Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Feb 16, 2024
1 parent b4df0f6 commit 7a17cc9
Show file tree
Hide file tree
Showing 3 changed files with 34 additions and 33 deletions.
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -148,3 +148,4 @@ ab959a1bf846daba3e3a81e4114a4cbd
6716056f770d6f35e1e01e8cc8669167
f9655fc27452821c224c557d3977212b
6c2ebcf52238b7de7b410158d376742a
6e5b58b657cdda56656ca3bee6091a9d
Binary file modified data/cves.db
Binary file not shown.
66 changes: 33 additions & 33 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-02-15 23:23:27 -->
<!-- RELEASE TIME : 2024-02-16 03:24:14 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -294,135 +294,135 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>d180424eeff34a639d75c0aaa18da297</td>
<td>CVE-2024-24301</td>
<td>2024-02-14 23:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-14 23:15:08</td>
<td>Command Injection vulnerability discovered in 4ipnet EAP-767 device v3.42.00 within the web interface of the device allows attackers with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24301">详情</a></td>
</tr>

<tr>
<td>f22efcffbfd452555557990fb7070efa</td>
<td>CVE-2024-24300</td>
<td>2024-02-14 23:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-14 23:15:08</td>
<td>4ipnet EAP-767 v3.42.00 is vulnerable to Incorrect Access Control. The device uses the same set of credentials, regardless of how many times a user logs in, the content of the cookie remains unchanged.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24300">详情</a></td>
</tr>

<tr>
<td>78feefedce41c6047b3a4701dfbff676</td>
<td>CVE-2023-6138</td>
<td>2024-02-14 23:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-14 23:15:08</td>
<td>A potential security vulnerability has been identified in the system BIOS for certain HP Workstation PCs, which might allow escalation of privilege, arbitrary code execution, or denial of service. HP is releasing mitigation for the potential vulnerability.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-6138">详情</a></td>
</tr>

<tr>
<td>9349462f4abf012b08235071e9c3b64d</td>
<td>CVE-2022-48220</td>
<td>2024-02-14 23:15:08 <img src="imgs/new.gif" /></td>
<td>2024-02-14 23:15:08</td>
<td>Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-48220">详情</a></td>
</tr>

<tr>
<td>bf6ad87d2a8511d99f253c17c79dcdd3</td>
<td>CVE-2022-48219</td>
<td>2024-02-14 23:15:07 <img src="imgs/new.gif" /></td>
<td>2024-02-14 23:15:07</td>
<td>Potential vulnerabilities have been identified in certain HP Desktop PC products using the HP TamperLock feature, which might allow intrusion detection bypass via a physical attack. HP is releasing firmware and guidance to mitigate these potential vulnerabilities.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2022-48219">详情</a></td>
</tr>

<tr>
<td>375ecf8d8e60b8b09412c52e66ad8bb2</td>
<td>CVE-2024-1471</td>
<td>2024-02-14 22:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 22:15:47</td>
<td>An HTML injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Repository parameters, which could lead to HTML redirection attacks.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1471">详情</a></td>
</tr>

<tr>
<td>e21bfe93720eca43aebe350aa7426243</td>
<td>CVE-2024-1367</td>
<td>2024-02-14 22:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 22:15:47</td>
<td>A command injection vulnerability exists where an authenticated, remote attacker with administrator privileges on the Security Center application could modify Logging parameters, which could lead to the execution of arbitrary code on the Security Center host.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1367">详情</a></td>
</tr>

<tr>
<td>c549c1e3e23fe847b0cac550846cbdc3</td>
<td>CVE-2023-49721</td>
<td>2024-02-14 22:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 22:15:47</td>
<td>An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-49721">详情</a></td>
</tr>

<tr>
<td>c97466358b23783d42d48f5c6667eb6b</td>
<td>CVE-2023-48733</td>
<td>2024-02-14 22:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 22:15:47</td>
<td>An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-48733">详情</a></td>
</tr>

<tr>
<td>b157568ce295c7ffe141841db512006e</td>
<td>CVE-2024-24699</td>
<td>2024-02-14 00:15:48 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:48</td>
<td>Business logic error in some Zoom clients may allow an authenticated user to conduct information disclosure via network access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24699">详情</a></td>
</tr>

<tr>
<td>67d46592f36a6e6aa3aced6fc5f07048</td>
<td>CVE-2024-24698</td>
<td>2024-02-14 00:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:47</td>
<td>Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24698">详情</a></td>
</tr>

