From 138189d6427c901d3726b00af94015c632e05cd6 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sun, 28 Apr 2024 11:19:16 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 47280128 -> 47288320 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 5a518a9fb70..387208de283 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -193,3 +193,18 @@ dbd5e9c35300ca5dd1a228209dc1483f b53e7ea55ccb21c340f4131347278127 f3736b24b84edea3e6eac63ec66e21a2 b311f5f19386d90ec3729b7b954b276c +260b354bee236a1b284ebbbd39a7e4a2 +5d6c5aa176f82b2417aead0f271b78ba +69f577ce89d9d06d287540ce2c67bc0a +a8a8bd2e5e73412845e45dfe1ce89f01 +92aafe9479b5cc923d4cb1aa223fd3b5 +6ce4fcc151227b2a5faaa4e4fbd4299d +16b5db64a699251472f795198091cc8f +d5a22e39f9026fcd989025e79e89404e +d7324189e859ff866c9680022a8d1ad8 +91588dad38ee92399a60d15837aefcd1 +01c57f7ce68992765e7fc7a2812ed9cd +29976e7ce0bb7076240ae6a2efccbde4 +4c09cf8a1219d84cbcb2ca987712ad21 +ca0cfd5813dfad4b92ff1c27d0a4d783 +c22e552943f233dc62b0d732ffadf389 diff --git a/data/cves.db b/data/cves.db index d54c0b994695932e696221820031a5668abf8b26..3d2a72fa68a76908624464f4d0711224d0d6970e 100644 GIT binary patch delta 5443 zcmb8zcXSlx9>($Pq>w-g2`w~TdJW9XmYJa^p(>bAB!tjrXLcbFvT1Y#7Fbb%Py$9l zGN6c9DGLTc2wfC~VDBO*U=Q~0eIAb9D};aUAK%Z+SvdQfclMoK4vWs8XuN3i$;PXj zNB$WWmeO>My|3-hU6ZyZM7K!j9mZG6V(YtY2?rC;*t!ap_L{RZqv_a)23-~gx7xzO zI(-#f?g|U*ICkj|1DA}rb=inpZAd`jC;~;IC{zbUqZm{d)kCo;4#lGcR39axB-8*k zM2%2m)C47?rl=Wej#{9W=oZA;cGL>BMr}}A)DE>r9Z*Nq33WzYP*;?Kx}ok!L=uvb z138fkxsifYq@fW5NM8cIj~(Ev0M4MKy_5Of>59Sudp&>biPWuoC| z1R9A(p*zuNl!eBiY%~_-pmAtCnt&#vNk~T?WFQlHkq=EqQ&29Nil(7FG#%w5KPo_l zs0bCK5;OzNM6=LrGzZN^^U!>B7g~T8qD3fx7NaF-DGH*y(K2)ox)twm*M9a@j>N9E`N^dQ=RHll~nCRBkev>9zd52HuWR`e*^h8{!P(c|a|^dx!; zJ&m40JJ3$F3++ZBvA}f{vnN=r}roPNEmkDfA+G z37tkSqgT)wbQV>kbLds{8hRbQf!;)Kp|{aH=w0+4dLMm&K13g(^XOxA0bN9&pij{y zbQxVipP|pu7wAj$75W-|gKE%K^ey@heUE-XKcb(|&*&HQEBX!nj{ZP@qQ92o*ZgBodK{gE)zcxQRkkqLCh?C+S6clRl&` z=|@sY8c8Sp$pA8t3?hTc5ON#2oeU+z$Q>kuWRl@z1Q|(2kvqv~l10XlY%-SQka1)@ znLs9zNkk_eVi1#fiH}SsQ%EkEN~V!KGM(fTKPe!Eq=*!g5;B9#B(unDGKb71^T>R1 z7g<0Sl0_sy7Lz4pDG8Fh$ue>extH8WmXj4^B`GDV$ZE2NtR-b+9a&HAC*|Y;@*vqj zHj;Mjj*E$>Zb+@+5hRJWZY=a*!M%Rpc-^LXMJS8hM?