From 10026e4318318de5d0edd9073d9821befde64109 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 23 Feb 2024 09:22:13 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 46247936 -> 46252032 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 9351d40900e..18d6a72249a 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -185,3 +185,18 @@ f7b6b01a03598b96d7b1a1fc9db40a17 e6e8a15da9f259566cda01970d1d6e09 fd366c3c01641d7e223d38b67f78ccf8 f28929d7af88391b07981427c119cb18 +602b668838f330dc75e26735a625502d +7892b925aa8ace0a5968eda6a74e9ca1 +c4e0f173e60db4d1b44a81dcb7d995b7 +ab26b78785db5203ec0871a97d8c7a5e +846016d38ce5d85dabfc9739023cf711 +2bacc0c50e220d39256fc2d496025324 +06b9e58f2d98fe817102cb4b04e440e9 +3bc2611e133547b0d3a56fc74e90d7ce +a7d0cf942bab17ae57fb2562592edd05 +b36cd41a09d31a84550e6b5a1cb62ea0 +16a4843e27791694b051d01ae5b06abe +120bec4a3f5569a830cd324eba98aee3 +b4cd40bafb7dc438d00e9c9809743bfb +6e0fa27c0d7dd182b1a7febdab52290d +b2144541809cb327e7a0c09a7f1f18f5 diff --git a/data/cves.db b/data/cves.db index fa1fdc502a81007dc7dc0a2b68bc8c59b72f6ec3..4924948bcfda8747e4c041ec21cf6f48b6fe7522 100644 GIT binary patch delta 4321 zcmZ|RXLME776o8(G1SncOEDB_5;?u7pa=m`5EKxs%yaHNS5b-}3id>q0xC^~h^SX% z1q+}kNDKDfd#_;cy}x;$`o;_5k8ck~e(ZVI+H0Lb#oOn%si>IKW>JUYes${f?YOvf zzoLGXAc}|#QJ2_-C?@I=^@#>VL!uGUm?$Bd5KW0@M027Au`AJ%XhpOp+7NAtc0_w( zH=+a4k?2HpCUz%Ei7rG}q8rhj*n{Xn^dx!_y@@`=o`m-L>`U|~1`zuZ`x66+1BgMyV4|EDLJTDiB!&?O5eE~)i4nvh#7JTkaVT*Z zF`5`dj3o{y#u4L*BZwo3qllx4V~Ask355C+5iyY^azsMpiQ|aliHXDs#EHZtVlpv> zm`a>POe3ZfClfP>Q;1WEnZzvOG~#sP4B|}UEaGh99HN4#B+ezyBW4pM&L`#&bBTGx z1;mBKMZ|n!0kM!+L@XvQCN3c^C6*9Ni7MhUVi|Ecv7ESqxRSVvC=gc@*AUgjwZwJA z^~4Rtjl@mF3SuR3GjR)XD{&jKidapoA#Nw`Al4Fh5_b{ni1ozX#0Fv`v5DABY$0lh zt;9XVy~KUQ{lo*rgTzC`!^9)Rqr_vx>%<$xo5Wkh+r&G>yTp6M`@}Y4JMjVWA@LFMG4ToUDe)QcIq?PYCGi#UHSrDc zE%6=kJ@EtaBk>dQGw}=YEAbogJMqUn6wODGWTdX_BE?cq>PrJ@D2=4Clt>e4D$S(1 zw2)n;rL>aP(ni`!J83VwNeAgDousquE~U~%x=J_cE_+B1=_$RWxAc)crLUC9UeZqt zF~t&F9C5`HUjhkbZ`nuomHsk7_LKc(pd28BWU!RW5E&{5$}l-d4wm6ELJpCUGD;4W z!