Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 22, 2024
1 parent 53d842b commit 510d832
Show file tree
Hide file tree
Showing 3 changed files with 29 additions and 26 deletions.
3 changes: 3 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -193,3 +193,6 @@ ac77f3cead537a103874c237a8624b24
7c668323ff4194aab4e19ef2ade21408
6f087b9e30a74d687b532426ec7d8bd7
739b44c48f36ff3508f9d49243117877
8dbbe65f0afd67a88aa5ecc69e69ae6e
a5e46d81ab76b41d946ad7431be9f343
a1f5c2cc0734d3feb49353c40840f85d
Binary file modified data/cves.db
Binary file not shown.
52 changes: 26 additions & 26 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-21 23:23:14 -->
<!-- RELEASE TIME : 2024-02-22 03:23:28 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -446,79 +446,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>5406867c009510f8d60ac78516fb9366</td>
<td>CVE-2024-25366</td>
<td>2024-02-20 16:15:10 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:10</td>
<td>Buffer Overflow vulnerability in mz-automation.de libiec61859 v.1.4.0 allows a remote attacker to cause a denial of service via the mmsServer_handleGetNameListRequest function to the mms_getnamelist_service component.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25366">详情</a></td>
</tr>

<tr>
<td>2bade33c31b436ccd4b0913e7dabf44c</td>
<td>CVE-2024-25274</td>
<td>2024-02-20 16:15:10 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:10</td>
<td>An arbitrary file upload vulnerability in the component /sysFile/upload of Novel-Plus v4.3.0-RC1 allows attackers to execute arbitrary code via uploading a crafted file.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-25274">详情</a></td>
</tr>

<tr>
<td>264b0de1c3bcf616c7ded78c8d6a4e5d</td>
<td>CVE-2024-23809</td>
<td>2024-02-20 16:15:10 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:10</td>
<td>A double-free vulnerability exists in the BrainVision ASCII Header Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23809">详情</a></td>
</tr>

<tr>
<td>b1673ac05e411e3959880d9906bd0005</td>
<td>CVE-2024-23606</td>
<td>2024-02-20 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:09</td>
<td>An out-of-bounds write vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23606">详情</a></td>
</tr>

<tr>
<td>051dcc95a62c7f2c1f5e2d3850c0f84d</td>
<td>CVE-2024-23313</td>
<td>2024-02-20 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:09</td>
<td>An integer underflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23313">详情</a></td>
</tr>

<tr>
<td>dd189b600a7fc615c567c74ee9e2bff7</td>
<td>CVE-2024-23310</td>
<td>2024-02-20 16:15:09 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:09</td>
<td>A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23310">详情</a></td>
</tr>

<tr>
<td>ae76cc89624f9fc10e6713d9ba3aacdb</td>
<td>CVE-2024-23305</td>
<td>2024-02-20 16:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:08</td>
<td>An out-of-bounds write vulnerability exists in the BrainVisionMarker Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vmrk file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-23305">详情</a></td>
</tr>

<tr>
<td>80caf5cf00cffdeb61c6dcfba2ad4185</td>
<td>CVE-2024-22097</td>
<td>2024-02-20 16:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:08</td>
<td>A double-free vulnerability exists in the BrainVision Header Parsing functionality of The Biosig Project libbiosig Master Branch (ab0ee111) and 2.5.0. A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-22097">详情</a></td>
</tr>

<tr>
<td>730cca7c11768c0c2cfb4b6966e72be8</td>
<td>CVE-2024-21812</td>
<td>2024-02-20 16:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:08</td>
<td>An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21812">详情</a></td>
</tr>

<tr>
<td>aef9445589ad1fe2c596dddbc16dab7a</td>
<td>CVE-2024-21795</td>
<td>2024-02-20 16:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-20 16:15:08</td>
<td>A heap-based buffer overflow vulnerability exists in the .egi parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .egi file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-21795">详情</a></td>
</tr>
Expand Down Expand Up @@ -2094,119 +2094,119 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>bd549d021ead1b9084f64e5d4cc08e2a</td>
<td>CVE-2023-47126</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>TYPO3信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90612">详情</a></td>
</tr>

<tr>
<td>f574b5d2ff22dee5ebbb5685e90153e8</td>
<td>CVE-2023-47127</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>TYPO3身份认证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90611">详情</a></td>
</tr>

<tr>
<td>d2d4430c1880c00e1c59f24c14e67c87</td>
<td>CVE-2023-47384</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>GPAC内存泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90610">详情</a></td>
</tr>

<tr>
<td>d9609415f24811936d438d419a6733e2</td>
<td>CVE-2023-47130</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Yii远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90609">详情</a></td>
</tr>

<tr>
<td>06a8a8f13ba989e5763f6a7502a412b8</td>
<td>CVE-2023-47630</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Kyverno数据真实性验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90608">详情</a></td>
</tr>

<tr>
<td>7f8e60192fbcfd41b4fa9af7b390fdac</td>
<td>CVE-2023-47640</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>DataHub加密算法使用错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90607">详情</a></td>
</tr>

<tr>
<td>00d7e8c0843cc21375b8981e62edbdf8</td>
<td>CVE-2023-47641</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>aiohttp HTTP请求走私漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90606">详情</a></td>
</tr>

<tr>
<td>b4db3b5b9a61c0185aa6d4e31e4f2c9a</td>
<td>CVE-2023-5528</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Kubernetes输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90605">详情</a></td>
</tr>

<tr>
<td>215cf843535b7378797de1016b553bc9</td>
<td>CVE-2022-45781</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Tenda AX1803缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90604">详情</a></td>
</tr>

<tr>
<td>f4d779ae9882a0ed118f5db28fff9b6f</td>
<td>CVE-2023-39535</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>AMI AptioV输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90603">详情</a></td>
</tr>

<tr>
<td>a5d1f0ef1eb4d45433ee1e4f4d2b4213</td>
<td>CVE-2023-39536</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>AMI AptioV输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90602">详情</a></td>
</tr>

<tr>
<td>b9a32f50d79da0f254f6d65bdf96dbf9</td>
<td>CVE-2023-39537</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>AMI AptioV输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90601">详情</a></td>
</tr>

<tr>
<td>f77828807f921b7d36f19740be935fca</td>
<td>CVE-2023-46022</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Blood Bank SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90600">详情</a></td>
</tr>

<tr>
<td>29bb5b6ba3ed4b7afee13d5c7a37267a</td>
<td>CVE-2023-46023</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Simple Task List SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90599">详情</a></td>
</tr>

<tr>
<td>da4b415c06d0d6f96bed59bc092e1788</td>
<td>CVE-2023-46024</td>
<td>2024-02-20 09:20:24 <img src="imgs/new.gif" /></td>
<td>2024-02-20 09:20:24</td>
<td>Simple Task List SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90598">详情</a></td>
</tr>
Expand Down

0 comments on commit 510d832

Please sign in to comment.