( zLEa>9k+;b^6CM20OCCx~4(t@-kw~%X>X6IQe(wej(ZAm-Qo^&7`Nhi{o zbRk_y3h73=6Ol+nCJy2xF5)H%QHe%+ke;L$=}r2OzN8;XC21s`^d|$zKr)C7CPT<= zjIozg2~C*?GcT-9NHPylz6W#k@mFS(B_Co9NGQc6~l)npA>OUlSPvYy;e z%E<%dL9&5tBoC2ILRE+L6~eon>%|w^R$RNP&ad;TlEcea7xl4Q{f|`$+2Q!Z%EbDC zWwxpgCn|)YF|lEFaQ#@pyrn<)sM=H(6au!=>I$K>+CrPr7W6QB1Z_o+qHX9gv>iQ; zo3iE9Lz35LX1y_{KR+V`8n61>-zsrE&y7pmVUHS*tCF77DTo;K$ zTCi*(4ynPic{ub7md(VWZ?LQohd#lw2{`l)mSyA6D_E9c9mbt$Z>>I4A#}Db;e432 zALj!t$MFhbt@RhqH(Dog?y)wUtq>-b)>I0mHT%$WXg@lDo<|4KAykD9qa)}jI);v; z6X+y*0i8lGqL=bpcTbI2)!|<41=j8)cmp5AJqX(qOqU=nO6{k}i<)7o9=C=>Y&$nmz ze7Q!ho@Y-jD6k5@-6JH|#a~kGlGH;|tiq+Igw`2ONp%Jif}t6lIS4aF$#5w?%yg@o zCM#~2SMeE&E~}F4H8sP$ai-fPYk9ezAp_FglIkkI+MrDXE3@@+A*$A_9L#bB+6O}= znAKqxW@(a3RZZP=s9vuoJ2XvqizZ%kC_0vCN;l3D9b%Th$jmJA78l#ov$E{z{^Ncf`(8@Z$^Ry5def<&#V5~bJ1w+L#7#paExu)Wf@v7!kU7F9Qy4{B6Rz*>k zb=8z~Q>{H$vf?lx?WO}pb1b!a|Kl-*c}rs4!Q5(71-==5Iq z{*Dx<>=2a!v-Rorf&QZD_K`C@({qc9%eQpz-pJZH?W_=e!-|Gspc;q^h6*__9Rnq| z$7OolPTh^q%q2M$*{5hONmE5lG7Qys-9YXE+>(JsUhhc5Kf}5@xLRmY=elh%ly@i4 zG#D!2gd9w88(t@No#c{aS@Foa%ctwQ6R&wpC$?#=ZJ|n%Bh%|G%FUl_rDCVGueBX8 zLlXnH219<%n2Z^ktm{6n=2SF~%P_DZOsCxD>QNM0Y zjueN8otUZT>G>tOMfO4dk}22~gY;b8YL$CVX!-A1*mjzOv-19#&cl@j7++y2bJP$ssAJ1-dcCYtNjKSF9J=GmHGQ=U7L6O%obf_9N9o)b;x?0wY~j zS0y6JPMTCGdNlW9#ovDntlDmYr}I2tf0l0OqTw@Ls^l>7 zj!ut;ca{uUF-6^JDyrkg_s5f{)?T_b{Nn|GJNsDQdQ6jVU0EGqVnW$kOj zULY|si6+q`CZBVGr}Ft`NtVWuGR)^C-@ttpy%eCI(Bw}0~fz- zu_*SvrLphXD?>RbN9Cl-C}-uOT$P)0S0+_fc_>firOGL9RbEw46;&lwS^20cs;cr; zeyWZ=B-p$b=xRAbddMX08#nQE?D zsFtdgYONww8`V~|Q|(m;6{R|=Xw^w|R$WwA6{EVT?y86Csd}m2DpvJTeN{gdr~0b_ zDqam#32KlUtcIweDp3tn!_^2iQjJoh)fhEajZ@>*1T|4jQj^sbm87PsWHn7qS2NU1 zHA~G_bJSdwqUNdjYJo~sX)0YUREyMNWmZenQngGiS1VM8TB%m4OqHcpt2Jt^%2qil zSFKZdYQ5T^HmXf(v)ZEal|>b(t!kUvt_sx-wNvdNEAZ`a(TcPt=#{EA_Q{s=iU*s%Ppu^}YH*{ivR+ z7wV;YrG8Sc)z9h|^+x@wep7GN@9Gcrr}|6%t^QH}X6W9}Qec1sID!+D0cUUlS8xM& zFhN=H08j9Oa^MZ+p#oHdN>CYmpbAt4U+{x!P#xZF&7WBfs0p>8HUvN&s0)D*1i=sj zp%4c3pguH!h7b;opfNOo2xtn;pgFXFme2}XLnO3;w$KjRLkEb0jt~uYU^I+@u`mwC!vvTJ zlVCDTfh3p;$uJG3!wi@SvtTyNfw_bXW+BU@@3s2`q(WupCxE2CRft zkO^6^8rHyC$c7xqg>{ez>tO?IgiWv+wm?2upa8bQHrNh@umg6&F4zrwU@z>0{cr#d z!XY>eN1zCf!ZA1wC%_6P;S`*PGjJBp!FjO31-J;8;4)l+Vz>&|;5yuZn{W$m!yUK_ z_n-ty;eGf3?!$-h5j=p8;S=~29>OE|3_gc1;4wUbFX1cr8lJ*8@GU%p@8Em*0e*z% z@B&`KEBFas!