Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Dec 19, 2024
1 parent 968058a commit 0ccafd1
Show file tree
Hide file tree
Showing 3 changed files with 146 additions and 131 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -125,3 +125,18 @@ dd5e8957aca724dba08798f4ade2f0c4
b8f38e44ab356dd48f0309545a8ddeba
144e283743321111c11b228551f0f348
fd41ed18a67548fb1b9c7b902781fca2
ed9709003f2850f368b87e359a4b7e22
23eb8eb01674b4913bec5d4dfd506126
9ded10f622530592b77e73cab73fd712
b876a5b2f02222ec10b122ad1e00d8fb
dc576147fecfd45eb31b4d0242e2ffab
c5c22eeb910f94d4b2cfccc53fe024b4
2c195fa345f7fea241d2c243163d6a67
9b8d39aabf8eb60a83e9ce9c2c8e7915
0212844f2b27e659025f4a9b56ea81fd
3bfcff1a2234e150346754079d41d228
580cede073aab0290525e8476a495523
1015f0b192d4d94710d969a1c7413e49
c89873a677eeba2554c51232bcfdb869
407587df3afafbf556ca40d7d64f0792
0a62b2872bc504fa8b99f8c4402c928c
Binary file modified data/cves.db
Binary file not shown.
262 changes: 131 additions & 131 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-12-18 18:33:52 -->
<!-- RELEASE TIME : 2024-12-19 09:26:46 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>3246b89d17ebce389ad043c2a5c46a02</td>
<td>CVE-2024-53144</td>
<td>2024-12-17 16:15:25 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:25</td>
<td>In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4 ("Bluetooth: Always request for user confirmation for Just Works") always request user confirmation with confirm_hint set since the likes of bluetoothd have dedicated policy around JUST_WORKS method (e.g. main.conf:JustWorksRepairing). CVE: CVE-2024-8805</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-53144">详情</a></td>
</tr>

<tr>
<td>0110a638f9542db0151b15913612ab7b</td>
<td>CVE-2024-12671</td>
<td>2024-12-17 16:15:25 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:25</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12671">详情</a></td>
</tr>

<tr>
<td>0ab2d39bdfff0e23d4d8d88f0f6277fe</td>
<td>CVE-2024-12670</td>
<td>2024-12-17 16:15:25 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:25</td>
<td>A maliciously crafted DWF file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12670">详情</a></td>
</tr>

<tr>
<td>145033e556d1e530ea6a0b253f2d5076</td>
<td>CVE-2024-12669</td>
<td>2024-12-17 16:15:25 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:25</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can be used to cause a Heap-based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12669">详情</a></td>
</tr>

<tr>
<td>7cde8f0f4cc3ce2107f1b9d29acc3798</td>
<td>CVE-2024-12200</td>
<td>2024-12-17 16:15:24 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:24</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12200">详情</a></td>
</tr>

<tr>
<td>4a5aca1b061dafb45b2596285c7b52b6</td>
<td>CVE-2024-12199</td>
<td>2024-12-17 16:15:24 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:24</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12199">详情</a></td>
</tr>

<tr>
<td>3b6e859f26639254ed32fb8e64162bbe</td>
<td>CVE-2024-12198</td>
<td>2024-12-17 16:15:24 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:24</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12198">详情</a></td>
</tr>

<tr>
<td>76de3ac3512dd89b9892cb5fbd135978</td>
<td>CVE-2024-12197</td>
<td>2024-12-17 16:15:24 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:24</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12197">详情</a></td>
</tr>

<tr>
<td>b6d1b5a24856c4e6171b742be38c0516</td>
<td>CVE-2024-12194</td>
<td>2024-12-17 16:15:24 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:24</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12194">详情</a></td>
</tr>

<tr>
<td>b7621d7f4b2ce07c211af869a2a8dc89</td>
<td>CVE-2024-12193</td>
<td>2024-12-17 16:15:24 <img src="imgs/new.gif" /></td>
<td>2024-12-17 16:15:24</td>
<td>A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Write vulnerability. A malicious actor can leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12193">详情</a></td>
</tr>
Expand Down Expand Up @@ -1987,6 +1987,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>ed9709003f2850f368b87e359a4b7e22</td>
<td>CVE-2024-28731</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>D-Link DWR-2000M跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108492">详情</a></td>
</tr>

<tr>
<td>23eb8eb01674b4913bec5d4dfd506126</td>
<td>CVE-2024-10038</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>WordPress WP-Strava Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108491">详情</a></td>
</tr>

<tr>
<td>9ded10f622530592b77e73cab73fd712</td>
<td>CVE-2024-9816</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>Codezips Tourist Management System代码问题漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108490">详情</a></td>
</tr>

<tr>
<td>b876a5b2f02222ec10b122ad1e00d8fb</td>
<td>CVE-2024-9487</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>GitHub Enterprise Server身份验证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108489">详情</a></td>
</tr>

<tr>
<td>dc576147fecfd45eb31b4d0242e2ffab</td>
<td>CVE-2024-45317</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>SonicWALL SMA1000代码问题漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108488">详情</a></td>
</tr>

