From 558cb93c3625de29dc17de9a5bf74563ab02d0d7 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Mon, 23 Dec 2024 12:44:47 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 50585600 -> 50589696 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 74b50dbda33..0a33a4f1a62 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -155,3 +155,18 @@ c52b7b3da7db9b795f1aa606f19ce32c 8f90877c2a422d2d9d680dc04ba2592e b3e87252cdff4fcb5322568c0a35ad0c d8c6657e25395276ef58426a0e57d4a9 +29a3df780bfdbf90601bb5bea8abf143 +7e2cf76ec7aa5a5db2596d63a52628a2 +bf58db5ff8d8748b287ccfb580a0c524 +5e0b60405b7f62aca6ade27753902132 +6a06086b6f98eef65783dc42131271d8 +95890111712df5a1776a7e579752e823 +03e52022a14d4ea9eabcd8b1179f3033 +1c481d0058a1d84baa406bb4832b18ca +98a22bc683eef7216f274903906981c9 +81e8311b0be2691e70df22dc525bcf50 +2543457033f28d035e07ddade9721776 +983ed8db6ef823d29d8685d1dcb01a9a +fe698fb141e24fd2a2052b2c11655f44 +06aafae83109020bfbf76c2e1df42949 +8629b929c38c6cdb429fabd64502ceb1 diff --git a/data/cves.db b/data/cves.db index 3fca8ac6341b84a59138827d9b3ccd144f2153f3..28cc80be5fa505d6ffc1a864d4b308c1c4dacd26 100644 GIT binary patch delta 4692 zcma*pcXSl>*T-?PO9?fgC>^7qf*P5bo!OnWfOI28AkxHgXLe^X8WIcvyRgbtQ4z33 z2)bCYD@wBlyJAHwsMrNoQ4s|TSf2Ob^PJ~rFX`@o4(pIIN z%04Rls7vqArJG83l>=0YRSr}+NTr8LPnCmJ4pBK&rI$)? zmBUmHS2;qZMCC}8J}QQasbZEwRYs_cR5?*)l*(w8F)C#$C#j588K*K{WrE5?m6KH_ zshpy6s>*39r>k&3o{F!MQc0@>DjAi@DrcyatDLEFmP&=n6qQPqDwU}!XRB1JOjD^* znXWQJ?rPSE*dB zGFRmqm3b=jRTijRt8$&n^(r^0+^ABka+AtJl|?FbDvMQaR=Gtbr?N!lR+ZaSZdbWO zq&Ppj0ctWkMJIRGwFPLFGl2msDO>c|~Qd%Bw1`sl2Z8hRT~NZ>g+Pd0S<@ z$~!9Ws=TN2zRCub4^%!>`AB7>%Ev07sC=sOnabxXU#NVk@|DUamCY(!RPrict9+xf zRpnci?^M25*{1S?%663>Ren<0p|VruXO&-6epUHRWtYlsmETqVQ2A5kuQ^gMR|*h8 z6phgYP0@~z-hsC%Vw;+clxD~hIcHDtGaTk{2Zrp==aUbr-19%V* z;bAPpBX|_cu>vcx3ajxL9>)`S5>Mf2)ME{v!LxV{&*KHWh?np(Ucp+tir4Tu-oTr9 z3+wPU*5e(#i}&z8HsAw%h>x%lALA2ziqG&lzQC9G3Y)MQTad@s_y$|?ExyC|*oGgl z9Y5kH?7&X^j9>68e#0*8#_#w8f8wu#ITGRVM+8wcMiVqeGZdmZTA(Fbp*7l|2yM|0 z`(R(R$9~u!9ncY-&>3CO72VJs2cQ@S;vn=uPaKRxa434AHx9$$I07X&5`AF6goPMv zIEW(w7fBq2qj3z5MPKy8ap;c$7>Gd_j3F3`<57weFbu;n0wZxEMqxC@pbRHrEXH9x zCSW2?