_V*wyn$cgH+T!b!yoV``~`o*Kk%=;9)E@=_F#YmID!+D0cUUlS8xM& zFhN=H08j9Oa^MZ+p#oHdN>CYmpbAt4U+{x!P#xZF&7WBfs0p>8HUvN&s0)D*1i=sj zp%4c3pguH!h7b;opfNOo2xtn;pgFXFme2}XLnO3;w$KjRLkEb0jt~uYU^I+@u`mwC!vvTJ zlVCDTfh3p;$uJG3!wi@SvtTyNfw_bXW+BV6kD-+Qtbhzy39BFzvS2l=fwhngIgktM zAP?5V2G|IjU^8qnYyr9X#-m_&J3IUTZ8D^zZNX!!5n<#N4NpkU(}t_(jZcpB%L`6S z2+doP92snhx}0ysd+47@lsU&oLkDw?lg0GhYWP^fWi3mp>~8UXVKvrTB41jK5w^hM zd?UuSYDjx?cB)piGiRr0Xl>4p*U-wG-P01QHDQ+9GTO33D>quUYUNNJQt*9qMw85v zd?T~Oq6*YjwM}hTg=&Y|sdlN|YLD8h_No2qfI6rSsl)1sDpE()F?C#>FwU1)4STQu zA4OPYOJaJdkz^b4#A?LZa}1sHCXYx6w3*UMjlNvKcQ0FNW~q_R+t7yQLVH`lQ>)Rm zjP2p_Qlro@^Oe=ee05TtQm54!byl5I=ao%eP#4uDby;0e#pZZD-ZmT=$ zuDWNOe^p{QCi$A2pV@iFdmQudE<4CnWHQ|2-A=oCyN+`?<7_Qg5c9yW`X4^{+R^rG JOsV1H@*mab$a4Sy diff --git a/docs/index.html b/docs/index.html index 4b48bef939a..64235dc2e36 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 260b354bee236a1b284ebbbd39a7e4a2 + CVE-2024-27317 + 2024-04-28 11:17:08 + Apache Pulsar Proxy目录遍历漏洞 + 详情 + + + + 5d6c5aa176f82b2417aead0f271b78ba + CVE-2023-42308 + 2024-04-28 11:17:08 + Exam Form Submission跨站脚本漏洞 + 详情 + + + + 69f577ce89d9d06d287540ce2c67bc0a + CVE-2023-30968 + 2024-04-28 11:17:08 + Palantir Gotham Gaia跨站脚本漏洞 + 详情 + + + + a8a8bd2e5e73412845e45dfe1ce89f01 + CVE-2024-28112 + 2024-04-28 11:17:08 + Peering Manager跨站脚本漏洞 + 详情 + + + + 92aafe9479b5cc923d4cb1aa223fd3b5 + CVE-2024-28114 + 2024-04-28 11:17:08 + Peering Manager服务器端模板注入漏洞 + 详情 + + + + 6ce4fcc151227b2a5faaa4e4fbd4299d + CVE-2024-28113 + 2024-04-28 11:17:08 + Peering Manager输入验证错误漏洞 + 详情 + + + + 16b5db64a699251472f795198091cc8f + CVE-2024-28186 + 2024-04-28 11:17:08 + FreeScout信息泄露漏洞 + 详情 + + + + d5a22e39f9026fcd989025e79e89404e + CVE-2023-42307 + 2024-04-28 11:17:08 + Exam Form Submission跨站脚本漏洞 + 详情 + + + + d7324189e859ff866c9680022a8d1ad8 + CVE-2024-2031 + 2024-04-28 11:17:08 + WordPress Video Conferencing with Zoom Plugin跨站脚本漏洞 + 详情 + + + + 91588dad38ee92399a60d15837aefcd1 + CVE-2024-2030 + 2024-04-28 11:17:08 + WordPress CWW Companion Zoom Plugin跨站脚本漏洞 + 详情 + + + + 01c57f7ce68992765e7fc7a2812ed9cd + CVE-2024-26529 + 2024-04-28 11:17:08 + libIEC61850拒绝服务漏洞 + 详情 + + + + 29976e7ce0bb7076240ae6a2efccbde4 + CVE-2024-27440 + 2024-04-28 11:17:08 + Toyoko Inn Official App信息泄露漏洞 + 详情 + + + + 4c09cf8a1219d84cbcb2ca987712ad21 + CVE-2018-25090 + 2024-04-28 11:17:08 + WAGO Controller BACnet跨站脚本漏洞 + 详情 + + + + ca0cfd5813dfad4b92ff1c27d0a4d783 + CVE-2024-28098 + 2024-04-28 11:17:08 + Apache Pulsar Proxy授权错误漏洞 + 详情 + + + + c22e552943f233dc62b0d732ffadf389 + CVE-2024-27894 + 2024-04-28 11:17:08 + Apache Pulsar Proxy输入验证错误漏洞 + 详情 + + d55b1091d686a27bdff1abbbc4e46169 CVE-2023-51690 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - f0690bf896670afe1034dc28fbaaa190 - CVE-2024-1303 - 2024-04-26 07:20:30 - Badger Meter Monitool目录遍历漏洞 - 详情 - - - - 1692a89c59bdf0b2ce7b68501f35fac2 - CVE-2024-1302 - 2024-04-26 07:20:30 - Badger Meter Monitool信息泄露漏洞 - 详情 - - - - fa0888d957b2380887fe274af8745d4e - CVE-2024-1301 - 2024-04-26 07:20:30 - Badger Meter Monitool SQL注入漏洞 - 详情 - - - - 2aa8927b6d45624c8a27953a7fc51fbf - CVE-2024-23112 - 2024-04-26 07:20:30 - Fortinet FortiOS和FortiProxy授权绕过漏洞 - 详情 - - - - f60ca726131723f97f6b0ff833d98871 - CVE-2024-21761 - 2024-04-26 07:20:30 - Fortinet FortiPortal授权错误漏洞 - 详情 - - - - f9344ca3c4082aa520ebb799e42aa23c - CVE-2024-1618 - 2024-04-26 07:20:30 - Faronics Deep Freeze Server Standard搜索路径或未引用项目漏洞 - 详情 - - - - 6ecd0267814da4adb62f14c6a1c48f0f - CVE-2024-1227 - 2024-04-26 07:20:30 - Http File Server开放重定向漏洞 - 详情 - - - - a1600778d129a0c447a45bbde25884b5 - CVE-2024-1226 - 2024-04-26 07:20:30 - Http File Server CRLF注入漏洞 - 详情 - - - - 2a586ec1f28ec75370b064aa17fb333a - CVE-2023-48788 - 2024-04-26 07:20:30 - Fortinet FortiClientEMS SQL注入漏洞 - 详情 - - - - 5f1ab7572abd140cc5d4cb38476ad384 - CVE-2023-47534 - 2024-04-26 07:20:30 - Fortinet FortiClientEMS方案元素中和错误漏洞 - 详情 - - - - c82812cb91e6b7b82d8b1d589fbfdf26 - CVE-2023-46717 - 2024-04-26 07:20:30 - Fortinet FortiOS身份认证错误漏洞 - 详情 - - - - 29768d71d5fcf048afc667e56037516f - CVE-2023-42790 - 2024-04-26 07:20:30 - Fortinet FortiOS和FortiProxy堆栈缓冲区溢出漏洞 - 详情 - - - - 497b8b7cdbea4dc1f5e554832ea3c469 - CVE-2023-42789 - 2024-04-26 07:20:30 - Fortinet FortiOS和FortiProxy越界写入漏洞 - 详情 - - - - 16d3d2d8e7cce53953184bbd3ab571bc - CVE-2023-41842 - 2024-04-26 07:20:30 - Fortinet多款产品外部控制格式字符串使用漏洞 - 详情 - - - - 58e488b3384328999b2af5f3aa267b50 - CVE-2023-36554 - 2024-04-26 07:20:30 - Fortinet FortiManager访问控制错误漏洞 - 详情 - -