<tr>
<td>c5c22eeb910f94d4b2cfccc53fe024b4</td>
<td>CVE-2023-42133</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>PAX Android based POS权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108487">详情</a></td>
</tr>

<tr>
<td>2c195fa345f7fea241d2c243163d6a67</td>
<td>CVE-2024-9814</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>Codezips Pharmacy Management System SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108486">详情</a></td>
</tr>

<tr>
<td>9b8d39aabf8eb60a83e9ce9c2c8e7915</td>
<td>CVE-2024-10629</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>WordPress GPX Viewer Plugin任意文件创建漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108485">详情</a></td>
</tr>

<tr>
<td>0212844f2b27e659025f4a9b56ea81fd</td>
<td>CVE-2024-9817</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>code-projects Blood Bank System SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108484">详情</a></td>
</tr>

<tr>
<td>3bfcff1a2234e150346754079d41d228</td>
<td>CVE-2024-21534</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>JSONPath Plus远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108483">详情</a></td>
</tr>

<tr>
<td>580cede073aab0290525e8476a495523</td>
<td>CVE-2024-5005</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>GitLab信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108482">详情</a></td>
</tr>

<tr>
<td>1015f0b192d4d94710d969a1c7413e49</td>
<td>CVE-2024-47648</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>WordPress plugin EventPrime输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108481">详情</a></td>
</tr>

<tr>
<td>c89873a677eeba2554c51232bcfdb869</td>
<td>CVE-2024-21541</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>npm dom-iterator任意代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108480">详情</a></td>
</tr>

<tr>
<td>407587df3afafbf556ca40d7d64f0792</td>
<td>CVE-2024-48987</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>snipe Snipe-IT远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108479">详情</a></td>
</tr>

<tr>
<td>0a62b2872bc504fa8b99f8c4402c928c</td>
<td>CVE-2024-6971</td>
<td>2024-12-19 09:24:35 <img src="imgs/new.gif" /></td>
<td>Saifeddine ALOUI LoLLMs路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108478">详情</a></td>
</tr>

<tr>
<td>10f515684e689350774b3821a07710ca</td>
<td>CVE-2024-47877</td>
Expand Down Expand Up @@ -2107,126 +2227,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108373">详情</a></td>
</tr>

<tr>
<td>f409078609f0f287b00da0020a54c3c5</td>
<td>CVE-2024-9595</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Rescue Shortcodes跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108287">详情</a></td>
</tr>

<tr>
<td>94a4a3a96616ad9e78d4d387e910ea0d</td>
<td>CVE-2024-8915</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Category Icon跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108286">详情</a></td>
</tr>

<tr>
<td>a045fdfed483a6b82c1abdce92b3244c</td>
<td>CVE-2024-8760</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Stackable代码注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108285">详情</a></td>
</tr>

<tr>
<td>dfd6c0eb3e813a24d2fd241466c12a8b</td>
<td>CVE-2024-9756</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Order Attachments for WooCommerce任意文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108284">详情</a></td>
</tr>

<tr>
<td>6798cb252ea27ac01ecbdaa4189ec33c</td>
<td>CVE-2024-9047</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin WordPress File Upload路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108283">详情</a></td>
</tr>

<tr>
<td>42f107ad9bf5e5a33f973cc71bde8c90</td>
<td>CVE-2024-9824</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin ImagePress未授权的信息修改漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108282">详情</a></td>
</tr>

<tr>
<td>fd0e20ab2ce121f81777e02c0a54b61e</td>
<td>CVE-2024-9656</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Mynx Page Builder存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108281">详情</a></td>
</tr>

<tr>
<td>e2b888238e25b7a09020985a2ad58cb2</td>
<td>CVE-2024-7489</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Forms for Mailchimp by Optin Cat跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108280">详情</a></td>
</tr>

<tr>
<td>472bf7c82769d3596bcc7fb5a607e24d</td>
<td>CVE-2024-9821</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Bot for Telegram on WooCommerce信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108279">详情</a></td>
</tr>

<tr>
<td>d421c26d109aa0bf3818ff9f13500e2b</td>
<td>CVE-2024-9592</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Easy PayPal Gift Certificate跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108278">详情</a></td>
</tr>

<tr>
<td>2aa1de7e99518325f1a477f1798a0101</td>
<td>CVE-2024-35517</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>NETGEAR XR1000命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108277">详情</a></td>
</tr>

<tr>
<td>c5217cf47ec49f32f380d795346635ab</td>
<td>CVE-2024-9776</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin ImagePress跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108276">详情</a></td>
</tr>

<tr>
<td>f52153daa607c5ca66d7fbdde0d61dc5</td>
<td>CVE-2024-9778</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin ImagePress跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108275">详情</a></td>
</tr>

<tr>
<td>bfa87c55759360c6e077c2241eaa3c6d</td>
<td>CVE-2024-35522</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>NETGEAR EX3700命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108274">详情</a></td>
</tr>

<tr>
<td>808c841a59d7814eb9e76f0988429a05</td>
<td>CVE-2024-9696</td>
<td>2024-12-17 12:49:25 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Rescue Shortcodes跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/108273">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 0ccafd1

Please sign in to comment.