#w47AQ*jzjM|l4pe58;@fD9(%43y(coP`QZK_#j%6=$Ow(@=xyn1OR}F3!XG zxBwU8B3z7_n1w7Z!KIiD#bvl0S6~jV#8tQ&b8!vkVLle%T3mEJ7U? z<7V7~9G2i#+=kn62kyjOScx!|QkhZ{jVi!`oPocknLW!~58P5AY#A!bW_I zPw*)|!{_({U*aol!e(qi9$({|$WyX4a>u;F=c6|_3jcY{ExBY}q*ranseK2mI?|go zyP$s8f~}F83L-7PtH1ubt&y>XEt~N{KH69Fqvq|X+Zv&K8?FBTf4ZZ zQL0g^#|t+U_HGt5UEj2%$)d))8<#~FN1I1d1*;2s*0vob{RU)@q0{CgI`z(Wi?tq` z3F1jNA+_Uh8gnxLY1Sb0T7P+dH}yktmuuBhw!Nax)AGo#VQ&0@u-b(C%8+Wq!p zq{j$1ZdutP&7W9E6NBj?>BfSzoA%>D#-?q}QMa(=?N@iPI;0 z{&_V)Zq4?!kxng5tHk<8$}m!5*+VoxGEA99isjfb+esL)SjKYGM$8F}L^|!IgJi-o z6Nz|(6x*=vSXud$sTDzP$;Q_r-E$B3j7B>Y{xfDUF?RMq&5sCU%87B!z>S%vZ}@=~ zPnto(NM|f7opLP4Ph}kAA2G3#n47eW-0sqWk*>KuBYur^Y|-!}BZ+XbZ8SeTj2O7* zzC6qFQ*o{>$k2Q|V_7P5BJ3ro5`McwoSuR2TOu>p!q}@z~P*s=K$`w=h3@(dNbXZ_X86^kSsN-up^q zduaZI@c2_`%ZLRI%V>F~owfrn8F+pw?fRyfNM>S;x8dnRHEf3zhW&UMft)81-`RL{+=WSko%bsQ5vs6w0b9c+QBsbex^QB=k zlfqdzZqi^Q6Q-5UI9|9&ULtT3$%JDCY;(hA5|&~7-OSKxuX1{YS5v#J&uLxjq%7K` z!ES|vPlkg({{IFa_l&sV#{GCE=`#Ab!(h`X+cIOOm0&~-!(78L|9|l7mj1Gr^_t|y zV@9~aLrFRGERMv3;l~ZzaQs9jZh0v$&O>4)5)KPSl+_?5!827l!>g<*FCH08udb?` zR-CD-E-pQ(Y((wU*{65e+tKMD3N8*#mNq6kT4h*V}7Mh+V&7Lp0i}SSkBvc+}@iB-+)H8ljcW+JOlQco8@`_Gn30U-9+f%@;SRx&HOmBLDCg`Gm9R=$rL59c8LO;S z&MI$Juqs-WtjgAxRu!wNRn7X!s&3V=YFf3d+EyK_u2s*fZ#A$QT8*r)t#7Qx*0)v@ ztEtt@YHqc#m`_WqmDSp6W3{!~S?#S3R!6Io)!FJ|b+x)#-K`#0Ppg;J+v;O|XMJz= zwfb58tpU~#){oXeYmhbA8e$E#hFQa{5tgly)+lSVHO3lijkCsE6Re-C2y3D>$(n3U zv8Gznte>sv)(mT=HOrc9&9UZM^Q`&S0&AhQ$XaYIv6foPtmW1UYo)cyT5YYd)>`YV z_0|UK7wcE+H*2HyyY+{)$=Ymfv9?;rd-1>$r8oI%%D#B9lx^CUDZd$jj+twZH zu6574Z#}RcT92&9*5B4Y))VWg^~`#1y|7+dudLVB8|z=|KkKda&U$Zsus&L!#wcWh zLJ&YGq9X=kA{N3B8*va9@em&gkPwNG7)g*6$&ef=kP_iYh15ucv`B}~kRBP35t)z~ zS&$XkkR3UY6S?p?zCdo|L0;rTeiT4K6hdJXK~WS#ag;zwltO8gL0ObTc~n3}R6=EZ zi7KdyYWND(Q3Ewm3$;-Pbx{xX(Ett62w&qHG{(1Rf~IJO=4gT7{9B?GTB8lxq8-|! z13ID;I-?7^q8qxS2YR9xdZQ1%!}sWme&~+@_yIp+AO>MDhF~a$VK_#>7>Q9BjWHOD zaTt#Y_z4l1h)I}?DVU0B_!-kN12ZuTvoQyAF%R>x01L4Qi?IYtu?)+x0xPi!tFZ=a zu@3980l(l^{DzJA9e-dGHe(C6VjH$&2X-P7yRaL3uowHV9|v#{hj182a1_VzC;q~5 zoWMz(!fBkrS)9XpMBxH1;u0?73a;WBuHy!7;udb>4({R}?