Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 21, 2024
1 parent 014a86f commit 1d92a4c
Show file tree
Hide file tree
Showing 3 changed files with 136 additions and 121 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -155,3 +155,18 @@ b9a32f50d79da0f254f6d65bdf96dbf9
f77828807f921b7d36f19740be935fca
29bb5b6ba3ed4b7afee13d5c7a37267a
da4b415c06d0d6f96bed59bc092e1788
f4fafc06411bd9ee36844b8f5060ab67
b847c203363e73e01c3a176ec1bb793d
01e8ecbc28775660a0d44283f7859372
993ed3f6e7aa9679a4de69902b5752d1
b7e60da24d9a67668dda29954114e426
952a9461d21b8aac18b18a1d670550b1
f649555330f4302f724e32a6c97debc7
015f4918b1214d113eea9ff972935a4a
bf65a0f5edab03a508d14ec104392a79
45c94f76df3189b4dca2cc0db32b2efe
e2d748abab98231c5e315432ed52b81a
12908fc9ea074ff2a8da552d4c0f8a5b
8973bad5c459e9f44d10277d6c689dfb
8f12a9f117ccf3553015990a1a02066a
211b77da24e96cacb81e05ad2129a6b6
Binary file modified data/cves.db
Binary file not shown.
242 changes: 121 additions & 121 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-21 04:26:29 -->
<!-- RELEASE TIME : 2024-02-21 09:24:45 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -1971,6 +1971,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>f4fafc06411bd9ee36844b8f5060ab67</td>
<td>CVE-2023-32660</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel NUC不受控制的搜索路径漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90662">详情</a></td>
</tr>

<tr>
<td>b847c203363e73e01c3a176ec1bb793d</td>
<td>CVE-2023-32661</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel NUC身份认证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90661">详情</a></td>
</tr>

<tr>
<td>01e8ecbc28775660a0d44283f7859372</td>
<td>CVE-2023-32662</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Battery Life Diagnostic Tool授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90660">详情</a></td>
</tr>

<tr>
<td>993ed3f6e7aa9679a4de69902b5752d1</td>
<td>CVE-2023-32701</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Blackberry QNX SDP输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90659">详情</a></td>
</tr>

<tr>
<td>b7e60da24d9a67668dda29954114e426</td>
<td>CVE-2023-33872</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Support访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90658">详情</a></td>
</tr>

<tr>
<td>952a9461d21b8aac18b18a1d670550b1</td>
<td>CVE-2023-33874</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel NUC不受控制的搜索路径漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90657">详情</a></td>
</tr>

<tr>
<td>f649555330f4302f724e32a6c97debc7</td>
<td>CVE-2023-33878</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel NUC Software路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90656">详情</a></td>
</tr>

<tr>
<td>015f4918b1214d113eea9ff972935a4a</td>
<td>CVE-2023-34314</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Simics Simulator权限分配错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90655">详情</a></td>
</tr>

<tr>
<td>bf65a0f5edab03a508d14ec104392a79</td>
<td>CVE-2023-34350</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel XTU Software不受控制的搜索路径元素漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90654">详情</a></td>
</tr>

<tr>
<td>45c94f76df3189b4dca2cc0db32b2efe</td>
<td>CVE-2023-34430</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Battery Life Diagnostic Tool不受控制的搜索路径漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90653">详情</a></td>
</tr>

<tr>
<td>e2d748abab98231c5e315432ed52b81a</td>
<td>CVE-2023-34431</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Server Board输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90652">详情</a></td>
</tr>

<tr>
<td>12908fc9ea074ff2a8da552d4c0f8a5b</td>
<td>CVE-2023-34997</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Server Configuration Utility Software权限分配错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90651">详情</a></td>
</tr>

<tr>
<td>8973bad5c459e9f44d10277d6c689dfb</td>
<td>CVE-2023-36860</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Unison输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90650">详情</a></td>
</tr>

<tr>
<td>8f12a9f117ccf3553015990a1a02066a</td>
<td>CVE-2023-38131</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Unison输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90649">详情</a></td>
</tr>

<tr>
<td>211b77da24e96cacb81e05ad2129a6b6</td>
<td>CVE-2023-38411</td>
<td>2024-02-21 09:22:36 <img src="imgs/new.gif" /></td>
<td>Intel Smart Campus Android Application访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90648">详情</a></td>
</tr>

<tr>
<td>bd549d021ead1b9084f64e5d4cc08e2a</td>
<td>CVE-2023-47126</td>
Expand Down Expand Up @@ -2091,126 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90598">详情</a></td>
</tr>

<tr>
<td>dc2a7ba4673c561c437cedf1370f69d9</td>
<td>CVE-2024-1284</td>
<td>2024-02-14 05:24:18</td>
<td>Google Chromium堆缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90561">详情</a></td>
</tr>

<tr>
<td>aed34ed84e9689594530e1ba95c7f7a0</td>
<td>CVE-2024-21358</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90560">详情</a></td>
</tr>

<tr>
<td>67cc6d69de8dfd8cb23ee5f0497e9781</td>
<td>CVE-2024-21356</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Lightweight Directory Access Protocol拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90559">详情</a></td>
</tr>

<tr>
<td>a6ab64cf92b588817dae14488ff3fdf4</td>
<td>CVE-2024-21355</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Message Queuing (MSMQ)权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90558">详情</a></td>
</tr>

<tr>
<td>309e423b19f949e78cb92b17a40545fd</td>
<td>CVE-2024-21354</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Message Queuing (MSMQ)权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90557">详情</a></td>
</tr>

<tr>
<td>e71d52d31e5cce9c2bc1dfa2bc23e4fa</td>
<td>CVE-2024-21353</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC ODBC Driver远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90556">详情</a></td>
</tr>

<tr>
<td>a19bf240d70d6d340d80a9588071291c</td>
<td>CVE-2024-21360</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90555">详情</a></td>
</tr>

<tr>
<td>0131434d65045fc8aa66929ae5359b09</td>
<td>CVE-2024-21361</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90554">详情</a></td>
</tr>

<tr>
<td>931b5c633543d599912f00559d246ccb</td>
<td>CVE-2024-21362</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Kernel安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90553">详情</a></td>
</tr>

<tr>
<td>c17dd078889a4e60f30e38496eca735e</td>
<td>CVE-2024-21363</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Message Queuing (MSMQ)远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90552">详情</a></td>
</tr>

<tr>
<td>b250bda539d5e13b778552c1e04877f0</td>
<td>CVE-2024-21364</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Azure Site Recovery权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90551">详情</a></td>
</tr>

<tr>
<td>00af3e3b4a05c6ccd5d4f1ffc43f4b03</td>
<td>CVE-2024-21365</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90550">详情</a></td>
</tr>

<tr>
<td>056f0d20f071968db9c829e47ffdbce7</td>
<td>CVE-2024-21366</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90549">详情</a></td>
</tr>

<tr>
<td>fd7376cde66e722990e75e8144321522</td>
<td>CVE-2024-20673</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Office远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90548">详情</a></td>
</tr>

<tr>
<td>139b8df1c5583280bb82f6b2f1b9599f</td>
<td>CVE-2024-20667</td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Azure DevOps Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90547">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 1d92a4c

Please sign in to comment.