Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Mar 28, 2024
1 parent 31f7448 commit 5975c03
Show file tree
Hide file tree
Showing 3 changed files with 136 additions and 121 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -169,3 +169,18 @@ cf22743bada62c70e29bca742b22f359
7ae0c46518502557f4e6a5deb870f4f3
40b0fb94d3fab1e8b33de877f9096a05
260185a35570fc92a918018ae9c2e506
7bff88e2b8d49434581ec1e06c85484f
dd5545c684ffb73bf37cdfaeb682d256
a6d0599875b43e53b9d5612fb8fe02ff
fbc80ef618f523951cb712cd8f462658
6d4c525110bcf5c7ad2b7a88769fe4bf
fe0a1a46a0042935b523183948dc414d
b8910a4a16cb498a3a9e62c2e34a3170
8a8c0d0037e130274007c7acd7cbebf2
f5da5f490e6739abf594ca4c7459b27f
a922b2c7de692d79941e628db6b4d7f5
0de3daa2606b30658cc6b9f177d784b0
940f05779eb37142884c7d2e02837a6c
050964d6373ff197b4908c1db3031af3
dbcf756a3eb3244d57f16de8befcdb84
507a7a2f2e430a8278d48370f074ee96
Binary file modified data/cves.db
Binary file not shown.
242 changes: 121 additions & 121 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-03-28 03:24:55 -->
<!-- RELEASE TIME : 2024-03-28 07:20:53 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -1971,6 +1971,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>7bff88e2b8d49434581ec1e06c85484f</td>
<td>CVE-2023-44252</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Fortinet FortiWAN身份认证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92581">详情</a></td>
</tr>

<tr>
<td>dd5545c684ffb73bf37cdfaeb682d256</td>
<td>CVE-2023-31210</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Checkmk不受控制的搜索路径元素漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92580">详情</a></td>
</tr>

<tr>
<td>a6d0599875b43e53b9d5612fb8fe02ff</td>
<td>CVE-2023-6379</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Alkacon Software OpenCMS跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92579">详情</a></td>
</tr>

<tr>
<td>fbc80ef618f523951cb712cd8f462658</td>
<td>CVE-2023-6380</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Alkacon Software OpenCMS开放重定向漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92578">详情</a></td>
</tr>

<tr>
<td>6d4c525110bcf5c7ad2b7a88769fe4bf</td>
<td>CVE-2023-6477</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>xorg-server和xwayland越界内存读写漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92577">详情</a></td>
</tr>

<tr>
<td>fe0a1a46a0042935b523183948dc414d</td>
<td>CVE-2023-6478</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>xorg-server和xwayland整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92576">详情</a></td>
</tr>

<tr>
<td>b8910a4a16cb498a3a9e62c2e34a3170</td>
<td>CVE-2023-47536</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Fortinet FortiOS和FortiProxy访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92575">详情</a></td>
</tr>

<tr>
<td>8a8c0d0037e130274007c7acd7cbebf2</td>
<td>CVE-2023-44251</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Fortinet FortiWAN路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92574">详情</a></td>
</tr>

<tr>
<td>f5da5f490e6739abf594ca4c7459b27f</td>
<td>CVE-2023-6534</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>FreeBSD拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92573">详情</a></td>
</tr>

<tr>
<td>a922b2c7de692d79941e628db6b4d7f5</td>
<td>CVE-2023-6660</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>FreeBSD信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92572">详情</a></td>
</tr>

<tr>
<td>0de3daa2606b30658cc6b9f177d784b0</td>
<td>CVE-2023-6718</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Repox身份认证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92571">详情</a></td>
</tr>

<tr>
<td>940f05779eb37142884c7d2e02837a6c</td>
<td>CVE-2023-47063</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Adobe Illustrator越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92570">详情</a></td>
</tr>

<tr>
<td>050964d6373ff197b4908c1db3031af3</td>
<td>CVE-2023-45725</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Apache CouchDB信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92569">详情</a></td>
</tr>