&AR-;t?L>Z~TKNc#3Cu zju&`|S9py#_!s}-E#BchKHwuhg^W>v=Z^qF5gjoQ6R{A6*ocF;h==${fP_ed#7Kgq zNQUG{fs_bGDx^jlq(wS>hV;mQjL3w{$bziMhV00JoXCaG@da`t5Aq@(@}mF>q7VwB z2#TT@ilYQdq7+J_49cP$%A*1*q7o|OOH@HsRKr)OjvAC&f7VXd;9ncY-&>3CO72VJsJMa59ll3j^h19P zzz_Hl12G7LF$6;~48t)3#z>69XpF&FjKg?Lz)y(4L`=eDOu@Aw0ouo+vh72B{KJFpXx z*oEELgT2^?{WySwIE2GEf}=QwKk*li;{;CP6i(v|&f*--BMKLA5tncoS8x^Aa2+>r z6Sr_1cW@W?a32rwFt9_90!t#o_J+=l7W}-*y)lO6?T zgaj5ka_W>vfrepm6L9hWE8^wsM*;FUn7@PhCzvO}JPqbqFwcW|5zNbAUIp_ym^Z=v z8_a*fybb1EFz + @@ -1987,6 +1987,126 @@

眈眈探求 | TITLE URL + + 29a3df780bfdbf90601bb5bea8abf143 + CVE-2024-25647 + 2024-12-23 12:42:39 + Intel Binary Configuration Tool默认权限错误漏洞 + 详情 + + + + 7e2cf76ec7aa5a5db2596d63a52628a2 + CVE-2024-28049 + 2024-12-23 12:42:39 + Intel PROSet/Wireless Software和Intel Killer Wi-Fi输入验证错误漏洞 + 详情 + + + + bf58db5ff8d8748b287ccfb580a0c524 + CVE-2024-49379 + 2024-12-23 12:42:39 + umbrelOS跨站脚本漏洞 + 详情 + + + + 5e0b60405b7f62aca6ade27753902132 + CVE-2024-7570 + 2024-12-23 12:42:39 + Ivanti Neurons for ITSM证书验证错误漏洞 + 详情 + + + + 6a06086b6f98eef65783dc42131271d8 + CVE-2024-28051 + 2024-12-23 12:42:39 + Intel VPL越界读取漏洞 + 详情 + + + + 95890111712df5a1776a7e579752e823 + CVE-2024-27200 + 2024-12-23 12:42:39 + Intel Granulate访问控制错误漏洞 + 详情 + + + + 03e52022a14d4ea9eabcd8b1179f3033 + CVE-2024-25565 + 2024-12-23 12:42:39 + Intel Xeon Processors控制流管理不足漏洞 + 详情 + + + + 1c481d0058a1d84baa406bb4832b18ca + CVE-2024-42834 + 2024-12-23 12:42:39 + Incognito Service Activation Center (SAC) UI跨站脚本漏洞 + 详情 + + + + 98a22bc683eef7216f274903906981c9 + CVE-2024-21783 + 2024-12-23 12:42:39 + Intel VPL整数溢出漏洞 + 详情 + + + + 81e8311b0be2691e70df22dc525bcf50 + CVE-2023-38920 + 2024-12-23 12:42:39 + Cyber Cafe Management System跨站脚本漏洞 + 详情 + + + + 2543457033f28d035e07ddade9721776 + CVE-2024-40443 + 2024-12-23 12:42:39 + Simple Laboratory Management System SQL注入漏洞 + 详情 + + + + 983ed8db6ef823d29d8685d1dcb01a9a + CVE-2024-11193 + 2024-12-23 12:42:39 + YugabyteDB信息泄露漏洞 + 详情 + + + + fe698fb141e24fd2a2052b2c11655f44 + CVE-2024-25563 + 2024-12-23 12:42:39 + Intel PROSet/Wireless Software和Intel