Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jun 26, 2024
1 parent 5c6cbf0 commit e2b7961
Show file tree
Hide file tree
Showing 4 changed files with 92 additions and 176 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -193,3 +193,18 @@ b8586bbeb047cb6c0600db934e1b1d51
8664678e26079778e8ccd4f1c48ac13c
b4bdebe13ddb37d0c59371911a309525
91bf43400b04239a1c38818882ae7f18
08abf96af8aa463f784ab72352ce6aae
6654dedf4f65635b423568ef9ad8f69e
df79a60d9d7d6027a70d2d05329a4037
2f7d2eb72eabdc20ad51c48841c28c8a
05889aef248dbacefbbc278547c4cf16
bd2587b7ca9b573c9dc0c5608bf8ab62
7f9d884cd363615a74e8916a8c2e0d2b
8f9bb5432d292205e1fac997a4a703dd
f7496353ba329d44ac7a4fbb36448942
4563adeb96bd9532855a0454bb101348
612c2cf6994b8ac500e3b1a65115baa0
783a4600ab15df185c1a79078126d0bb
88fd357f2431c56cec6a916216d8ec09
a5a3e672d1da28807771d678c092841e
b16cc443df0884c4640bbe030b2ef836
101 changes: 1 addition & 100 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
@@ -1,103 +1,3 @@
32d06fd09a8a3891302d572b741af7e7
4c3196069ce6da36dcd67f54c0623b6a
9a9135f4eda344b2285f39b1eba4a24c
9149ef48bf02eeba0049a5c780dfbf95
1ebcb6f7e37273b636eb12957c41505a
e975b5ffe192269dc333e654af071c5e
177a05bed6a1658deadddb8003143a1e
460742ae291d9583669999e944f6027b
a1656e878cc6deeb2fbd5d63b59f5577
72654d982e87e7dd4d6d3b8e08eab92d
b6a12897d8398bcd00d564473f68b17a
7df63001c14ffa0942ac94ad254404dd
8aaf7a9f567387b9cb5aedf2759b4052
d593d134526afadf6bc57aaeae132ffd
8c30163561c34fca05c8dbbcd82b3caf
e74baea51b3e9c92cf95983a3f2cf115
bb67536f33b664ba5e50c9f1d15c8bb9
8ee7e82b82dc78923bd6462bfdc80ac8
4393fd407b057773da65e3830dee34ad
8acb6b1af836c5a85a2f4f31069bccf3
c165a31349cd0d35332b2d3c6af64441
220fcbbd4a1c4069600a916845c7ba52
d0b674970f64889a154ec250d75fff92
eda1a39f9a218f8d1fa98ed18e27046b
48599d9387e08a7021da062e8f79e787
09b8edc8566128562e3a55bcacda7a4e
9b25051b7651245d639781bd6dd90172
f272a6959536e4921d1eb40f6fa8ee70
228d595d06137f96a9fea77af29a3b61
16a4c13b4dcd819ca9f7287b2b8f9c3c
d7e8b036026ab2ac1c15e4d899f7756c
3ac8f73bbe9858b351e1cea74bbc15c7
d8c3be9e4efa5fe4c4af285f440b470f
4faa10a6b27ccb9eb83bebc5710f2de0
16b49d64927675a86e5171dd2cd6aa5f
2e6f4f98b5d80a0253a4926ea050d556
6c1cb33af6f66944d698ce1e861a66f3
15cf460d7faca23a52d84530e5927898
9ba202ead1a1e00b8d869023573c46a3
95864bf4be70cc4942ffc60d16631a0d
45e8993b28eab3c2912f4f8007be8fc8
1b74e615f5370132c418a069aa88e369
9a6e139b38d2de5fd34447a658f3ea49
ea1bda7e10c99e144c82e2e3b43ac74c
7ffd13fac7705961c54634bf9888eeea
0472d6e20924cb640286d5cb8ade117f
2a2e0a388490e04aa69c78dcec9009db
f4cc14d3ca58735204940cd853c2d9e1
6e406a4456dde0f48b3b945d4dcc06ea
744eb31c8e837f264af732de6f5480ba
70669160be4af0bc3587e0124267bea5