<tr>
<td>57758f8416a1b377f1f8f5f646e0e3f6</td>
<td>CVE-2024-24697</td>
<td>2024-02-14 00:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:47</td>
<td>Untrusted search path in some Zoom 32 bit Windows clients may allow an authenticated user to conduct an escalation of privilege via local access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24697">详情</a></td>
</tr>

<tr>
<td>4fc2439a64a0a50e76e2cc186fbf3afd</td>
<td>CVE-2024-24696</td>
<td>2024-02-14 00:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:47</td>
<td>Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24696">详情</a></td>
</tr>

<tr>
<td>6b92a41a529d56ba3e2842980d26ab8d</td>
<td>CVE-2024-24695</td>
<td>2024-02-14 00:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:47</td>
<td>Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24695">详情</a></td>
</tr>

<tr>
<td>b978aa2c7f93500b0858e8985947e982</td>
<td>CVE-2024-24691</td>
<td>2024-02-14 00:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:47</td>
<td>Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24691">详情</a></td>
</tr>

<tr>
<td>a5b36580f654adcc45697c56348de1e0</td>
<td>CVE-2024-24690</td>
<td>2024-02-14 00:15:47 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:47</td>
<td>Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24690">详情</a></td>
</tr>

<tr>
<td>61522674efeb1056d52e655cc279622c</td>
<td>CVE-2024-1485</td>
<td>2024-02-14 00:15:46 <img src="imgs/new.gif" /></td>
<td>2024-02-14 00:15:46</td>
<td>A vulnerability was found in the decompression function of registry-support. This issue can be triggered by an unauthenticated remote attacker when tricking a user into opening a specially modified .tar archive, leading to the cleanup process following relative paths to overwrite or delete files outside the intended scope.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-1485">详情</a></td>
</tr>
Expand Down Expand Up @@ -1974,119 +1974,119 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>dc2a7ba4673c561c437cedf1370f69d9</td>
<td>CVE-2024-1284</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Google Chromium堆缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90561">详情</a></td>
</tr>

<tr>
<td>aed34ed84e9689594530e1ba95c7f7a0</td>
<td>CVE-2024-21358</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90560">详情</a></td>
</tr>

<tr>
<td>67cc6d69de8dfd8cb23ee5f0497e9781</td>
<td>CVE-2024-21356</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Lightweight Directory Access Protocol拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90559">详情</a></td>
</tr>

<tr>
<td>a6ab64cf92b588817dae14488ff3fdf4</td>
<td>CVE-2024-21355</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Message Queuing (MSMQ)权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90558">详情</a></td>
</tr>

<tr>
<td>309e423b19f949e78cb92b17a40545fd</td>
<td>CVE-2024-21354</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Message Queuing (MSMQ)权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90557">详情</a></td>
</tr>

<tr>
<td>e71d52d31e5cce9c2bc1dfa2bc23e4fa</td>
<td>CVE-2024-21353</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC ODBC Driver远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90556">详情</a></td>
</tr>

<tr>
<td>a19bf240d70d6d340d80a9588071291c</td>
<td>CVE-2024-21360</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90555">详情</a></td>
</tr>

<tr>
<td>0131434d65045fc8aa66929ae5359b09</td>
<td>CVE-2024-21361</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90554">详情</a></td>
</tr>

<tr>
<td>931b5c633543d599912f00559d246ccb</td>
<td>CVE-2024-21362</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Kernel安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90553">详情</a></td>
</tr>

<tr>
<td>c17dd078889a4e60f30e38496eca735e</td>
<td>CVE-2024-21363</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows Message Queuing (MSMQ)远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90552">详情</a></td>
</tr>

<tr>
<td>b250bda539d5e13b778552c1e04877f0</td>
<td>CVE-2024-21364</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Azure Site Recovery权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90551">详情</a></td>
</tr>

<tr>
<td>00af3e3b4a05c6ccd5d4f1ffc43f4b03</td>
<td>CVE-2024-21365</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90550">详情</a></td>
</tr>

<tr>
<td>056f0d20f071968db9c829e47ffdbce7</td>
<td>CVE-2024-21366</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Windows WDAC OLE DB provider for SQL Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90549">详情</a></td>
</tr>

<tr>
<td>fd7376cde66e722990e75e8144321522</td>
<td>CVE-2024-20673</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Office远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90548">详情</a></td>
</tr>

<tr>
<td>139b8df1c5583280bb82f6b2f1b9599f</td>
<td>CVE-2024-20667</td>
<td>2024-02-14 05:24:18 <img src="imgs/new.gif" /></td>
<td>2024-02-14 05:24:18</td>
<td>Microsoft Azure DevOps Server远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/90547">详情</a></td>
</tr>
Expand Down

0 comments on commit 7a17cc9

Please sign in to comment.