Killer Wi-Fi初始化错误漏洞 + 详情 + + + + 06aafae83109020bfbf76c2e1df42949 + CVE-2024-43093 + 2024-12-23 12:42:39 + Google Android访问控制错误漏洞 + 详情 + + + + 8629b929c38c6cdb429fabd64502ceb1 + CVE-2024-21820 + 2024-12-23 12:42:39 + Intel SGX SDK默认权限错误漏洞 + 详情 + + ef3cf622fad7f26c1725bf23d5266ff4 CVE-2024-4741 @@ -2107,126 +2227,6 @@

眈眈探求 | 详情 - - ed9709003f2850f368b87e359a4b7e22 - CVE-2024-28731 - 2024-12-19 09:24:35 - D-Link DWR-2000M跨站请求伪造漏洞 - 详情 - - - - 23eb8eb01674b4913bec5d4dfd506126 - CVE-2024-10038 - 2024-12-19 09:24:35 - WordPress WP-Strava Plugin跨站脚本漏洞 - 详情 - - - - 9ded10f622530592b77e73cab73fd712 - CVE-2024-9816 - 2024-12-19 09:24:35 - Codezips Tourist Management System代码问题漏洞 - 详情 - - - - b876a5b2f02222ec10b122ad1e00d8fb - CVE-2024-9487 - 2024-12-19 09:24:35 - GitHub Enterprise Server身份验证绕过漏洞 - 详情 - - - - dc576147fecfd45eb31b4d0242e2ffab - CVE-2024-45317 - 2024-12-19 09:24:35 - SonicWALL SMA1000代码问题漏洞 - 详情 - - - - c5c22eeb910f94d4b2cfccc53fe024b4 - CVE-2023-42133 - 2024-12-19 09:24:35 - PAX Android based POS权限提升漏洞 - 详情 - - - - 2c195fa345f7fea241d2c243163d6a67 - CVE-2024-9814 - 2024-12-19 09:24:35 - Codezips Pharmacy Management System SQL注入漏洞 - 详情 - - - - 9b8d39aabf8eb60a83e9ce9c2c8e7915 - CVE-2024-10629 - 2024-12-19 09:24:35 - WordPress GPX Viewer Plugin任意文件创建漏洞 - 详情 - - - - 0212844f2b27e659025f4a9b56ea81fd - CVE-2024-9817 - 2024-12-19 09:24:35 - code-projects Blood Bank System SQL注入漏洞 - 详情 - - - - 3bfcff1a2234e150346754079d41d228 - CVE-2024-21534 - 2024-12-19 09:24:35 - JSONPath Plus远程代码执行漏洞 - 详情 - - - - 580cede073aab0290525e8476a495523 - CVE-2024-5005 - 2024-12-19 09:24:35 - GitLab信息泄露漏洞 - 详情 - - - - 1015f0b192d4d94710d969a1c7413e49 - CVE-2024-47648 - 2024-12-19 09:24:35 - WordPress plugin EventPrime输入验证错误漏洞 - 详情 - - - - c89873a677eeba2554c51232bcfdb869 - CVE-2024-21541 - 2024-12-19 09:24:35 - npm dom-iterator任意代码执行漏洞 - 详情 - - - - 407587df3afafbf556ca40d7d64f0792 - CVE-2024-48987 - 2024-12-19 09:24:35 - snipe Snipe-IT远程代码执行漏洞 - 详情 - - - - 0a62b2872bc504fa8b99f8c4402c928c - CVE-2024-6971 - 2024-12-19 09:24:35 - Saifeddine ALOUI LoLLMs路径遍历漏洞 - 详情 - -