diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 58eab00d7f5..00f91526f58 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -193,3 +193,18 @@ b8586bbeb047cb6c0600db934e1b1d51 8664678e26079778e8ccd4f1c48ac13c b4bdebe13ddb37d0c59371911a309525 91bf43400b04239a1c38818882ae7f18 +08abf96af8aa463f784ab72352ce6aae +6654dedf4f65635b423568ef9ad8f69e +df79a60d9d7d6027a70d2d05329a4037 +2f7d2eb72eabdc20ad51c48841c28c8a +05889aef248dbacefbbc278547c4cf16 +bd2587b7ca9b573c9dc0c5608bf8ab62 +7f9d884cd363615a74e8916a8c2e0d2b +8f9bb5432d292205e1fac997a4a703dd +f7496353ba329d44ac7a4fbb36448942 +4563adeb96bd9532855a0454bb101348 +612c2cf6994b8ac500e3b1a65115baa0 +783a4600ab15df185c1a79078126d0bb +88fd357f2431c56cec6a916216d8ec09 +a5a3e672d1da28807771d678c092841e +b16cc443df0884c4640bbe030b2ef836 diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index 38922877949..db950c9cd5a 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -1,103 +1,3 @@ -32d06fd09a8a3891302d572b741af7e7 -4c3196069ce6da36dcd67f54c0623b6a -9a9135f4eda344b2285f39b1eba4a24c -9149ef48bf02eeba0049a5c780dfbf95 -1ebcb6f7e37273b636eb12957c41505a -e975b5ffe192269dc333e654af071c5e -177a05bed6a1658deadddb8003143a1e -460742ae291d9583669999e944f6027b -a1656e878cc6deeb2fbd5d63b59f5577 -72654d982e87e7dd4d6d3b8e08eab92d -b6a12897d8398bcd00d564473f68b17a -7df63001c14ffa0942ac94ad254404dd -8aaf7a9f567387b9cb5aedf2759b4052 -d593d134526afadf6bc57aaeae132ffd -8c30163561c34fca05c8dbbcd82b3caf -e74baea51b3e9c92cf95983a3f2cf115 -bb67536f33b664ba5e50c9f1d15c8bb9 -8ee7e82b82dc78923bd6462bfdc80ac8 -4393fd407b057773da65e3830dee34ad -8acb6b1af836c5a85a2f4f31069bccf3 -c165a31349cd0d35332b2d3c6af64441 -220fcbbd4a1c4069600a916845c7ba52 -d0b674970f64889a154ec250d75fff92 -eda1a39f9a218f8d1fa98ed18e27046b -48599d9387e08a7021da062e8f79e787 -09b8edc8566128562e3a55bcacda7a4e -9b25051b7651245d639781bd6dd90172 -f272a6959536e4921d1eb40f6fa8ee70 -228d595d06137f96a9fea77af29a3b61 -16a4c13b4dcd819ca9f7287b2b8f9c3c -d7e8b036026ab2ac1c15e4d899f7756c -3ac8f73bbe9858b351e1cea74bbc15c7 -d8c3be9e4efa5fe4c4af285f440b470f -4faa10a6b27ccb9eb83bebc5710f2de0 -16b49d64927675a86e5171dd2cd6aa5f -2e6f4f98b5d80a0253a4926ea050d556 -6c1cb33af6f66944d698ce1e861a66f3 -15cf460d7faca23a52d84530e5927898 -9ba202ead1a1e00b8d869023573c46a3 -95864bf4be70cc4942ffc60d16631a0d -45e8993b28eab3c2912f4f8007be8fc8 -1b74e615f5370132c418a069aa88e369 -9a6e139b38d2de5fd34447a658f3ea49 -ea1bda7e10c99e144c82e2e3b43ac74c -7ffd13fac7705961c54634bf9888eeea -0472d6e20924cb640286d5cb8ade117f -2a2e0a388490e04aa69c78dcec9009db -f4cc14d3ca58735204940cd853c2d9e1 -6e406a4456dde0f48b3b945d4dcc06ea -744eb31c8e837f264af732de6f5480ba -70669160be4af0bc3587e0124267bea5 -342b43fb43ccadff320870e5dac2a0ad -f75bc980054b55ae50dc4cdadbbf03cc -193472e54c2393e6ed43ee9f7b508469 -fc56aeda743bd06d99486efa98c37dd5 -41c056879b4570b49ba76ff06c0cccf1 -14573ef8f29447f766402e0327697529 -d12a7bd1938c8174ab1e76c048db0380 -d8952d57c3e7a054c8718d8f5d7b1dd0 -5abda912b782475bf464aaef70f88c95 -178d4e41acccb6c00a289bd4a6c75eb9 -3126ebfca3546a0965420eb00d937eee -c6205e2d14422334039909464d40a817 -b52e1f39f2864cae21dfa5a289693760 -65e651f953589a848680cf0b826c12f4 -28533ad5186388ec0a01345039e36514 -5e36713bf3cb29484a92dcf3ce2a25db -127b5cf58a6909d85fa87ff941db997d -afde7bddcc0b5b596ab83c4fad57f485 -96235a5370e3947c1ef81c2f95f02f8d -f1c7bb45161c38412c0ec04359cbc478 -d27d9219a4b5dd882b0f3f3198313e63 -0413ed67c8b42641406b9f8fa450383a -eae654ac0d1eac421925f53448eb25a4 -de815955cff7b620dd2d8a6923b39c44 -93830154240919f2fe670812e9c9662c -0b8c5754d9c94e89db55f2d86e4b16b1 -57516c6d750bbe5c38bec7e2152f9c48 -9a513fc4697320c6ca78f7af2230aa97 -7de7bcb397dd9b1dd296d7337be76023 -c32812f4d5241b61c8659b150d8b4f9e -75aa46679c949329baa94b6cb853479e -847f331efa1209eb55fe3ee568730856 -dbb3362989e6f9e47ee7a27f78b04bab -35e69cb09a405e1a0b66d50257a16af8 -6c66ff4c96deffc332585cfab6e21a79 -381f05f009d9fff909c434b685629cad -ed6df983447305af14187ad7f0ccfaee -57830c117c6ac4863e3cf4ae8c9e85f2 -692c8fd60b30a2ebdd1f7e2aff1334bb -eea0dedca3c8d17aa56bfb9eb13f53f0 -ebfa280dc8c4a5d2e806a3f23666695e -f167f5a86ad291c13ebed2caef0f5528 -1e39a15b050fb3b53e2c84fb01cb86c3 -2199362277fccdc9bfa704fa6fad06bd -f2fb7c1aa73f8fde72b2216088b722a9 -7ada427f079d4e41268830616c943323 -13ac12f4e48ea78026775e347a742dc7 -8d941c0dd5d88ac5662ebca436ce711b -e8ea214826d3db0c15583dbcec7ed773 f5e9a0adc5283d6ddd58abcf334c4832 08546c569b91af3510c1f59381387884 4eb93a4d079b06edbaf60f9671dd8e8d @@ -205,3 +105,4 @@ a3d8441922c57add50a31f4cea637bb3 bb601eeb8aa3aa559df75890f5bce258 ff424a801502901da0bf2265cf6e34c7 e4c4fa1099e15a72f0c68209de8ba7ee +697656de2d06cce685d3025292a11cb4 diff --git a/data/cves.db b/data/cves.db index 33765e40b5b..c617fa471e0 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index 5ea4b8f96c7..6f84a9de385 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -2100,123 +2100,123 @@

眈眈探求 | 详情 + 08abf96af8aa463f784ab72352ce6aae + CVE-2024-25355 + 2024-06-25 03:21:58 + npm s3-url-parser拒绝服务漏洞 + 详情 - 9173e39cc63802748ec0ff01b12bfb04 - CVE-2024-24912 - 2024-06-24 12:36:51 - Check Point Harmony Endpoint本地权限提升漏洞 - 详情 + 6654dedf4f65635b423568ef9ad8f69e + CVE-2024-33442 + 2024-06-25 03:21:58 + flusity CMS任意代码执行漏洞 + 详情 - 941633d52b3079d327370f51d91783e4 - CVE-2024-20811 - 2024-06-24 12:36:51 - SAMSUNG Mobile devices验证不当漏洞 - 详情 + df79a60d9d7d6027a70d2d05329a4037 + CVE-2023-4503 + 2024-06-25 03:21:58 + Galleon初始化不当漏洞 + 详情 - c266a54884e3272d97d7c32b9ef33794 - CVE-2024-20813 - 2024-06-24 12:36:51 - SAMSUNG Mobile devices越界写入漏洞 - 详情 + 2f7d2eb72eabdc20ad51c48841c28c8a + CVE-2024-22433 + 2024-06-25 03:21:58 + Dell Data Protection Search明文存储漏洞 + 详情 - d41496a74165b76c42c368ec94698122 - CVE-2024-20814 - 2024-06-24 12:36:51 - SAMSUNG Mobile devices越界读取漏洞 - 详情 + 05889aef248dbacefbbc278547c4cf16 + CVE-2023-33049 + 2024-06-25 03:21:58 + Qualcomm Chipsets拒绝服务漏洞 + 详情 - 9e4ab95511f161512505bc37a22c1327 - CVE-2024-20357 - 2024-06-24 12:36:51 - Cisco IP Phone边界检查漏洞 - 详情 + bd2587b7ca9b573c9dc0c5608bf8ab62 + CVE-2023-33046 + 2024-06-25 03:21:58 + Qualcomm Chipsets内存破坏漏洞 + 详情 - c1490a64566079d29894a9e03d3bb8e1 - CVE-2024-24595 - 2024-06-24 12:36:51 - Allegro AI ClearML信息泄露漏洞 - 详情 + 7f9d884cd363615a74e8916a8c2e0d2b + CVE-2024-29011 + 2024-06-25 03:21:58 + SonicWALL GMS硬编码密码漏洞 + 详情 - 846b5b50724613f706a29fde1d4d385e - CVE-2024-20824 - 2024-06-24 12:36:51 - SAMSUNG Mobile devices隐式意图劫持漏洞 - 详情 + 8f9bb5432d292205e1fac997a4a703dd + CVE-2024-0684 + 2024-06-25 03:21:58 + GNU coreutils堆缓冲区溢出漏洞 + 详情 - 1958fc599dbfd2189be59e1b18d903d1 - CVE-2023-49606 - 2024-06-24 12:36:51 - Tinyproxy内存错误引用漏洞 - 详情 + f7496353ba329d44ac7a4fbb36448942 + CVE-2024-32213 + 2024-06-25 03:21:58 + LoMag WareHouse Management硬编码密码漏洞 + 详情 - c60d510832bd79f9b9c92f123bb925b9 - CVE-2024-20825 - 2024-06-24 12:36:51 - SAMSUNG Mobile devices隐式意图劫持漏洞 - 详情 + 4563adeb96bd9532855a0454bb101348 + CVE-2023-43536 + 2024-06-25 03:21:58 + Qualcomm Chipsets拒绝服务漏洞 + 详情 - f56eb27e91ca33710d42f622de5dd1a5 - CVE-2024-27388 - 2024-06-24 12:36:51 - Linux kernel内存泄漏漏洞 - 详情 + 612c2cf6994b8ac500e3b1a65115baa0 + CVE-2023-43535 + 2024-06-25 03:21:58 + Qualcomm Chipsets内存破坏漏洞 + 详情 - 41c3712349350c0151964095145dfa8d - CVE-2024-1210 - 2024-06-24 12:36:51 - WordPress Plugin LearnDash LMS信息泄露漏洞 - 详情 + 783a4600ab15df185c1a79078126d0bb + CVE-2023-52239 + 2024-06-25 03:21:58 + Magic xpi Integration Platform XML外部实体攻击漏洞 + 详情 - 2ff6db45264afdc5b6740eb27cf27ae1 - CVE-2024-33820 - 2024-06-24 12:36:51 - TOTOLINK AC1200缓冲区溢出漏洞 - 详情 + 88fd357f2431c56cec6a916216d8ec09 + CVE-2024-22830 + 2024-06-25 03:21:58 + Anti-Cheat Expert访问控制错误 + 详情 - 924038f404ccc6e6ac0fe0ddd941ab75 - CVE-2024-4058 - 2024-06-24 12:36:51 - Google Chrome类型混淆漏洞 - 详情 + a5a3e672d1da28807771d678c092841e + CVE-2024-22365 + 2024-06-25 03:21:58 + Linux-pam拒绝服务漏洞 + 详情 - e0bcd8dce430802db114913d8dca4f31 - CVE-2024-20816 - 2024-06-24 12:36:51 - SAMSUNG Mobile devices不合理认证漏洞 - 详情 + b16cc443df0884c4640bbe030b2ef836 + CVE-2023-23019 + 2024-06-25 03:21:58 + Blog Site跨站脚本漏洞 + 详情