Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 28, 2024
1 parent f951541 commit 3cf990e
Show file tree
Hide file tree
Showing 3 changed files with 144 additions and 129 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -153,3 +153,18 @@ a1cf0dadbdc17d13237008d537ad06c3
59edf31d2840f8e94d6597a7950b522d
6f32c49c1598e6bdad8908cc8c76bb74
f74c209d7d7252266d529060c83d972f
a2463fffefe91aec8e124763540bbda4
51ebbec81080d544c0daf1b3fd51e6df
6e74bed1fd2c74b560b16d8572c8e95d
5431232f13d908e0085502d1fc9f3601
9de6b1ff92152d03681ec173fd6cdc58
3bc4d33fd54cb74fc0208f6a74ca08d1
c3cab1953951e3aebe7f0735db470d47
775cf0659caddbd633b5419904436f0a
f13dd22b20789bbcf68b7dbd7d1e65c1
ff2d8ccb968e7c9c225f92c2e1fdc653
d7ea38e6da8f928cd1b8f7df93c4fcb3
9fae8be3fe57b3fbbcca2fdba79a24a3
1871c659553f85e0bec49c03cb14c099
c1bae505d5850debc153af1d5434729f
f58581ecff1ee73dc13096bbf121156a
Binary file modified data/cves.db
Binary file not shown.
258 changes: 129 additions & 129 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-10-27 03:31:21 -->
<!-- RELEASE TIME : 2024-10-28 03:32:50 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -302,63 +302,63 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>1380df092970ad56239d8cf45d1c0d7f</td>
<td>CVE-2024-10406</td>
<td>2024-10-26 22:15:02 <img src="imgs/new.gif" /></td>
<td>2024-10-26 22:15:02</td>
<td>A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_fuel.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-10406">详情</a></td>
</tr>

<tr>
<td>d9719476d79694ee7d821c73d87e9b33</td>
<td>CVE-2020-26311</td>
<td>2024-10-26 21:15:14 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:14</td>
<td>Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26311">详情</a></td>
</tr>

<tr>
<td>76b40fc2f8e3d8495d32dfc41385fdf5</td>
<td>CVE-2020-26310</td>
<td>2024-10-26 21:15:14 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:14</td>
<td>Validate.js provides a declarative way of validating javascript objects. All versions as of 30 November 2020 contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26310">详情</a></td>
</tr>

<tr>
<td>57e10eca9b11b2a371c510abf68e118c</td>
<td>CVE-2020-26309</td>
<td>2024-10-26 21:15:14 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:14</td>
<td>Validate.js provides a declarative way of validating javascript objects. Versions 0.11.3 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, it is unknown if any patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26309">详情</a></td>
</tr>

<tr>
<td>0d70122ce767cc3a2a440f17fabb942d</td>
<td>CVE-2020-26308</td>
<td>2024-10-26 21:15:14 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:14</td>
<td>Validate.js provides a declarative way of validating javascript objects. Versions 0.13.1 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26308">详情</a></td>
</tr>

<tr>
<td>1f779862d0961669d55291ac270dbb69</td>
<td>CVE-2020-26307</td>
<td>2024-10-26 21:15:13 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:13</td>
<td>HTML2Markdown is a Javascript implementation for converting HTML to Markdown text. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26307">详情</a></td>
</tr>

<tr>
<td>14316d4906d95d389ddf87c58462978c</td>
<td>CVE-2020-26306</td>
<td>2024-10-26 21:15:13 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:13</td>
<td>Knwl.js is a Javascript library that parses through text for dates, times, phone numbers, emails, places, and more. Versions 1.0.2 and prior contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26306">详情</a></td>
</tr>

<tr>
<td>70106e00d2a08844b0f30fb62527aad1</td>
<td>CVE-2020-26305</td>
<td>2024-10-26 21:15:13 <img src="imgs/new.gif" /></td>
<td>2024-10-26 21:15:13</td>
<td>CommonRegexJS is a CommonRegex port for JavaScript. All available versions contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no known patches are available.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2020-26305">详情</a></td>
</tr>
Expand Down Expand Up @@ -1979,6 +1979,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>a2463fffefe91aec8e124763540bbda4</td>
<td>CVE-2024-22269</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>VMware Workstation信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103643">详情</a></td>
</tr>

<tr>
<td>51ebbec81080d544c0daf1b3fd51e6df</td>
<td>CVE-2024-25965</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Dell PowerScale OneFS外部控制漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103642">详情</a></td>
</tr>

<tr>
<td>6e74bed1fd2c74b560b16d8572c8e95d</td>
<td>CVE-2024-25966</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Dell PowerScale OneFS意外数据类型处理不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103641">详情</a></td>
</tr>

<tr>
<td>5431232f13d908e0085502d1fc9f3601</td>
<td>CVE-2024-25967</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Dell PowerScale OneFS权限执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103640">详情</a></td>
</tr>

<tr>
<td>9de6b1ff92152d03681ec173fd6cdc58</td>
<td>CVE-2024-22270</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>VMware Workstation信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103639">详情</a></td>
</tr>

<tr>
<td>3bc4d33fd54cb74fc0208f6a74ca08d1</td>
<td>CVE-2024-1628</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>GE HealthCare ultrasound devices操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103638">详情</a></td>
</tr>

<tr>
<td>c3cab1953951e3aebe7f0735db470d47</td>
<td>CVE-2024-1914</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>OmniCore robot代码问题漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103637">详情</a></td>
</tr>

