Pn#y$eYOB$<`oJbBRV4TR4N|Jk3zW(Xsa?s4rD4VO zv?bzZH0r2n`n~NX{>y6-a|X{=biGL>@zQxkLuZ#wOQoh3mCT(vD<~~38Xowm^MYBG zw|@O}%fDa8TFM{IuKQ`9F|c<1hWcY*G`glnW3SQrrknjm#`>azbLJQ1*2PACdH}QI zGar_}YCP9F-GZ|dQ2_TNmya;@F9dku9NviXSaLx KR%k1c@IL{=XB7AV delta 2768 zcmWmG4nBYvSaZT$63vwq19&?Fo0bCfnvrp2@ar-Fmm()?3T#{qVc~fcu>1 zoF`)Q+pvg;w_!^%hun`7r%3G5@M>}IPm>kb3Rv;1_*RIOz)EN(vJzWKtfW?`mCQQ)V_rd7+TZPl^r zTJ@~@Rs*Y{)yQgWHL;pn&8+5D3#+Bo%4%)3vD#YgtoBw1tE1J)>TGqfx?0^V_UUf* zuzFg(tlm~1tFP71>TeCO23mux!PXFKs5Q(QZjG=;TBEGd));H7HO?AuO|T|fldQ?s z6loRaT_6+FE0+ zwbohdtqs;jYm>Fv+G1_BwprV)9o9~3m$lp4W9_x}S^KR6)zsAoim_s?3)V&Jl6Bd-VqLYaS=X%_)=le{b=$gQ-L>vn_pJxk zL+g?C*m`0;wVqketryly>y`C^^`Z5V^|AGd^{Mrl_1gN}`oj9s`pWv+`o{X!`p){^ zdSm@y{b;?lezJbHezAVFezShJ{;>YE-dXRhzpTHlf2@D4|K=+0Ld8V@@em&&NPvV$ zgv3aKqzFYaBu5IQL@K048l*)!gdsgLAR{s%GqNBnvLQRdkpnrA3%QX8d65tKQ2+%| z2!&AuMNtgJQ354V3Z+p7Wl;|0Q2`ZE36)U=RZ$JqQ3Ewm3$;-Pbx{xX(Ett62#wJM zP09n%*8y+#{w+GA}q!dEX6V` z#|o^(Dnw#6)?h8xVLdirBQ{|(wqPr^VLNtUCw5^s_FymeVLuMwAP(U$j^HSc;W$np z3eh-;Q#g$?IE!;Qj~K+_0xsebF5?QW;u@~w25#aOZsQK_;vVkf0UqKJ9^(m~;u)Uf z1zzG6KEQ|g2p{7Ue2UNT8lU3}e2K5{HNL^O_zvIW4Sv9nc#EI#Gk(FZ_zl0~5B!OD zc#psEH~zuD_%H5U1vq~M5D)PYf&@s2L`aMzNQzJ-Lvo}*N~A(+q(NGwLm1K{12Q5L zG9wGJA{(+J9668^xsV%qkQe!o9|celg-{qpP!z>b93@Z^rBE7WP!{D-9u-g#l~5T~ zP!-is9W_uBwNM*%P#5)39}UnDjnEiP&=k$k94*iit?rvq7aRfIEB+VgR?k?^N2w#F5n_A;WDn^Dz4!= zZr~y=;8PhB8u1|TJ`kNccEyZ9Wb@{s$rnfZL4Z6A z=20+@gLx9n(_o$j^E{Xr!MqH_MEX@=@PK3?iKF6#-c0%?X@w+H5=W;>`FclSSNPkp N31gz(y$Uo;@IO?KCky}p diff --git a/docs/index.html b/docs/index.html index d39f23a8983..5d763086754 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -2100,123 +2100,123 @@

眈眈探求 | 详情 + 01c81f53ed5a527da06674c401c4bda8 + CVE-2024-1187 + 2024-06-13 03:21:00 + Munsoft Easy Outlook Express Recovery拒绝服务漏洞 + 详情 - 5731941e9d8c10c51bd571212823a6d2 - CVE-2023-50308 - 2024-06-12 09:20:37 - IBM Db2输入验证错误漏洞 - 详情 + b76d099b521be2eb0f9590cc56ef7ebb + CVE-2024-22107 + 2024-06-13 03:21:00 + GTB Central Console命令注入漏洞 + 详情 - 2f3fae72b45b06133b2ed311dc4e05ff - CVE-2023-6626 - 2024-06-12 09:20:37 - WordPress Product Enquiry for WooCommerce Plugin跨站脚本漏洞 - 详情 + 83d380fda743eb13e2f4286b9b3cd0c6 + CVE-2024-22108 + 2024-06-13 03:21:00 + GTB Central Console SQL注入漏洞 + 详情 - 57de8ce7c07f12a4ceb94fc56ad1fde4 - CVE-2023-47152 - 2024-06-12 09:20:37 - IBM Db2不安全加密算法漏洞 - 详情 + 7d0083ce8f233c81829b9cbdef4c47c0 + CVE-2024-23824 + 2024-06-13 03:21:00 + mailcow不受控制的资源耗尽漏洞 + 详情 - 7889ce7461b5c625255985696c50805e - CVE-2024-0204 - 2024-06-12 09:20:37 - Fortra GoAnywhere MFT身份认证绕过漏洞 - 详情 + ffdfd88a74d7ed59a59269160d4a0486 + CVE-2024-22108 + 2024-06-13 03:21:00 + GTB Central Console SQL注入漏洞( CVE-2024-22108) + 详情 - 8d754363adf10f15329cafcc84fd8a20 - CVE-2024-0430 - 2024-06-12 09:20:37 - IObit Malware Fighter拒绝服务漏洞 - 详情 + b911c3ea577e53b6f33757067ced8cd0 + CVE-2023-32327 + 2024-06-13 03:21:00 + IBM Security Access Manager Container XML外部实体注入漏洞 + 详情 - 3a07b9df225aab8a7a1787542b53c8c4 - CVE-2023-48118 - 2024-06-12 09:20:37 - Quest Analytics LLC IQCRM SQL注入漏洞 - 详情 + bd2ba2292cdf8faebc6ba545310739ce + CVE-2023-31004 + 2024-06-13 03:21:00 + IBM Security Access Manager Container中间人攻击漏洞 + 详情 - 1d693be90a5d8b9ca0ddbbc35d7f8fa0 - CVE-2023-47746 - 2024-06-12 09:20:37 - IBM Db2输入验证错误漏洞 - 详情 + 2a00aac6d8689cf7cb4fff90818eb4f6 + CVE-2023-31005 + 2024-06-13 03:21:00 + IBM Security Verify Access权限提升漏洞 + 详情 - dc690952ac6d15af0304a1d80d4d6f85 - CVE-2023-27859 - 2024-06-12 09:20:37 - IBM Db2任意代码执行漏洞 - 详情 + da9ed577f17bf3b7938592879bc7b983 + CVE-2023-30999 + 2024-06-13 03:21:00 + IBM Security Access Manager Container不受控制的资源耗尽漏洞 + 详情 - 7d1d4a3aa0f691b3a3e53fa3408bdf97 - CVE-2024-23685 - 2024-06-12 09:20:37 - mod-remote-storage硬编码凭据使用漏洞 - 详情 + cb813db551439ab9abb472f6eb91fe42 + CVE-2023-31006 + 2024-06-13 03:21:00 + IBM Security Verify Access拒绝服务漏洞 + 详情 - 4f06e7ef0958904f3aa6b326ce66490f - CVE-2023-47158 - 2024-06-12 09:20:37 - IBM Db2输入验证错误漏洞 - 详情 + 353fd56e1c045e7498ded93097c30c05 + CVE-2024-1199 + 2024-06-13 03:21:00 + Employee Task Management System拒绝服务漏洞 + 详情 - d076f453ae2c55946ca6750e58950947 - CVE-2023-45193 - 2024-06-12 09:20:37 - IBM Db2输入验证错误漏洞 - 详情 + e41d1a9d4eeebc4acc35b3939ce4aaa8 + CVE-2024-1198 + 2024-06-13 03:21:00 + openBI反序列化漏洞 + 详情 - 1b4792addb6564818eb90a04675242b5 - CVE-2024-23686 - 2024-06-12 09:20:37 - DependencyCheck信息泄露漏洞 - 详情 + 72da614e45b2f81bac411fe7bb1bdfc3 + CVE-2024-1188 + 2024-06-13 03:21:00 + Rizone Soft Notepad3拒绝服务漏洞 + 详情 - d36fbb53de0a046b3ce40d3a29ac170d - CVE-2024-0623 - 2024-06-12 09:20:37 - WordPress VK Block Patterns Plugin跨站请求伪造漏洞 - 详情 + 3052005e47baa13b70c4c26f47ee55ea + CVE-2023-37527 + 2024-06-13 03:21:00 + HCL Technologies HCL BigFix Platform跨站脚本漏洞 + 详情 - e4c110e1cf29ac706a79c27ee1ebf4d1 - CVE-2024-0605 - 2024-06-12 09:20:37 - Mozilla Focus竞争条件漏洞 - 详情 + 768e0a02c1880ebcc7e45411307d32b6 + CVE-2024-1197 + 2024-06-13 03:21:00 + Testimonial Page Manager SQL注入漏洞 + 详情