342b43fb43ccadff320870e5dac2a0ad
f75bc980054b55ae50dc4cdadbbf03cc
193472e54c2393e6ed43ee9f7b508469
fc56aeda743bd06d99486efa98c37dd5
41c056879b4570b49ba76ff06c0cccf1
14573ef8f29447f766402e0327697529
d12a7bd1938c8174ab1e76c048db0380
d8952d57c3e7a054c8718d8f5d7b1dd0
5abda912b782475bf464aaef70f88c95
178d4e41acccb6c00a289bd4a6c75eb9
3126ebfca3546a0965420eb00d937eee
c6205e2d14422334039909464d40a817
b52e1f39f2864cae21dfa5a289693760
65e651f953589a848680cf0b826c12f4
28533ad5186388ec0a01345039e36514
5e36713bf3cb29484a92dcf3ce2a25db
127b5cf58a6909d85fa87ff941db997d
afde7bddcc0b5b596ab83c4fad57f485
96235a5370e3947c1ef81c2f95f02f8d
f1c7bb45161c38412c0ec04359cbc478
d27d9219a4b5dd882b0f3f3198313e63
0413ed67c8b42641406b9f8fa450383a
eae654ac0d1eac421925f53448eb25a4
de815955cff7b620dd2d8a6923b39c44
93830154240919f2fe670812e9c9662c
0b8c5754d9c94e89db55f2d86e4b16b1
57516c6d750bbe5c38bec7e2152f9c48
9a513fc4697320c6ca78f7af2230aa97
7de7bcb397dd9b1dd296d7337be76023
c32812f4d5241b61c8659b150d8b4f9e
75aa46679c949329baa94b6cb853479e
847f331efa1209eb55fe3ee568730856
dbb3362989e6f9e47ee7a27f78b04bab
35e69cb09a405e1a0b66d50257a16af8
6c66ff4c96deffc332585cfab6e21a79
381f05f009d9fff909c434b685629cad
ed6df983447305af14187ad7f0ccfaee
57830c117c6ac4863e3cf4ae8c9e85f2
692c8fd60b30a2ebdd1f7e2aff1334bb
eea0dedca3c8d17aa56bfb9eb13f53f0
ebfa280dc8c4a5d2e806a3f23666695e
f167f5a86ad291c13ebed2caef0f5528
1e39a15b050fb3b53e2c84fb01cb86c3
2199362277fccdc9bfa704fa6fad06bd
f2fb7c1aa73f8fde72b2216088b722a9
7ada427f079d4e41268830616c943323
13ac12f4e48ea78026775e347a742dc7
8d941c0dd5d88ac5662ebca436ce711b
e8ea214826d3db0c15583dbcec7ed773
f5e9a0adc5283d6ddd58abcf334c4832
08546c569b91af3510c1f59381387884
4eb93a4d079b06edbaf60f9671dd8e8d
Expand Down Expand Up @@ -205,3 +105,4 @@ a3d8441922c57add50a31f4cea637bb3
bb601eeb8aa3aa559df75890f5bce258
ff424a801502901da0bf2265cf6e34c7
e4c4fa1099e15a72f0c68209de8ba7ee
697656de2d06cce685d3025292a11cb4
Binary file modified data/cves.db
Binary file not shown.
152 changes: 76 additions & 76 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-06-26 01:24:12 -->
<!-- RELEASE TIME : 2024-06-26 03:24:04 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2100,123 +2100,123 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>33666ae172d124ef45f2a4909b9ca15a</td>
<td>CVE-2024-26304</td>
<td>2024-06-24 12:36:51</td>
<td>Aruba Networks ArubaOS 缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97205">详情</a></td>
<td>08abf96af8aa463f784ab72352ce6aae</td>
<td>CVE-2024-25355</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>npm s3-url-parser拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97348">详情</a></td>
</tr>