(_CKk+E{PjFa(lgd8bH$mMqw<(ME>Fml z@{~L+&&ad#oIEct$cyrlyezNCtMZz>E^o-2@|L_U@5sCIp1d#HWV?JIAIeAav3w$* z%4hPqd?8=TSMs%dBj3t*^1b{ZKgv(?v-~2z%5Ur zjij-ZNE2x)&7`@skX@yvw361+M%qd{X)n7;2k9uCq_gZUrP4*ZN;l~)dq@xIDZQk( z^pQQKuawDN(oYOA#S&W_am5o~0tsbr*+=%3{xU%Jll^6&93X>au$0RX87c?LFgZvL zmfEN)DC7WVDQtv2wVKlkswd94SZ1(Q=F&D-$H`eGDW7!Nit2Q%gHiBPLWe(rp%JlwE|yE=QduHPrAjW7WpcSJmn-B-xk?IhwOk|Ba;;n^*UJrZqueAb zWTo6Jx5%w>o2-)6vPN!~J7lfgDR*TyV_oLDw;IeUUSB8u&t6T*+v_r)XNrnzT6{Sr zb7N-7sFHTYeLJwabYac5br~J&)8p>+*pMC@(_>S5Y)+3Y=~0uZsoAzQQ@){n<2qG! zn!Mk5OT*dq#}qHBdw<<_nOQ|I74@%E)#9Z1^s$v)ba8_b?R%eSHyIr`o?&`9JIE$( zE^u>EoX>{79U7LM&HJYL!N!^omKO#cUS4MDPi2l7IL45v(`QValFTUm?>`1jnwU(P zQ7Bqbp6OiTlo?i;WtSS^-ezHO`I4fpL1_4HP}!Q*yQi6>l^MmB7yE&)xY)G}JINY> zZ$_b?3$lLXCVyrYmRGFEbgVmW_=v(9XKkik!yPUjpI#hRc4T$u^x{YtXPv~zo4%cR zMlN=8X6!goVCJ&1p9@1b_IE7Cbpxw*F(aahlL`YTZOwG4_y0v0%JPg#y-24tYl5=; zAhhDpa-%4SvWXG7p%)~%$cua@3A2S~7O%{-Y-Kq??fc6IA66AzRn(!dD8DsRuU1A{ zk7ri)WOc_hW2Q1Z!-_pG2<#wl+eR+yyNTubwi|ht>l#+BRy}G@XnEGKDKnBurK6MS zrzX=&511NF&lN^)uFkZrntHHTQfS_FW2WAYoh(k1t(yCuE{{^sQ{m>OSf39jD(LTc+c< znh_(+#~gF!J+e-VE}EtNY)PX;os5o|sHdrkq?lXyk~h)nEMFX(!DXr=R2m zX~TQ}-EdED8(DtV$oaXP8CbEYdy`lb>snT5)NY1drdAkk?dA_0Jm}w=KRC?`(<$wx zyq;szVw`NwG2$q%>B%~FkTVQDY^d6N$By%Ht>)Who@rJ^_nN&56Z&q-6xXk{14rt1 z*GTuSXIf3Vccx{;N!E$%yz6>l6xc>KXIoAZM_~{piM_+^w%*^VUCm#6w`$~qo$lSx zG}EkfSly$cGAo;+ScPTTwwX?a zFQ(1T^!%5Ha;?gitllFnZDiUw+f(Pv$Ov<`83m3;HSuCMGPAK~C6TdXX-*iLwM)~^ zSGBmiZp*@`bu~NL64$Qm%IfZE-el!Pe$L3|L&u7v*z{G5pN}n9D-v2sE@!wq=6SAb z*UlR~tb9b(!1_(Q>?AN4ncL;P$&-ZG#uv6h&cjL(l-hf&>Zf?(XjHuyJ?yAR7o8+}+&?9@0{%K#NqMg0xUCrAXb@ zefZW7*fVG5#Kg>xjCnLKGA=4CI!Th^QOl!ig+$Mi6=DUfP%EhwW+k(dTPduRRw^sC z6>g=m(pu@P2rIpn!OCc5vNBtdRu(I(mCed-MOitloK`L?w-s&WvGQ8^to&91tDsfL zDr^<8idx02;#LW(q*cl)ZI!XgTIHchqcq%W$m{1SbME~)_&`Nb-SEb>6yQU9>J)m#qZrij`=+VZCWxwcfI>S=X(%t#_<jUeSb=$gQ-L*cnKC(WxKC$ju_pMK@&#cd_FRTaFL+g?C*!t4?