diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 00f91526f58..988b1887dec 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -1,103 +1,3 @@ -b2f211788a93a5f662a3bce36a77c458 -b2b6641d371d1a7eec87b35af7f0e38f -772d66fa7e2aa24bdaaa7e4c10e4993a -90aac0a212aa6fbd0bea9b6a23d21858 -8f5d53cf53f2d0778087d8291c9f44da -8d41a7ca2aabb6850b8772e66793a93c -4b2d5004c24845d0cc063a54625f1337 -72fddde73c499b9758c4de84e0a057ed -437ab65b75f0d363488787cba29ffe06 -114c46a190f67329474c976c87056e6f -1dc28eae89a61f09ad94c99f86cb3fbf -0933e2a34f0a1d62f9b6545190301add -68e52723e59773f6e89dadfeac40423e -e1a4959df5dd8945b9b8528abd4a2ed9 -1739dc6c80a19ceb1f836fdd24fc4a14 -cbaf20d2e3a00506eb4c1877eef7616e -9928e2bdc179c14c53d7cfb9cbccbc53 -50a4d2717fed123c3948795a4adc5b0a -7279ffce308b6bff7eaa25f0be3a0b25 -7df663afe4eb9e41afa7985d71399498 -c6705e312657f720925ba962e1611acb -7e45fe20ca2bdce974e4b273680c80f3 -2e07fe18aaf864555c3f6634250260c8 -448c36fc94a3d8dd43bebaf9ee7488dc -08ea8fedb83885b0bd890619660ddfe0 -05115f62388dbb7c2105bd420f9939ad -7c691f18256ebb7d6243d8fe0e1fbafb -f06b2b9f5111d8c22f01437984ca9da0 -219d2129ee5c7ddb2042861796c46871 -00b31c4db67a50cf1ab1b42b89d3d683 -42981f2c25bd8e40c799409e575bee52 -2f9e32954902cc0439e246575bd02071 -124816f1ce1b5c05f09199e3526535fb -49856be7d26ce94fb6c09ff81dde74a3 -39c0e166d9dab850c43a31c3502415f6 -39299b496b48a18feb369ad854af305e -101a286bcfd412c04844f5b2e7c386d2 -7a5f594d649fc32693d03ffbb9a1d8c5 -91f7cfcdab66ab545a1f4186e0c3a018 -af490d4aa99dcc47b7fd3e013b55b239 -b25549703aac3d419c28bef599b18880 -8e9cf073294729ae28d19e855a9ff8e5 -b51227f3a971742d415a3d7abdddd332 -cf38bdf781b2e1f3481dc857e0793c37 -3ac2369d145e4e024998dac069f7cea2 -8e0028bd1a58d474f7033749258c7965 -a58a2008f159c6adc1483f33972ec737 -336d7fa002484913c3d46173783e1bc2 -37cf9ba3418fa4fdcd1c152f94901f04 -79323150e1b713a51ac868c1235fa5db -d6f8334c8ea432c3228fa0cb2df06bdd -9763d79b349375d0141c4a1f69eb6b6d -3d62094af72fc7dc1c34ce08a2f1db23 -112e8c57ee97fa1c214f78c2ebe6690d -76d5517027e5f7579079f58f909141a1 -7d9c54bf6cbae7c2e3cbf739f88b4bab -ba87998a6456defae11fa6c9a9c4d74b -4b8894b56ad63bafe1a06fedbef00e3d -3c3b980c4ffe12305bed628e7ba6bd16 -d05eb38400aa0c995de735f53b410e6c -54ab15dd72f554e827be7ebfd6b1875a -1821d99a14279fc3abc233d028116f88 -8dc5bb75fd1e667114759f6fa87d93ba -8a918391fb40c044bd0c61d866e95d26 -42d54dc2224855ca8b9a45f0a4ecc7b3 -892343b16e276d6317d94ea7e8d3e83b -e335537075f4d96a5dc4ec1298df8496 -2edddd0894b2733cb088004acd721783 -1c834b4942df8aa71684edd2996f9420 -29fc4fad3c212543fcd206770c8c5b25 -76e6187256b802a813ccd2545896df2b -0912b0a4b1b027ffb058b6edd599deb5 -fe5ac1231f2dcf818fc4681bdd80c756 -4e694b9e91f181a1247a79a28a0e6c4a -24423bec2ffea9c3993b2ee9063fb522 -6b51053384f1029b384246e74021c5cb -c6e2d6f42a62115086afeadd07049c36 -2af280c19a6a92ba74e79f5497e301cd -4ef93079b6fef82ce9db9048d6a89da3 -831fa63956056064641b96925e8f6639 -c1a5f7becb8c4d0a74cdff1ae6830456 -762b5f34d89495d3fa5db83693078bba -9d06abc86b2a795a5bdbc41e030f08d0 -0eabb0486f0520add02b7069bcb0a2f6 -fd632b8e53b31a381b863bbcd3c8c3e3 -f93e8d6fed034653841dd67280359b79 -84eb99628c3582c822342fc0ad1d16d1 -1f95d986bebc75a75576e8bb781a8190 -1cccf1e730b876d7b22d324062762221 -fb76830de5fbf503babf82b6e8eed131 -0a68725199e06d7663cee9af59f55331 -32d7978c0b98d6aed75a16874695081b -d376254c84c2706657972bbec8ecf324 -a5442e32c68c7a65b90ae77ebadfd920 -ab4096ad103d33b604499dd89d391403 -ddcbdedc3f64dec496725d3caa901d33 -ead84dc8c9394565bd2f8bc37c990599 -c5abeb474a20f36d300ddb0efc904d86 -11fb687232ebaf0e26ce12e5c65e1191 -8953e471d9df4873ec9002f7fbffdda5 0c04db8f741f64d714276361276468af 038114357ba7f6e499351e601ddeff47 366eef13233e641d4f17f63783a92147 @@ -208,3 +108,17 @@ f7496353ba329d44ac7a4fbb36448942 88fd357f2431c56cec6a916216d8ec09 a5a3e672d1da28807771d678c092841e b16cc443df0884c4640bbe030b2ef836 +1e0c1aafc17aacbb076ef749fe7934e9 +0f59c8821ed9b4a0d62fc9dc88a0abdf +e14220e88dca176154a28ea1f2970a87 +7a7bd97e07f3539add4e18bada235449 +300f723e7ffcee590170ef1e4d19db20 +0ff48fe251a775f3eef41cc6f197f8b9 +848f3c51fcf13d5ba6516df7bd3ff74e +487d172b2b578f8467e8f8815c96c3bf +fd2e86c434ae348db7e460f3b44a11f3 +d6abd8375642c157400c035ed6a29451 +40f9ef508234225f7b0e65ced36a3e25 +f78bb8bc4863957da828d40bc5b5bbef +66102fbdee9f0ab0e517beeef6f5448e +fd90fbff8f4fd3aa7012d7dc9976c3b2 diff --git a/data/cves.db b/data/cves.db index c617fa471e0..208c8326518 100644 Binary files a/data/cves.db and b/data/cves.db differ diff --git a/docs/index.html b/docs/index.html index 6f84a9de385..bfd4dfe3819 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -2100,123 +2100,123 @@

眈眈探求 | - npm s3-url-parser拒绝服务漏洞 - 详情 + 1e0c1aafc17aacbb076ef749fe7934e9 + CVE-2023-33076 + 2024-06-25 06:27:20 + Qualcomm Chipsets内存破坏漏洞 + 详情 - 6654dedf4f65635b423568ef9ad8f69e - CVE-2024-33442 - 2024-06-25 03:21:58 - flusity CMS任意代码执行漏洞 - 详情 + 0f59c8821ed9b4a0d62fc9dc88a0abdf + CVE-2024-30176 + 2024-06-25 06:27:20 + Logpoint用户枚举漏洞 + 详情 - df79a60d9d7d6027a70d2d05329a4037 - CVE-2023-4503 - 2024-06-25 03:21:58 - Galleon初始化不当漏洞 - 详情 + e14220e88dca176154a28ea1f2970a87 + CVE-2024-33304 + 2024-06-25 