Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Oct 9, 2024
1 parent 7fe5ce3 commit 5e3c2da
Show file tree
Hide file tree
Showing 3 changed files with 146 additions and 131 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -134,3 +134,18 @@ de31649b239f745bd08c59f5d9b9477d
a867ea008d4b9c2558d9e3f6572d76bc
654607186e4e34d057212c7dc220fbf7
04748ca6880ac56385ed282d65d488da
9611f31d1fa2f5c9ffcd7df3c03fd68f
8576692cd61383dbc1930c1cb29bb5b8
b53565db8b385789677c56274981e289
0e96b893f17493c1d1898b2c8958516e
ddf347a1ed541389cf8d4a7a599eebc1
569a06eeb1ff33a3286618cbbc5ab153
2ec3327cec3c1c276201b0114a514cbb
97c08d960a3e7f6367483345928e748e
69412846216ad887945166253e0314e6
a6606784e2f546ee212f483dda8c2a74
95840243e0b8c259d8a8d0d15eefa344
ed2eea7eb3a143216deaac97737845ca
e818517bc9cc7a7ac95236e824fae99b
671375f5b6a9a6e6a47e746d3a964092
2bbae2cf96a446ac24d9713e5d60dcf9
Binary file modified data/cves.db
Binary file not shown.
262 changes: 131 additions & 131 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-10-08 21:23:17 -->
<!-- RELEASE TIME : 2024-10-09 03:30:03 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -446,79 +446,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>9780c53f505ca0e5e0bc99eed3f6b600</td>
<td>CVE-2024-20103</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001358; Issue ID: MSV-1599.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20103">详情</a></td>
</tr>

<tr>
<td>0d85c4bcac1a9eeb82904d263acdf665</td>
<td>CVE-2024-20102</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20102">详情</a></td>
</tr>

<tr>
<td>daf82040e23ff87537f161b991c86201</td>
<td>CVE-2024-20101</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998901; Issue ID: MSV-1602.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20101">详情</a></td>
</tr>

<tr>
<td>992ee153e21872cd5ad109107582b604</td>
<td>CVE-2024-20100</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998449; Issue ID: MSV-1603.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20100">详情</a></td>
</tr>

<tr>
<td>c10f9e23cd2bcbd805a5fe697e49ac06</td>
<td>CVE-2024-20099</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08997492; Issue ID: MSV-1625.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20099">详情</a></td>
</tr>

<tr>
<td>ce0042f4852c30ebcff63903d5f86e51</td>
<td>CVE-2024-20098</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996886; Issue ID: MSV-1626.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20098">详情</a></td>
</tr>

<tr>
<td>0f2105eb619a182af0ab75ab538ac980</td>
<td>CVE-2024-20097</td>
<td>2024-10-07 03:15:03 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:03</td>
<td>In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20097">详情</a></td>
</tr>

<tr>
<td>f213a7eafbc34b7a0479cdf22b58ba51</td>
<td>CVE-2024-20096</td>
<td>2024-10-07 03:15:02 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:02</td>
<td>In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996900; Issue ID: MSV-1635.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20096">详情</a></td>
</tr>

<tr>
<td>c5053ea29c150e47d4e6f1a23dac434f</td>
<td>CVE-2024-20095</td>
<td>2024-10-07 03:15:02 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:02</td>
<td>In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996894; Issue ID: MSV-1636.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20095">详情</a></td>
</tr>

<tr>
<td>4065b5d528846523e63695068a59a322</td>
<td>CVE-2024-20094</td>
<td>2024-10-07 03:15:02 <img src="imgs/new.gif" /></td>
<td>2024-10-07 03:15:02</td>
<td>In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00843282; Issue ID: MSV-1535.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-20094">详情</a></td>
</tr>
Expand Down Expand Up @@ -1979,6 +1979,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>9611f31d1fa2f5c9ffcd7df3c03fd68f</td>
<td>CVE-2024-43584</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Scripting Engine安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102634">详情</a></td>
</tr>

<tr>
<td>8576692cd61383dbc1930c1cb29bb5b8</td>
<td>CVE-2024-43589</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Routing and Remote Access Service远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102633">详情</a></td>
</tr>

<tr>
<td>b53565db8b385789677c56274981e289</td>
<td>CVE-2024-43585</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Code Integrity Guard安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102632">详情</a></td>
</tr>

<tr>
<td>0e96b893f17493c1d1898b2c8958516e</td>
<td>CVE-2024-43591</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Azure Command Line Integration (CLI)权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102631">详情</a></td>
</tr>

<tr>
<td>ddf347a1ed541389cf8d4a7a599eebc1</td>
<td>CVE-2024-43590</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Visual C++ Redistributable Installer权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102630">详情</a></td>
</tr>

<tr>
<td>569a06eeb1ff33a3286618cbbc5ab153</td>
<td>CVE-2024-43616</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Office远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102629">详情</a></td>
</tr>

<tr>
<td>2ec3327cec3c1c276201b0114a514cbb</td>
<td>CVE-2024-43592</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Routing and Remote Access Service远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102628">详情</a></td>
</tr>

<tr>
<td>97c08d960a3e7f6367483345928e748e</td>
<td>CVE-2024-43601</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Visual Studio Code for Linux远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102627">详情</a></td>
</tr>

<tr>
<td>69412846216ad887945166253e0314e6</td>
<td>CVE-2024-43599</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Remote Desktop Client远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102626">详情</a></td>
</tr>

