Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Dec 31, 2024
1 parent 2b31267 commit 459e8b9
Show file tree
Hide file tree
Showing 3 changed files with 96 additions and 81 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -182,3 +182,18 @@ ea5c23829ee70d2421e633a05dbbdee3
017257468ccbdee7353e0f9e33d0aa11
f5c5d95d8ffdfe41fa42084ca12dd157
0e2b9010b6a894e3ff8a7ee742a21c30
ddb5fdedaa8b808323d10b4e7977bf3f
86955874d0764ee43c833eb434b66927
b339b6ea3050b20b25a567e780bbd0bf
e0f93cfcd7c01bd9d896e86f7036af45
bf5ea0a7d5bc98f17c9362df79984aef
e86dbaa3bef233d1a2ba338ae9565012
279b6a155f80e287d684e113e40e69dd
a0cce354836c03602c87ca935e439c7c
7cca549955535ee5825d9409d19c62c6
b8ddf912db773e2b4286a68820e92316
d01e8aad850d6abc84be14ce036fa725
b3f973df77d817d22542b2b29f4b0233
5a640ef4ff4e42bab888d5b015dec895
f8a4e4965bcbf8a58d1e4eb3cae50ea3
67f229a4175923ddc7bd3852954487ec
Binary file modified data/cves.db
Binary file not shown.
162 changes: 81 additions & 81 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-12-30 12:44:11 -->
<!-- RELEASE TIME : 2024-12-31 03:27:21 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -334,39 +334,39 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>e07499f1d7af68cb81536ec240e5ad2a</td>
<td>CVE-2024-13028</td>
<td>2024-12-29 23:15:06 <img src="imgs/new.gif" /></td>
<td>2024-12-29 23:15:06</td>
<td>A vulnerability, which was classified as problematic, has been found in Antabot White-Jotter up to 0.2.2. This issue affects some unknown processing of the file /login. The manipulation of the argument username leads to observable response discrepancy. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-13028">详情</a></td>
</tr>

<tr>
<td>5cd41072d32fe793e83f8b1ed83048cb</td>
<td>CVE-2024-13025</td>
<td>2024-12-29 23:15:05 <img src="imgs/new.gif" /></td>
<td>2024-12-29 23:15:05</td>
<td>A vulnerability was found in Codezips College Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /Front-end/faculty.php. The manipulation of the argument book_name/book_author leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-13025">详情</a></td>
</tr>

<tr>
<td>c06e13e6f35a75502de6098c34ed930c</td>
<td>CVE-2024-13024</td>
<td>2024-12-29 21:15:06 <img src="imgs/new.gif" /></td>
<td>2024-12-29 21:15:06</td>
<td>A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /campaign.php. The manipulation of the argument cname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-13024">详情</a></td>
</tr>

<tr>
<td>9ae627d0718c86c9ff2ff9d54b822bd2</td>
<td>CVE-2024-13023</td>
<td>2024-12-29 21:15:06 <img src="imgs/new.gif" /></td>
<td>2024-12-29 21:15:06</td>
<td>A vulnerability has been found in PHPGurukul Maid Hiring Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/search-maid.php of the component Search Maid Page. The manipulation of the argument searchdata leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-13023">详情</a></td>
</tr>

<tr>
<td>12dc1f7fb3f0c204cc55e51109f489a2</td>
<td>CVE-2024-12999</td>
<td>2024-12-29 02:15:17 <img src="imgs/new.gif" /></td>
<td>2024-12-29 02:15:17</td>
<td>A vulnerability has been found in PHPGurukul Small CRM 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12999">详情</a></td>
</tr>
Expand Down Expand Up @@ -2108,123 +2108,123 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>56f2c6fc78d0efa49aa6021c9df668a4</td>
<td>CVE-2024-9515</td>
<td>2024-12-27 09:22:18</td>
<td>D-Link DIR-605L缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109041">详情</a></td>
<td>ddb5fdedaa8b808323d10b4e7977bf3f</td>
<td>CVE-2024-41860</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Adobe Substance 3D Sampler越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109110">详情</a></td>
</tr>

<tr>
<td>c4d16055659e462d2c48f0b4021fe48c</td>
<td>CVE-2024-9482</td>
<td>2024-12-27 09:22:18</td>
<td>Avast Antivirus越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109040">详情</a></td>
<td>86955874d0764ee43c833eb434b66927</td>
<td>CVE-2023-40067</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel CSME权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109109">详情</a></td>
</tr>

<tr>
<td>fccb14ad691162834be56963edf7ea5d</td>
<td>CVE-2024-52524</td>
<td>2024-12-27 09:22:18</td>
<td>Giskard远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109039">详情</a></td>
<td>b339b6ea3050b20b25a567e780bbd0bf</td>
<td>CVE-2023-42667</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel Core Ultra Processors权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109108">详情</a></td>
</tr>

