Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Dec 4, 2024
1 parent 6e48354 commit 1c19ab1
Show file tree
Hide file tree
Showing 3 changed files with 51 additions and 36 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -180,3 +180,18 @@ f798b76651f3ba259a71cd2395b9f0d1
55ccb74233bf64196dfdaba80f38bfee
b833f17140d10529bd4a01ef15cae2f1
56a21ab913beae9f6145e1aa21a2dc33
c4e1baa79cf6b9158ea98ee462f8c70f
2df51509e2f4b82fa5e386a770de0e2f
bff52fe10bae46dc00076a7b6b3fe746
af4ea86422b4b19ed201598c973e6f26
be35c97c396646810104f7e77ca225f9
82121ca89fc1a9d44c1fe1bd7fde4fcf
61ac405810794fa6f56427e0d570a9b9
c7c599896b9b897d2c1e100cd059ab24
e8017315d9e3096ae04c7f8dcbb6fdbc
28a0e1280fffca78e65dd15494a1f8a8
eede60b9f986f939bef73fac48868620
083f4cfb3628dba131455df887d19872
4d28d177338299ae098a50c4eb9c65f5
b9727c1b61cf5add693029afdfd7c39f
419056dde31fb1b847e5dd6fa89efe9b
Binary file modified data/cves.db
Binary file not shown.
72 changes: 36 additions & 36 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-12-03 15:27:26 -->
<!-- RELEASE TIME : 2024-12-04 03:38:39 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,79 +366,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>9eef9e4c58ecb068948eedfd18f8b78e</td>
<td>CVE-2024-43053</td>
<td>2024-12-02 11:15:09 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:09</td>
<td>Memory corruption while invoking IOCTL calls from user space to read WLAN target diagnostic information.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-43053">详情</a></td>
</tr>

<tr>
<td>5d2fd953cf563cc88c8eb541f69d5c21</td>
<td>CVE-2024-43052</td>
<td>2024-12-02 11:15:09 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:09</td>
<td>Memory corruption while processing API calls to NPU with invalid input.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-43052">详情</a></td>
</tr>

<tr>
<td>4a3c6c69747353b7a2ed58e027918e77</td>
<td>CVE-2024-43050</td>
<td>2024-12-02 11:15:09 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:09</td>
<td>Memory corruption while invoking IOCTL calls from user space to issue factory test command inside WLAN driver.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-43050">详情</a></td>
</tr>

<tr>
<td>7b23dc8ca4111c4d46777f9773150cf2</td>
<td>CVE-2024-43049</td>
<td>2024-12-02 11:15:09 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:09</td>
<td>Memory corruption while invoking IOCTL calls from user space to set generic private command inside WLAN driver.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-43049">详情</a></td>
</tr>

<tr>
<td>671f6d434e1a923bd4561520534095a7</td>
<td>CVE-2024-43048</td>
<td>2024-12-02 11:15:08 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:08</td>
<td>Memory corruption when invalid input is passed to invoke GPU Headroom API call.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-43048">详情</a></td>
</tr>

<tr>
<td>a1e78aae0651da44c30a1c0f51992e0b</td>
<td>CVE-2024-33063</td>
<td>2024-12-02 11:15:08 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:08</td>
<td>Transient DOS while parsing the ML IE when a beacon with common info length of the ML IE greater than the ML IE inside which this element is present.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-33063">详情</a></td>
</tr>

<tr>
<td>3ddfd47183b9acce752bfdd61c3e799a</td>
<td>CVE-2024-33056</td>
<td>2024-12-02 11:15:08 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:08</td>
<td>Memory corruption when allocating and accessing an entry in an SMEM partition continuously.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-33056">详情</a></td>
</tr>

<tr>
<td>f9b92434cf1c7361c700ba14eaddb396</td>
<td>CVE-2024-33053</td>
<td>2024-12-02 11:15:08 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:08</td>
<td>Memory corruption when multiple threads try to unregister the CVP buffer at the same time.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-33053">详情</a></td>
</tr>

<tr>
<td>97634203bad4b5af5e5af844a10ce76b</td>
<td>CVE-2024-33044</td>
<td>2024-12-02 11:15:08 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:08</td>
<td>Memory corruption while Configuring the SMR/S2CR register in Bypass mode.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-33044">详情</a></td>
</tr>

<tr>
<td>730ac473f60e953c00b3ef0bf4501f3c</td>
<td>CVE-2024-33040</td>
<td>2024-12-02 11:15:08 <img src="imgs/new.gif" /></td>
<td>2024-12-02 11:15:08</td>
<td>Memory corruption while invoking redundant release command to release one buffer from user space as race condition can occur in kernel space between buffer release and buffer access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-33040">详情</a></td>
</tr>
Expand Down Expand Up @@ -2188,43 +2188,43 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>2af419d8d74e2f9b4e99a1cbb0ded61a</td>
<td>CVE-2024-7886</td>
<td>2024-11-29 09:24:58</td>
<td>Scooter Software Beyond Compare不受控搜索路径漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107344">详情</a></td>
<td>c4e1baa79cf6b9158ea98ee462f8c70f</td>
<td>CVE-2024-49288</td>
<td>2024-12-03 03:36:32 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Email Template Customizer for WooCommerce跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107446">详情</a></td>
</tr>

<tr>
<td>6a531aaea8cf2fbcdb73bb49b5f8eb44</td>
<td>CVE-2024-43395</td>
<td>2024-11-29 09:24:58</td>
<td>CraftOS-PC 2混淆漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107343">详情</a></td>
<td>2df51509e2f4b82fa5e386a770de0e2f</td>
<td>CVE-2024-7755</td>
<td>2024-12-03 03:36:32 <img src="imgs/new.gif" /></td>
<td>HMS EWON FLEXY 202信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107445">详情</a></td>
</tr>

<tr>
<td>a029215c114c21d9c2b71438dce806e3</td>
<td>CVE-2024-43472</td>
<td>2024-11-29 09:24:58</td>
<td>Microsoft Edge权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107342">详情</a></td>
<td>bff52fe10bae46dc00076a7b6b3fe746</td>
<td>CVE-2024-10101</td>
<td>2024-12-03 03:36:32 <img src="imgs/new.gif" /></td>
<td>GPT Academic存储型跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107444">详情</a></td>
</tr>

<tr>
<td>25ae5698016933f4d0d59a1cd45476c1</td>
<td>CVE-2024-43042</td>
<td>2024-11-29 09:24:58</td>
<td>Pluck CMS暴力破解漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107341">详情</a></td>
<td>af4ea86422b4b19ed201598c973e6f26</td>
<td>CVE-2024-10100</td>
<td>2024-12-03 03:36:32 <img src="imgs/new.gif" /></td>
<td>binary-husky GPT Academic路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107443">详情</a></td>
</tr>

<tr>
<td>958157fb7aad5332abcc5c39e25d2f41</td>
<td>CVE-2024-43330</td>
<td>2024-11-29 09:24:58</td>
<td>WordPress插件PowerPack for Beaver Builder跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107340">详情</a></td>
<td>be35c97c396646810104f7e77ca225f9</td>
<td>CVE-2024-10099</td>
<td>2024-12-03 03:36:32 <img src="imgs/new.gif" /></td>
<td>comfyanonymous ComfyUI跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107442">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit 1c19ab1

Please sign in to comment.