From 7d682bb5cff565729c386c304f3e4785e67f670d Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Fri, 2 Feb 2024 11:19:53 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 45887488 -> 45887488 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 88e339a6d0d..372ac5818fb 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -165,3 +165,18 @@ b222c98b450c9ee5dcbd117644378cd9 8df89464e6788c91fb3bb1e7b3aa81ed 9c0a7586e6fa4587060e87d4a91e2cee 5e39828dfc4ae074114a2303aa6f25a3 +591f6cf5358ceab1f9750173efad46ef +c69ce03cc4928016f3ed61ea36718f93 +9d29100da7bd0ebef217c7e968482ff8 +4c64a7ccc3854b1216176828bdc4a078 +0168cb70c178bfbed29900ac4913a45c +55105598a3bd530e170cd6a8b68bf68b +e87496e565041016f66e23247902d654 +d18e3548f1198481e4c3c53e41bf37f0 +28354e9a82d0f9224f7669001320334d +76e08efd568583b15385e7b86b1f7129 +d66e3b9093670685cbe46fba23add503 +c3e3db4289edd0c8fa15753f31b9a5ee +dc103490f2dabdc4e42c8415a09a1e81 +8bda70964201aef4764248e4c85b2dfe +6aed15a85c1d6a3d95000229958dbc79 diff --git a/data/cves.db b/data/cves.db index d3990c17600f4fb79fd9bea10862363d83e6eabd..985b68834644297a0e208c1864f9c525352aece6 100644 GIT binary patch delta 4147 zcma*nWtf%a8pZK58)wL&6a+!(X7KI602x3+LP`;Zwf7q$Dy7&8qbwB!CDajc90S2X zML>}d?Cx$c5XJ7oSle^WmvPR~>)OAs&;Nbm-g9<*)ohL|YE`g)aqH58^<^LmhzwDS z*o!D6iip}o9ilE#kEl;HAc~2GL?fax(S&G9>`m-LG$Wc5`w}gPmc)KUE21^AKXCxj zhGk=jqBGHj=t^`Wx)VK!oh>++_97G&U z96}sQ^db5ZhY|gVQldXGfEY*|P7ERj6GMoh#1X_WVmL8^7)cySj3P!8V~DZDIN~Vc zXkt8Z3^9Q?mN<@>NK7JhK3O71L_|y^L`ob_OeRhsrVu9*ClMzTQ;BKBbYccElQ@Mq zm6%1GMx0KZL7YjPMVw8XL!3*TN6aSX5M{*q#0A7$g2aWyMa0F#JYqg^39*1!NL)%> zMl2#06HADt#O1^l#Fa!jaTT$QSWc`Ut|lsoYluqXTH-q5dg2CRC2=FMidaqDMBGf= zLflHMA#NjXC+;BD5_b~oi1ow<;x6KDVk2=6v5DABY$3K1_Y&KP?Zkb={lo*rgTzC` z!^9)Rqr_vx>%<$xo5Wkh+r&G> zyTlISJ>q@h1L8wsC-D)ni};xMgxF1dN_<9qPJBUpNqj|oO?*RqOMFLsPy9gqNc=?n zO#DLpO6(ziBYr3Tn1_OeD3FZQlD(u*ilnyGk-Ab(>PrJDmWI+u8cP#tDtpU5(oCAm zzS2Tk%6`&HTFd@&fV7de(oWh-2k9uCq_cF9uF_4qOAqNOCDKa{6hln0#1=Pf$GDgPAI5|p= zmhp0oOps&cIGHGuB!B){$w?%!B$CSUGFeWLDRQEmBqz&MnI_X^hRl>x_DN z%T=;WmdgscS}Noksg!HwI=NnMkd<+*)YDR0T!@{YVKJLEliUp|lzWv6^3yX0f}M0U%k@|k=tU&xp8m3%GV z$hY#Hd@n!9kMfiJEWgOFvPXWC-{p^jdB|w|B_p+DFDaBFsV#M+uGEwI(m;x(p)``l z(nOld-m;H0ljgFow2+pvpR|(JvcDW4ZKSQVllIaFgf$1==pl4=#la)QK(0yk&HX;Qu7*p^$~ zXt&d*vhUUnnWB2t3d8aRyR1Gddgcp#REQ(fu$|CItvH*DBPVgJC~&khBg~pfU{)`f zreThlo=hFye{^NL?He*JYHT?9MvtmSWG8l9hO_xloj3cnPK^@cwS=XLL;<2-|%!Zxy13(T-LI)aqJp) z^{x1R=$Ah|Wlx71?qY2Iq`b10tmu|seu9?wy~GHTGnV!z;>M^%m!9$q@iUwsqcBA zVVJh1FLUB*o5|PwYPHI*C-=?NlpCDiT#(OosmjG>kSG|WrWpoKVCsq4k!vT8nM-Xy zHEPIt%2lqKv@X-7h8_Kt2=j@~Rf#0(r2N|0&@Z z`9!CxgzK7y>xMzr&c&{6B&Kgfn$95S1-VpeNI3s5k)IdG%ui&;d?G)Q`tTsiX!