<tr>
<td>a6606784e2f546ee212f483dda8c2a74</td>
<td>CVE-2024-43611</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Routing and Remote Access Service远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102625">详情</a></td>
</tr>

<tr>
<td>95840243e0b8c259d8a8d0d15eefa344</td>
<td>CVE-2024-43612</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Power BI Report Server欺骗漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102624">详情</a></td>
</tr>

<tr>
<td>ed2eea7eb3a143216deaac97737845ca</td>
<td>CVE-2024-43593</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Routing and Remote Access Service远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102623">详情</a></td>
</tr>

<tr>
<td>e818517bc9cc7a7ac95236e824fae99b</td>
<td>CVE-2024-43603</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Visual Studio Collector Service拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102622">详情</a></td>
</tr>

<tr>
<td>671375f5b6a9a6e6a47e746d3a964092</td>
<td>CVE-2024-43609</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Office欺骗漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102621">详情</a></td>
</tr>

<tr>
<td>2bbae2cf96a446ac24d9713e5d60dcf9</td>
<td>CVE-2024-43614</td>
<td>2024-10-09 03:27:51 <img src="imgs/new.gif" /></td>
<td>Microsoft Defender for Endpoint for Linux欺骗漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102620">详情</a></td>
</tr>

<tr>
<td>6d30ac45bd68daec4f8566a8720301c6</td>
<td>CVE-2024-33569</td>
Expand Down Expand Up @@ -2099,126 +2219,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102459">详情</a></td>
</tr>

<tr>
<td>81058c7f45820b04b6ef6b6d72cfb306</td>
<td>CVE-2024-3896</td>
<td>2024-09-30 09:25:44</td>
<td>WordPress Photo Gallery, Images, Slider in Rbs Image Galler跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102458">详情</a></td>
</tr>

<tr>
<td>4f3953e13f56205c65900f7628e162f4</td>
<td>CVE-2024-6327</td>
<td>2024-09-30 09:25:44</td>
<td>Progress Software Telerik Reporting不受信数据反序列化漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102457">详情</a></td>
</tr>

<tr>
<td>e1dad3811521f73d6a1c6647028a0987</td>
<td>CVE-2024-39345</td>
<td>2024-09-30 09:25:44</td>
<td>Adtran NetVanta 3120操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102456">详情</a></td>
</tr>

<tr>
<td>6e122ed3c1b85bc4253d7bb1fa25ec8a</td>
<td>CVE-2024-39702</td>
<td>2024-09-30 09:25:44</td>
<td>OpenResty拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102455">详情</a></td>
</tr>

<tr>
<td>3335bb323287482f3b8d0cf7c8964515</td>
<td>CVE-2024-6896</td>
<td>2024-09-30 09:25:44</td>
<td>WordPress AMP for WP – Accelerated Mobile Pages Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102454">详情</a></td>
</tr>

<tr>
<td>b0b258ce5b2ba52b1010c482bbed5e66</td>
<td>CVE-2023-45249</td>
<td>2024-09-30 09:25:44</td>
<td>Acronis Cyber Infrastructure远程命令执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102453">详情</a></td>
</tr>

<tr>
<td>4966eb50a7c846062b18eb1e4877f31d</td>
<td>CVE-2024-40502</td>
<td>2024-09-29 09:21:39</td>
<td>Hospital Management System Project SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102372">详情</a></td>
</tr>

<tr>
<td>a6e8ba54d8dbef2511d8d459042ad7b2</td>
<td>CVE-2024-34329</td>
<td>2024-09-29 09:21:39</td>
<td>Entrust Datacard XPS Card Printer Driver不安全权限漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102371">详情</a></td>
</tr>

<tr>
<td>c37e8b915ab8ee03cc5495b378e228bb</td>
<td>CVE-2024-6828</td>
<td>2024-09-29 09:21:39</td>
<td>WordPress Redux Framework Plugin JSON文件上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102370">详情</a></td>
</tr>

<tr>
<td>28eb3488e46e36efbc142411917579f3</td>
<td>CVE-2024-6885</td>
<td>2024-09-29 09:21:39</td>
<td>WordPress MaxiBlocks Plugin任意文件删除漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102363">详情</a></td>
</tr>

<tr>
<td>7865d4286f550caf1e3a287ce3879ae3</td>
<td>CVE-2024-1575</td>
<td>2024-09-29 09:21:39</td>
<td>Zyxel WBE660S权限管理错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102362">详情</a></td>
</tr>

<tr>
<td>9b623ede881c65bef4edfa12e4870ca3</td>
<td>CVE-2024-6638</td>
<td>2024-09-29 09:21:39</td>
<td>NI LabVIEW整数溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102361">详情</a></td>
</tr>

<tr>
<td>2a0a8bdde1cd011539e0bba5b083cbf3</td>
<td>CVE-2024-6122</td>
<td>2024-09-29 09:21:39</td>
<td>NI SystemLink Server默认权限错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102360">详情</a></td>
</tr>

<tr>
<td>d0be807b26c0a61f0e6fa9d73710345f</td>
<td>CVE-2024-41012</td>
<td>2024-09-29 09:21:39</td>
<td>Linux Kernel内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102359">详情</a></td>
</tr>

<tr>
<td>2c0f7e527ea9a5728ef849a0126ab45d</td>
<td>CVE-2024-41709</td>
<td>2024-09-29 09:21:39</td>
<td>Backdrop CMS跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/102358">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit 5e3c2da

Please sign in to comment.