<tr>
<td>dbcf756a3eb3244d57f16de8befcdb84</td>
<td>CVE-2022-22942</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Linux Kernel权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92568">详情</a></td>
</tr>

<tr>
<td>507a7a2f2e430a8278d48370f074ee96</td>
<td>CVE-2023-47074</td>
<td>2024-03-28 07:18:45 <img src="imgs/new.gif" /></td>
<td>Adobe Illustrator越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92567">详情</a></td>
</tr>

<tr>
<td>f297ba04d2e5c55b7edf63bd7a87d732</td>
<td>CVE-2024-1912</td>
Expand Down Expand Up @@ -2091,126 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92516">详情</a></td>
</tr>

<tr>
<td>94f5a372781e1c36dbb3011203f47718</td>
<td>CVE-2023-47624</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Audiobookshelf路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92485">详情</a></td>
</tr>

<tr>
<td>9cd9700e4ebfe6c373eade58a0ef30b3</td>
<td>CVE-2023-49296</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Arduino Create Agent跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92484">详情</a></td>
</tr>

<tr>
<td>6439b58061995a4277cab33543333443</td>
<td>CVE-2023-47619</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Audiobookshelf服务器端请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92483">详情</a></td>
</tr>

<tr>
<td>90a14c669a6ca9d6fc36f241aa6639e5</td>
<td>CVE-2023-6407</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Schneider Electric Easy UPS Online Monitoring Software路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92482">详情</a></td>
</tr>

<tr>
<td>7d05f3f5fdb99389b19f2f6dbbc69f2b</td>
<td>CVE-2023-5630</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Schneider Electric Trio Q-Series Ethernet Data Radio下载代码完整性检查漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92481">详情</a></td>
</tr>

<tr>
<td>faba8dd5a871b1de1b76935aa3595ddc</td>
<td>CVE-2023-5629</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Schneider Electric Trio Q-Series Ethernet Data Radio开放重定向漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92480">详情</a></td>
</tr>

<tr>
<td>3342792f11b1d82ed9d80cf576edc9c0</td>
<td>CVE-2023-47620</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Scrypted跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92479">详情</a></td>
</tr>

<tr>
<td>4974d3c6bb1300add5aaae47eba6b004</td>
<td>CVE-2023-49877</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>IBM System Storage Virtualization Engine TS7700信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92478">详情</a></td>
</tr>

<tr>
<td>57ae4f286f39adbf7a3d9c8bff63efa8</td>
<td>CVE-2023-25651</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>ZTE MC801A SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92477">详情</a></td>
</tr>

<tr>
<td>f3ff6bd0b4a2499951c2de85341d4419</td>
<td>CVE-2023-49878</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>IBM System Storage Virtualization Engine TS7700信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92476">详情</a></td>
</tr>

<tr>
<td>6a78cfae75d4e383643d04e4769f3d81</td>
<td>CVE-2023-25644</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>ZTE MC801A拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92475">详情</a></td>
</tr>

<tr>
<td>4ab15ad863602f8f3d75c0f080861c06</td>
<td>CVE-2023-50444</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>PRIMX多款产品身份认证次数限制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92474">详情</a></td>
</tr>

<tr>
<td>7236347622c645d0375d1734155c7cc1</td>
<td>CVE-2023-6795</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Palo Alto Networks PAN-OS操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92473">详情</a></td>
</tr>

<tr>
<td>5251108f15d59832e4290354156fa4c1</td>
<td>CVE-2023-0757</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>PHOENIX CONTACT MULTIPROG和ProConOS/ProConOS eCLR关键资源权限分配错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92472">详情</a></td>
</tr>

<tr>
<td>ed3e51116cce1322a1f2bf9ae9535da7</td>
<td>CVE-2023-48702</td>
<td>2024-03-27 07:19:42 <img src="imgs/new.gif" /></td>
<td>Jellyfin命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/92471">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 5975c03

Please sign in to comment.