^nU?99 zz86^fJBXaD;RiKTjDJ(H^LuGuRSEU+reWwWCKnq?E=euZkNhO`^a89jt)XIi|EA*P zEA6T(krzgZVMjV5E6Crwoy4A*WHqH`kcQRA(hh9X{WldiUuj!aaYHlpqSUqBAWE_t j$ur3vQ!~ delta 2589 zcmWmD^M4Qs0EY3~($ccAY};Bkmi1=aUU;iz+bx^RI(PXPugkd0zN_x(hwne|d_GV3 z&1cENF)K|#61z3SrG%LCl!-{FevVyGGRvas?70-%q1zQQMgjOOev6aM1 zY9+IhTPduRRw^sCmBvbIrL)poAyx(}qm{|ZY-O>sTG_1ZRt_ttmCMR)<+1Ww`KT__qE*QXwJKXxtg2QutGZRgs%h1- zYFl-zx>h}_zSY2LXf?9Jtj1OotEtt@YHqc#T3W5F)>a#t*};F ztE|=58f&c;X|1!?TN|v6)+TGSwZ+!NkZ`q}!$`qlc) z`rZ1&x@=vsu3Fcu>(&kHPwS@jmvzg!ZQZf%TKBB`)&uLI^~ic`{cZhYJ+Yoz&#dRx z3+tuz%6e_RvEEwmtoPOj>tE|X>!bC_`W&Hv=?Xv~q9HnBASPlV2(b|daS;#k5sU;# zh(t(?BuI*6NRAXpiBw39G)RkdNRJR?Kt^OjW@JHDWJ7l3Ku+XBZsb8;8KuMHBX_P@(ltXz`Kt)tSC@P~0s-haIqXufC7HXpo>Y^U%qX8PC5yH?I zP0$q0&>St$60Oi0ZO|59`nN-SbU;URLT7YAS9C*n^gvJaLT~gzU-UzN48TAP!e9)+ zPz=LxjKD~Y!f1>^IL2Ze#$y7EiI{}Rh`heMpKu0eaSrEk0T*!zKjRntir?@%{=j8i!Bt$tb=<(8 zxQV}T3%79xcX1E*@c<9;2#@hM{=pMG#WOs|3%tZDyv7^6#XG#m2mFiw@DZQzIUquT z?2kZ1Lv+MIOvFMEVj~XXA|B!+7zvONiI5mckQB*~94U|zsgN3JkQV8X9wEqpjL3w{ z$bziMhV00JoXCaT$b-Ddhx{mjf+&Q-D1xFWhT4JD1)*nhw`X^il~H8R7Mq4 zMKx4M4b(&})J7fDMLpC<12jY3~(fsq)6(HMhpjKw&N#{?J?F$t3qfhm}Z zX_$@~n2A}KjX9W$d6 + @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 591f6cf5358ceab1f9750173efad46ef + CVE-2023-38314 + 2024-02-02 11:17:43 + openNDS空指针解引用漏洞 + 详情 + + + + c69ce03cc4928016f3ed61ea36718f93 + CVE-2023-38315 + 2024-02-02 11:17:43 + openNDS空指针解引用漏洞 + 详情 + + + + 9d29100da7bd0ebef217c7e968482ff8 + CVE-2023-38316 + 2024-02-02 11:17:43 + openNDS空指针解引用漏洞 + 详情 + + + + 4c64a7ccc3854b1216176828bdc4a078 + CVE-2023-38320 + 2024-02-02 11:17:43 + openNDS空指针解引用漏洞 + 详情 + + + + 0168cb70c178bfbed29900ac4913a45c + CVE-2023-38322 + 2024-02-02 11:17:43 + openNDS空指针解引用漏洞 + 详情 + + + + 55105598a3bd530e170cd6a8b68bf68b + CVE-2023-39544 + 2024-02-02 11:17:43 + NEC多款产品身份认证错误漏洞 + 详情 + + + + e87496e565041016f66e23247902d654 + CVE-2023-39545 + 2024-02-02 11:17:43 + NEC多款产品身份认证错误漏洞 + 详情 + + + + d18e3548f1198481e4c3c53e41bf37f0 + CVE-2023-39546 + 2024-02-02 11:17:43 + NEC多款产品身份认证错误漏洞 + 详情 + + + + 28354e9a82d0f9224f7669001320334d + CVE-2023-39547 + 2024-02-02 11:17:43 + NEC多款产品身份认证绕过漏洞 + 详情 + + + + 76e08efd568583b15385e7b86b1f7129 + CVE-2023-39548 + 2024-02-02 11:17:43 + NEC多款产品任意文件上传漏洞 + 详情 + + + + d66e3b9093670685cbe46fba23add503 + CVE-2023-47797 + 2024-02-02 11:17:43 + Liferay Portal跨站脚本漏洞 + 详情 + + + + c3e3db4289edd0c8fa15753f31b9a5ee + CVE-2023-41102 + 2024-02-02 11:17:43 + OpenNDS内存泄露漏洞 + 详情 + + + + dc103490f2dabdc4e42c8415a09a1e81 + CVE-2023-41101 + 2024-02-02 11:17:43 + OpenNDS越界写入漏洞 + 详情 + + + + 8bda70964201aef4764248e4c85b2dfe + CVE-2023-44325 + 2024-02-02 11:17:43 + Adobe Animate越界读取漏洞 + 详情 + + + + 6aed15a85c1d6a3d95000229958dbc79 + CVE-2023-47675 + 2024-02-02 11:17:43 + CubeCart操作系统命令注入漏洞 + 详情 + + 38fdaf1511ce84f8747771aac88fcd7e CVE-2023-40363 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - 972f3b21114620f2ab7fa91903c47554 - CVE-2023-6212 - 2024-01-31 09:20:03 - Mozilla多款产品内存破坏漏洞 - 详情 - - - - 6e496427efd15561f3ad9d46528ef3ba - CVE-2023-6213 - 2024-01-31 09:20:03 - Mozilla Firefox内存破坏漏洞 - 详情 - - - - 74e4ba34d4b2b0dbe3291d6ba422c4bd - CVE-2023-21416 - 2024-01-31 09:20:03 - AXIS OS拒绝服务漏洞 - 详情 - - - - 90eea45d2b36254835a96f7bb2ebcd5f - CVE-2023-21417 - 2024-01-31 09:20:03 - AXIS OS路径遍历漏洞 - 详情 - - - - e0463769e81390bc771df5185d308215 - CVE-2023-45886 - 2024-01-31 09:20:03 - F5 BIG-IP拒绝服务漏洞 - 详情 - - - - fd548045944d59ff5498d58bfa938b18 - CVE-2023-42770 - 2024-01-31 09:20:03 - Red Lion Controls SixTRAK和VersaTRAK Series RTU身份认证绕过漏洞 - 详情 - - - - af7b4c71a2247009daecb5eba2f3bda3 - CVE-2023-6144 - 2024-01-31 09:20:03 - DevBlog授权绕过漏洞 - 详情 - - - - 39508da40b5cb2476c498a85ee48a8bf - CVE-2023-6142 - 2024-01-31 09:20:03 - DevBlog跨站脚本漏洞 - 详情 - - - - a435207d2571e9adce170c54973f3c6c - CVE-2023-40151 - 2024-01-31 09:20:03 - Red Lion Controls SixTRAK和VersaTRAK Series RTU危险方法或功能漏洞 - 详情 - - - - e480554b7c5bbb4fc2deb703af76f66b - CVE-2023-6199 - 2024-01-31 09:20:03 - Book Stack服务器端请求伪造漏洞 - 详情 - - - - a84a8041b1a85b1ae386cf32f7fe48ca - CVE-2023-48051 - 2024-01-31 09:20:03 - upydev加密长度不足漏洞 - 详情 - - - - fa4e24e1fc791f1b012386989d5f8874 - CVE-2023-48310 - 2024-01-31 09:20:03 - TestingPlatform输入验证错误漏洞 - 详情 - - - - 696f6288c6a989864563aa3683782e9c - CVE-2023-48192 - 2024-01-31 09:20:03 - TOTOLINK A3700R代码注入漏洞 - 详情 - - - - 9cd3f01a1cf3e823c2e7b0185c0f04bf - CVE-2023-48176 - 2024-01-31 09:20:03 - WebsiteGuide不安全权限漏洞 - 详情 - - - - 74827c4ebfbb3d04707793bc1c7a3daa - CVE-2023-6178 - 2024-01-31 09:20:03 - Tenable Nessus任意文件写入漏洞 - 详情 - -