<tr>
<td>775cf0659caddbd633b5419904436f0a</td>
<td>CVE-2024-8366</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Code-Projects Pharmacy Management System跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103636">详情</a></td>
</tr>

<tr>
<td>f13dd22b20789bbcf68b7dbd7d1e65c1</td>
<td>CVE-2024-1598</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Phoenix Technologies GeminiLake缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103635">详情</a></td>
</tr>

<tr>
<td>ff2d8ccb968e7c9c225f92c2e1fdc653</td>
<td>CVE-2024-1486</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>General Electric Healthcare Ultrasound权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103634">详情</a></td>
</tr>

<tr>
<td>d7ea38e6da8f928cd1b8f7df93c4fcb3</td>
<td>CVE-2024-0870</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>WordPress plugin YITH WooCommerce Gift Cards未授权的数据修改漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103633">详情</a></td>
</tr>

<tr>
<td>9fae8be3fe57b3fbbcca2fdba79a24a3</td>
<td>CVE-2024-0762</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>Phoenix SecureCore缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103632">详情</a></td>
</tr>

<tr>
<td>1871c659553f85e0bec49c03cb14c099</td>
<td>CVE-2024-22268</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>VMware Workstation缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103631">详情</a></td>
</tr>

<tr>
<td>c1bae505d5850debc153af1d5434729f</td>
<td>CVE-2024-22267</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>VMware Workstation内存释放后重用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103630">详情</a></td>
</tr>

<tr>
<td>f58581ecff1ee73dc13096bbf121156a</td>
<td>CVE-2023-6812</td>
<td>2024-10-28 03:30:42 <img src="imgs/new.gif" /></td>
<td>WordPress plugin WP Compress开放重定向漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103629">详情</a></td>
</tr>

<tr>
<td>ca1efd6e16d2a6389810f4377ab28dfa</td>
<td>CVE-2024-38882</td>
Expand Down Expand Up @@ -2099,126 +2219,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103539">详情</a></td>
</tr>

<tr>
<td>f717a38ad76c35b5102241e191c1933a</td>
<td>CVE-2024-33499</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens SIMATIC RTLS权限错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103596">详情</a></td>
</tr>

<tr>
<td>d6077d0ff6323a39575204890417de53</td>
<td>CVE-2024-33498</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens SIMATIC RTLS资源管理错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103595">详情</a></td>
</tr>

<tr>
<td>9c006b975cbcb96cee7e3d1b302b3945</td>
<td>CVE-2024-33497</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens SIMATIC RTLS身份验证凭据错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103594">详情</a></td>
</tr>

<tr>
<td>5d710f2926e290e6f515c4b3d1870e5c</td>
<td>CVE-2024-33494</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens SIMATIC RTLS数据伪造问题漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103593">详情</a></td>
</tr>

<tr>
<td>4626c7330c218a6fca59cc5c6e0477fd</td>
<td>CVE-2024-33493</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens Solid Edge越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103592">详情</a></td>
</tr>

<tr>
<td>dd2dbdf0b271434176b1d045051204f6</td>
<td>CVE-2024-33489</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens Solid Edge堆栈缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103591">详情</a></td>
</tr>

<tr>
<td>2d620e8891941d7899c437c34e594a3c</td>
<td>CVE-2024-33009</td>
<td>2024-10-24 03:28:41</td>
<td>SAP Global Label Management SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103590">详情</a></td>
</tr>

<tr>
<td>be25573e6141089f631fc57eb26bb15a</td>
<td>CVE-2024-33008</td>
<td>2024-10-24 03:28:41</td>
<td>SAP LT Replication Server内存损坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103589">详情</a></td>
</tr>

<tr>
<td>a1cf0dadbdc17d13237008d537ad06c3</td>
<td>CVE-2024-33006</td>
<td>2024-10-24 03:28:41</td>
<td>SAP NetWeaver Application Server ABAP Platform代码问题漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103588">详情</a></td>
</tr>

<tr>
<td>491c2edbdc14a5340fd647423468f8e4</td>
<td>CVE-2024-33004</td>
<td>2024-10-24 03:28:41</td>
<td>SAP Business Objects Business Intelligence Platform信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103587">详情</a></td>
</tr>

<tr>
<td>17bc5ab24ab599fbc37a0791e20efa1c</td>
<td>CVE-2024-33002</td>
<td>2024-10-24 03:28:41</td>
<td>SAP S/4 HANA跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103586">详情</a></td>
</tr>

<tr>
<td>63aa80abfd7994c3d561e8e9990bb92f</td>
<td>CVE-2024-33000</td>
<td>2024-10-24 03:28:41</td>
<td>SAP Bank Account Management权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103585">详情</a></td>
</tr>

<tr>
<td>59edf31d2840f8e94d6597a7950b522d</td>
<td>CVE-2024-32977</td>
<td>2024-10-24 03:28:41</td>
<td>OctoPrint身份验证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103584">详情</a></td>
</tr>

<tr>
<td>6f32c49c1598e6bdad8908cc8c76bb74</td>
<td>CVE-2024-32741</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens SIMATIC CN硬编码密码包含漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103583">详情</a></td>
</tr>

<tr>
<td>f74c209d7d7252266d529060c83d972f</td>
<td>CVE-2024-32740</td>
<td>2024-10-24 03:28:41</td>
<td>Siemens SIMATIC CN信任管理问题漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/103582">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 3cf990e

Please sign in to comment.