<tr>
<td>e34dd077733690b0922e23ecf319fa11</td>
<td>CVE-2024-6400</td>
<td>2024-12-27 09:22:18</td>
<td>Finrota Netahsilat信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109038">详情</a></td>
<td>e0f93cfcd7c01bd9d896e86f7036af45</td>
<td>CVE-2023-43747</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel Connectivity Performance Suite权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109107">详情</a></td>
</tr>

<tr>
<td>97c165835c1c572c7f633bd5b71e8ecd</td>
<td>CVE-2024-3760</td>
<td>2024-12-27 09:22:18</td>
<td>lunary-ai/lunary邮件轰炸漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109037">详情</a></td>
<td>bf5ea0a7d5bc98f17c9362df79984aef</td>
<td>CVE-2023-48361</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel CSME信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109106">详情</a></td>
</tr>

<tr>
<td>238ba36aa62ca58c591e1353ae475595</td>
<td>CVE-2024-10394</td>
<td>2024-12-27 09:22:18</td>
<td>OpenAFS整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109036">详情</a></td>
<td>e86dbaa3bef233d1a2ba338ae9565012</td>
<td>CVE-2023-43489</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel CIP拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109105">详情</a></td>
</tr>

<tr>
<td>a3cc9ef1cca9d49e3bc4b9f3028dbf6d</td>
<td>CVE-2024-10396</td>
<td>2024-12-27 09:22:18</td>
<td>OpenAFS输入句法正确性验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109035">详情</a></td>
<td>279b6a155f80e287d684e113e40e69dd</td>
<td>CVE-2023-38655</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel AMT and Intel Standard Manageability缓冲区限制不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109104">详情</a></td>
</tr>

<tr>
<td>e68ffe87729d7017f3b7aeafcd2c2c52</td>
<td>CVE-2024-5125</td>
<td>2024-12-27 09:22:18</td>
<td>parisneo/lollms-webui跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109034">详情</a></td>
<td>a0cce354836c03602c87ca935e439c7c</td>
<td>CVE-2023-35123</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel Server Platforms拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109103">详情</a></td>
</tr>

<tr>
<td>3fd4c8c0e96e04fff0b0e94fe3ef459d</td>
<td>CVE-2024-10397</td>
<td>2024-12-27 09:22:18</td>
<td>OpenAFS越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109033">详情</a></td>
<td>7cca549955535ee5825d9409d19c62c6</td>
<td>CVE-2023-34424</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Intel CSME输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109102">详情</a></td>
</tr>

<tr>
<td>70c050cb79c00b22a02ec6f349226bd3</td>
<td>CVE-2024-31695</td>
<td>2024-12-27 09:22:18</td>
<td>Binance授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109032">详情</a></td>
<td>b8ddf912db773e2b4286a68820e92316</td>
<td>CVE-2024-39401</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Adobe Commerce操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109101">详情</a></td>
</tr>

<tr>
<td>145933393ea471d8f0b43dd0cf7c64ef</td>
<td>CVE-2024-47657</td>
<td>2024-12-27 09:22:18</td>
<td>Shilpi Net Back Office访问控制不当漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109031">详情</a></td>
<td>d01e8aad850d6abc84be14ce036fa725</td>
<td>CVE-2024-39400</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Adobe Commerce基于DOM的跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109100">详情</a></td>
</tr>

<tr>
<td>c232b804812eb96ce60b00defe5d06d4</td>
<td>CVE-2024-48971</td>
<td>2024-12-27 09:22:18</td>
<td>Baxter Life2000硬编码凭据使用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109030">详情</a></td>
<td>b3f973df77d817d22542b2b29f4b0233</td>
<td>CVE-2024-39399</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Adobe Commerce路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109099">详情</a></td>
</tr>

<tr>
<td>98a073dfca2bfc849c735d82342bf400</td>
<td>CVE-2024-48973</td>
<td>2024-12-27 09:22:18</td>
<td>Baxter Life2000物理访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109029">详情</a></td>
<td>5a640ef4ff4e42bab888d5b015dec895</td>
<td>CVE-2024-39398</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Adobe Commerce身份认证次数限制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109098">详情</a></td>
</tr>

<tr>
<td>a1d55738ad07b48638339e68e433708d</td>
<td>CVE-2024-48974</td>
<td>2024-12-27 09:22:18</td>
<td>Baxter Life2000信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109028">详情</a></td>
<td>f8a4e4965bcbf8a58d1e4eb3cae50ea3</td>
<td>CVE-2024-39397</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Adobe Commerce任意文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109097">详情</a></td>
</tr>

<tr>
<td>4aa2d5ebc3d40632a6d8afe45d94534d</td>
<td>CVE-2024-44016</td>
<td>2024-12-27 09:22:18</td>
<td>WordPress plugin Podiant路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109027">详情</a></td>
<td>67f229a4175923ddc7bd3852954487ec</td>
<td>CVE-2024-38483</td>
<td>2024-12-30 03:25:13 <img src="imgs/new.gif" /></td>
<td>Dell BIOS输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109096">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit 459e8b9

Please sign in to comment.