06:27:20 + Product Show Room跨站脚本漏洞 + 详情 - 2f7d2eb72eabdc20ad51c48841c28c8a - CVE-2024-22433 - 2024-06-25 03:21:58 - Dell Data Protection Search明文存储漏洞 - 详情 + 7a7bd97e07f3539add4e18bada235449 + CVE-2023-43513 + 2024-06-25 06:27:20 + Qualcomm Chipsets内存破坏漏洞 + 详情 - 05889aef248dbacefbbc278547c4cf16 - CVE-2023-33049 - 2024-06-25 03:21:58 - Qualcomm Chipsets拒绝服务漏洞 - 详情 + 300f723e7ffcee590170ef1e4d19db20 + CVE-2024-25140 + 2024-06-25 06:27:20 + RustDesk配置漏洞 + 详情 - bd2587b7ca9b573c9dc0c5608bf8ab62 - CVE-2023-33046 - 2024-06-25 03:21:58 + 0ff48fe251a775f3eef41cc6f197f8b9 + CVE-2023-33069 + 2024-06-25 06:27:20 Qualcomm Chipsets内存破坏漏洞 - 详情 + 详情 - 7f9d884cd363615a74e8916a8c2e0d2b - CVE-2024-29011 - 2024-06-25 03:21:58 - SonicWALL GMS硬编码密码漏洞 - 详情 + 848f3c51fcf13d5ba6516df7bd3ff74e + CVE-2023-32451 + 2024-06-25 06:27:20 + Dell Display Manager权限提升漏洞 + 详情 - 8f9bb5432d292205e1fac997a4a703dd - CVE-2024-0684 - 2024-06-25 03:21:58 - GNU coreutils堆缓冲区溢出漏洞 - 详情 + 487d172b2b578f8467e8f8815c96c3bf + CVE-2023-33077 + 2024-06-25 06:27:20 + Qualcomm Chipsets内存破坏漏洞 + 详情 - f7496353ba329d44ac7a4fbb36448942 - CVE-2024-32213 - 2024-06-25 03:21:58 - LoMag WareHouse Management硬编码密码漏洞 - 详情 + fd2e86c434ae348db7e460f3b44a11f3 + CVE-2023-23022 + 2024-06-25 06:27:20 + Employees Payroll Management System跨站脚本漏洞 + 详情 - 4563adeb96bd9532855a0454bb101348 - CVE-2023-43536 - 2024-06-25 03:21:58 - Qualcomm Chipsets拒绝服务漏洞 - 详情 + d6abd8375642c157400c035ed6a29451 + CVE-2024-26504 + 2024-06-25 06:27:20 + Wifire Hotspot任意代码执行漏洞 + 详情 - 612c2cf6994b8ac500e3b1a65115baa0 - CVE-2023-43535 - 2024-06-25 03:21:58 + 40f9ef508234225f7b0e65ced36a3e25 + CVE-2023-33072 + 2024-06-25 06:27:20 Qualcomm Chipsets内存破坏漏洞 - 详情 + 详情 - 783a4600ab15df185c1a79078126d0bb - CVE-2023-52239 - 2024-06-25 03:21:58 - Magic xpi Integration Platform XML外部实体攻击漏洞 - 详情 + f78bb8bc4863957da828d40bc5b5bbef + CVE-2024-24313 + 2024-06-25 06:27:20 + Vaales Technologies V_QRS信息泄露漏洞( CVE-2024-24313) + 详情 - 88fd357f2431c56cec6a916216d8ec09 - CVE-2024-22830 - 2024-06-25 03:21:58 - Anti-Cheat Expert访问控制错误 - 详情 + 66102fbdee9f0ab0e517beeef6f5448e + CVE-2024-25458 + 2024-06-25 06:27:20 + CYCZCAM A9 Camera信息泄露漏洞 + 详情 - a5a3e672d1da28807771d678c092841e - CVE-2024-22365 - 2024-06-25 03:21:58 - Linux-pam拒绝服务漏洞 - 详情 + fd90fbff8f4fd3aa7012d7dc9976c3b2 + CVE-2023-23021 + 2024-06-25 06:27:20 + Point of Sale System跨站脚本漏洞 + 详情 - b16cc443df0884c4640bbe030b2ef836 - CVE-2023-23019 + 08abf96af8aa463f784ab72352ce6aae + CVE-2024-25355 2024-06-25 03:21:58 - Blog Site跨站脚本漏洞 - 详情 + npm s3-url-parser拒绝服务漏洞 + 详情