%6eiwwZ68#vA(sw zv%a@}uzs|DvYuH#ThFautQXcx>y`D|`qlc)`rZ1&`qTQ$`rG=)`q%m|Rv}9if&fC1 z6k$k)Iz%8nG9V)|Au}S81zC{|*%5^t$cbFYjcDXSUgSf56hJ`~ zLSYm^Q4~XQlt4+8LTQviS(HP0R6s>kLSi4Hh(%b8C0L4O zh{JNMz)GybYOKLptiyV2z(#DsW^BP$Y{Pc!z)tMKZtTHc?8AN>z(E|sVI09x9K&&( zz)76KX`Dek&f*--;{qNmJi$|Zjc@QRzQgzU0YBm=Jj2g;j$iNsFYyYm z@hg7A@Aw0M;xGJ-fABB<3yD>L^G5)oNQy8dLvo}*N~A(+gd+{oA{`=-9vP4knUEQg z$bziMhU|z!4&+2G=JvyKxI-xVVpewqe zJ9?ledLg)fZ}dT5^h19Pz(5SbU<|=f48w4Yz(|b3XpF&FjKg?Lz(h>KWK6+SOv7}{ zz)Zwo7G`4(=E9hV`B;EhEW{!##u6;WGQ?pyR$wJoVKvrZE!JT@Hee$*VKcU1E4E=f zc3>xVVK??*FZN+S4&WdT;V_QiD30McPT(X?;WW+!E-5~+>tTwCVF^is&t5|KqxitH zKthJ+MMJI!mL)!o59Vwz=YlyO%!Obs26HKx%fTcB5)z+Y3Di5EHd*M^Bx# + @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 602b668838f330dc75e26735a625502d + CVE-2022-29262 + 2024-02-23 09:19:57 + Intel Server Board BIOS Firmware缓冲区溢出漏洞 + 详情 + + + + 7892b925aa8ace0a5968eda6a74e9ca1 + CVE-2023-44248 + 2024-02-23 09:19:57 + Fortinet FortiEDR访问控制错误漏洞 + 详情 + + + + c4e0f173e60db4d1b44a81dcb7d995b7 + CVE-2023-45582 + 2024-02-23 09:19:57 + Fortinet FortiMail身份认证错误漏洞 + 详情 + + + + ab26b78785db5203ec0871a97d8c7a5e + CVE-2023-42783 + 2024-02-23 09:19:57 + Fortinet FortiWLM路径遍历漏洞 + 详情 + + + + 846016d38ce5d85dabfc9739023cf711 + CVE-2023-41840 + 2024-02-23 09:19:57 + Fortinet FortiClient不受信搜索路径漏洞 + 详情 + + + + 2bacc0c50e220d39256fc2d496025324 + CVE-2023-41676 + 2024-02-23 09:19:57 + Fortinet FortiSIEM信息泄露漏洞 + 详情 + + + + 06b9e58f2d98fe817102cb4b04e440e9 + CVE-2023-36633 + 2024-02-23 09:19:57 + Fortinet FortiMail授权错误漏洞 + 详情 + + + + 3bc2611e133547b0d3a56fc74e90d7ce + CVE-2023-36641 + 2024-02-23 09:19:57 + Fortinet FortiProxy和FortiOS数值截断错误漏洞 + 详情 + + + + a7d0cf942bab17ae57fb2562592edd05 + CVE-2023-36553 + 2024-02-23 09:19:57 + Fortinet FortiSIEM操作系统命令注入漏洞 + 详情 + + + + b36cd41a09d31a84550e6b5a1cb62ea0 + CVE-2023-34991 + 2024-02-23 09:19:57 + Fortinet FortiWLM SQL注入漏洞 + 详情 + + + + 16a4843e27791694b051d01ae5b06abe + CVE-2023-28002 + 2024-02-23 09:19:57 + Fortinet FortiProxy和FortiOS完整性检查值验证错误漏洞 + 详情 + + + + 120bec4a3f5569a830cd324eba98aee3 + CVE-2023-33304 + 2024-02-23 09:19:57 + Fortinet FortiClient硬编码凭据使用漏洞 + 详情 + + + + b4cd40bafb7dc438d00e9c9809743bfb + CVE-2023-6111 + 2024-02-23 09:19:57 + Linux Kernel内存错误引用漏洞 + 详情 + + + + 6e0fa27c0d7dd182b1a7febdab52290d + CVE-2023-26205 + 2024-02-23 09:19:57 + Fortinet FortiADC访问控制错误漏洞 + 详情 + + + + b2144541809cb327e7a0c09a7f1f18f5 + CVE-2023-46601 + 2024-02-23 09:19:57 + Siemens COMOS访问控制错误漏洞 + 详情 + + b352ef9110c2d86c51c0ea6b665d3d3f CVE-2023-25756 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - f4fafc06411bd9ee36844b8f5060ab67 - CVE-2023-32660 - 2024-02-21 09:22:36 - Intel NUC不受控制的搜索路径漏洞 - 详情 - - - - b847c203363e73e01c3a176ec1bb793d - CVE-2023-32661 - 2024-02-21 09:22:36 - Intel NUC身份认证错误漏洞 - 详情 - - - - 01e8ecbc28775660a0d44283f7859372 - CVE-2023-32662 - 2024-02-21 09:22:36 - Intel Battery Life Diagnostic Tool授权错误漏洞 - 详情 - - - - 993ed3f6e7aa9679a4de69902b5752d1 - CVE-2023-32701 - 2024-02-21 09:22:36 - Blackberry QNX SDP输入验证错误漏洞 - 详情 - - - - b7e60da24d9a67668dda29954114e426 - CVE-2023-33872 - 2024-02-21 09:22:36 - Intel Support访问控制错误漏洞 - 详情 - - - - 952a9461d21b8aac18b18a1d670550b1 - CVE-2023-33874 - 2024-02-21 09:22:36 - Intel NUC不受控制的搜索路径漏洞 - 详情 - - - - f649555330f4302f724e32a6c97debc7 - CVE-2023-33878 - 2024-02-21 09:22:36 - Intel NUC Software路径遍历漏洞 - 详情 - - - - 015f4918b1214d113eea9ff972935a4a - CVE-2023-34314 - 2024-02-21 09:22:36 - Intel Simics Simulator权限分配错误漏洞 - 详情 - - - - bf65a0f5edab03a508d14ec104392a79 - CVE-2023-34350 - 2024-02-21 09:22:36 - Intel XTU Software不受控制的搜索路径元素漏洞 - 详情 - - - - 45c94f76df3189b4dca2cc0db32b2efe - CVE-2023-34430 - 2024-02-21 09:22:36 - Intel Battery Life Diagnostic Tool不受控制的搜索路径漏洞 - 详情 - - - - e2d748abab98231c5e315432ed52b81a - CVE-2023-34431 - 2024-02-21 09:22:36 - Intel Server Board输入验证错误漏洞 - 详情 - - - - 12908fc9ea074ff2a8da552d4c0f8a5b - CVE-2023-34997 - 2024-02-21 09:22:36 - Intel Server Configuration Utility Software权限分配错误漏洞 - 详情 - - - - 8973bad5c459e9f44d10277d6c689dfb - CVE-2023-36860 - 2024-02-21 09:22:36 - Intel Unison输入验证错误漏洞 - 详情 - - - - 8f12a9f117ccf3553015990a1a02066a - CVE-2023-38131 - 2024-02-21 09:22:36 - Intel Unison输入验证错误漏洞 - 详情 - - - - 211b77da24e96cacb81e05ad2129a6b6 - CVE-2023-38411 - 2024-02-21 09:22:36 - Intel Smart Campus Android Application访问控制错误漏洞 - 详情 - -