<tr>
<td>9173e39cc63802748ec0ff01b12bfb04</td>
<td>CVE-2024-24912</td>
<td>2024-06-24 12:36:51</td>
<td>Check Point Harmony Endpoint本地权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97204">详情</a></td>
<td>6654dedf4f65635b423568ef9ad8f69e</td>
<td>CVE-2024-33442</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>flusity CMS任意代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97347">详情</a></td>
</tr>

<tr>
<td>941633d52b3079d327370f51d91783e4</td>
<td>CVE-2024-20811</td>
<td>2024-06-24 12:36:51</td>
<td>SAMSUNG Mobile devices验证不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97203">详情</a></td>
<td>df79a60d9d7d6027a70d2d05329a4037</td>
<td>CVE-2023-4503</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Galleon初始化不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97346">详情</a></td>
</tr>

<tr>
<td>c266a54884e3272d97d7c32b9ef33794</td>
<td>CVE-2024-20813</td>
<td>2024-06-24 12:36:51</td>
<td>SAMSUNG Mobile devices越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97202">详情</a></td>
<td>2f7d2eb72eabdc20ad51c48841c28c8a</td>
<td>CVE-2024-22433</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Dell Data Protection Search明文存储漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97345">详情</a></td>
</tr>

<tr>
<td>d41496a74165b76c42c368ec94698122</td>
<td>CVE-2024-20814</td>
<td>2024-06-24 12:36:51</td>
<td>SAMSUNG Mobile devices越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97201">详情</a></td>
<td>05889aef248dbacefbbc278547c4cf16</td>
<td>CVE-2023-33049</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Qualcomm Chipsets拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97344">详情</a></td>
</tr>

<tr>
<td>9e4ab95511f161512505bc37a22c1327</td>
<td>CVE-2024-20357</td>
<td>2024-06-24 12:36:51</td>
<td>Cisco IP Phone边界检查漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97200">详情</a></td>
<td>bd2587b7ca9b573c9dc0c5608bf8ab62</td>
<td>CVE-2023-33046</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Qualcomm Chipsets内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97343">详情</a></td>
</tr>

<tr>
<td>c1490a64566079d29894a9e03d3bb8e1</td>
<td>CVE-2024-24595</td>
<td>2024-06-24 12:36:51</td>
<td>Allegro AI ClearML信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97199">详情</a></td>
<td>7f9d884cd363615a74e8916a8c2e0d2b</td>
<td>CVE-2024-29011</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>SonicWALL GMS硬编码密码漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97342">详情</a></td>
</tr>

<tr>
<td>846b5b50724613f706a29fde1d4d385e</td>
<td>CVE-2024-20824</td>
<td>2024-06-24 12:36:51</td>
<td>SAMSUNG Mobile devices隐式意图劫持漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97198">详情</a></td>
<td>8f9bb5432d292205e1fac997a4a703dd</td>
<td>CVE-2024-0684</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>GNU coreutils堆缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97341">详情</a></td>
</tr>

<tr>
<td>1958fc599dbfd2189be59e1b18d903d1</td>
<td>CVE-2023-49606</td>
<td>2024-06-24 12:36:51</td>
<td>Tinyproxy内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97197">详情</a></td>
<td>f7496353ba329d44ac7a4fbb36448942</td>
<td>CVE-2024-32213</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>LoMag WareHouse Management硬编码密码漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97340">详情</a></td>
</tr>

<tr>
<td>c60d510832bd79f9b9c92f123bb925b9</td>
<td>CVE-2024-20825</td>
<td>2024-06-24 12:36:51</td>
<td>SAMSUNG Mobile devices隐式意图劫持漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97196">详情</a></td>
<td>4563adeb96bd9532855a0454bb101348</td>
<td>CVE-2023-43536</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Qualcomm Chipsets拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97339">详情</a></td>
</tr>

<tr>
<td>f56eb27e91ca33710d42f622de5dd1a5</td>
<td>CVE-2024-27388</td>
<td>2024-06-24 12:36:51</td>
<td>Linux kernel内存泄漏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97195">详情</a></td>
<td>612c2cf6994b8ac500e3b1a65115baa0</td>
<td>CVE-2023-43535</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Qualcomm Chipsets内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97338">详情</a></td>
</tr>

<tr>
<td>41c3712349350c0151964095145dfa8d</td>
<td>CVE-2024-1210</td>
<td>2024-06-24 12:36:51</td>
<td>WordPress Plugin LearnDash LMS信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97194">详情</a></td>
<td>783a4600ab15df185c1a79078126d0bb</td>
<td>CVE-2023-52239</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Magic xpi Integration Platform XML外部实体攻击漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97337">详情</a></td>
</tr>

<tr>
<td>2ff6db45264afdc5b6740eb27cf27ae1</td>
<td>CVE-2024-33820</td>
<td>2024-06-24 12:36:51</td>
<td>TOTOLINK AC1200缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97193">详情</a></td>
<td>88fd357f2431c56cec6a916216d8ec09</td>
<td>CVE-2024-22830</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Anti-Cheat Expert访问控制错误</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97336">详情</a></td>
</tr>

<tr>
<td>924038f404ccc6e6ac0fe0ddd941ab75</td>
<td>CVE-2024-4058</td>
<td>2024-06-24 12:36:51</td>
<td>Google Chrome类型混淆漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97192">详情</a></td>
<td>a5a3e672d1da28807771d678c092841e</td>
<td>CVE-2024-22365</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Linux-pam拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97335">详情</a></td>
</tr>

<tr>
<td>e0bcd8dce430802db114913d8dca4f31</td>
<td>CVE-2024-20816</td>
<td>2024-06-24 12:36:51</td>
<td>SAMSUNG Mobile devices不合理认证漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97191">详情</a></td>
<td>b16cc443df0884c4640bbe030b2ef836</td>
<td>CVE-2023-23019</td>
<td>2024-06-25 03:21:58 <img src="imgs/new.gif" /></td>
<td>Blog Site跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/97334">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit e2b7961

Please sign in to comment.