Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Apr 16, 2024
1 parent 3e447a3 commit 8ea865f
Show file tree
Hide file tree
Showing 4 changed files with 96 additions and 79 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -153,3 +153,18 @@ b3e11e47a7399c56dcbad2f8f190b0a5
0f05f207e52095f7ccc12dc44e02c600
2f43c7eb600e18bd279f37860af6e2c5
64558045a0100ab1fdbda7abfe433da5
374cbb1c703cb11c1c3f74e0cf64fafa
3b21ab8def1aadf83c14cdcbf6db7d7a
c8af76a5d61d237b671997c2743c7092
3e0dd09df222f018ca8279834246a2f9
bab1e266a758b522e5b7d2ab9f776ba8
c734cc2a02fdd56d7522f5334e3f6515
7d4474474a5aa40449b20425876d3390
60e2c7763003f69e7008e36740725c90
c256421482f704add82a9fe6b64ac78f
22029dda9bd19a9d0b3d47dc569a903d
1ba0be778f9db6f82d8f8530a0544dff
61f45281cc206c09ac57f464ad89299a
eb074d4ff2ded54d31ee75ebe6ea6cff
51da69b5b7917889a7068c667c383de4
f50a5761605751a0142092a6c2c11321
2 changes: 2 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -124,3 +124,5 @@ f8aa964dcb4956c9baacad51d77f32bc
62f2b04710edcb61e6205b457d95317d
727168f026184cc424466bbecdef04bd
3a71226a12484d9d0e5a316e649805d8
4b1ed5c5fa69e2567bde2232e0664e40
db365e10ea056dd575cae6fecdd57688
Binary file modified data/cves.db
Binary file not shown.
158 changes: 79 additions & 79 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-04-15 23:23:16 -->
<!-- RELEASE TIME : 2024-04-16 03:25:30 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,23 +366,23 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>34289f659d466a7e6c7c77846c04e973</td>
<td>CVE-2024-3762</td>
<td>2024-04-14 22:15:58 <img src="imgs/new.gif" /></td>
<td>2024-04-14 22:15:58</td>
<td>A vulnerability was found in Emlog Pro 2.2.10. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/twitter.php of the component Whisper Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260602 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-3762">详情</a></td>
</tr>

<tr>
<td>7b365de29b57e13e83919e392bd443f1</td>
<td>CVE-2024-24863</td>
<td>2024-04-14 13:15:49 <img src="imgs/new.gif" /></td>
<td>2024-04-14 13:15:49</td>
<td>In malidp_mw_connector_reset, new memory is allocated with kzalloc, but no check is performed. In order to prevent null pointer dereferencing, ensure that mw_state is checked before calling __drm_atomic_helper_connector_reset.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24863">详情</a></td>
</tr>

<tr>
<td>659aedab25cbfdcf57ce246f4ec11de4</td>
<td>CVE-2024-24862</td>
<td>2024-04-14 13:15:48 <img src="imgs/new.gif" /></td>
<td>2024-04-14 13:15:48</td>
<td>In function pci1xxxx_spi_probe, there is a potential null pointer that may be caused by a failed memory allocation by the function devm_kzalloc. Hence, a null pointer check needs to be added to prevent null pointer dereferencing later in the code. To fix this issue, spi_bus->spi_int[iter] should be checked. The memory allocated by devm_kzalloc will be automatically released, so just directly return -ENOMEM without worrying about memory leaks.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-24862">详情</a></td>
</tr>
Expand Down Expand Up @@ -2092,123 +2092,123 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>05e7572713c0467fb334f2f75a9c3b45</td>
<td>CVE-2022-22399</td>
<td>2024-04-12 03:23:03</td>
<td>IBM Aspera Faspex HTTP标头注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93405">详情</a></td>
<td>374cbb1c703cb11c1c3f74e0cf64fafa</td>
<td>CVE-2024-20712</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Adobe Substance 3D Stager越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93450">详情</a></td>
</tr>

<tr>
<td>b934e59552c8702826087b924ad60590</td>
<td>CVE-2024-23225</td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93404">详情</a></td>
<td>3b21ab8def1aadf83c14cdcbf6db7d7a</td>
<td>CVE-2024-20713</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Adobe Substance 3D Stager越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93449">详情</a></td>
</tr>

<tr>
<td>4e33ea8aef29c13be04d319b35e70215</td>
<td>CVE-2023-26282</td>
<td>2024-04-12 03:23:03</td>
<td>IBM Watson CP4D Data Stores文件名称或路径外部控制漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93400">详情</a></td>
<td>c8af76a5d61d237b671997c2743c7092</td>
<td>CVE-2024-20711</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Adobe Substance 3D Stager越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93448">详情</a></td>
</tr>

<tr>
<td>3890256ede4452caf3e677882e696ef7</td>
<td>CVE-2024-2055</td>
<td>2024-04-12 03:23:03</td>
<td>Artica Proxy身份认证绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93399">详情</a></td>
<td>3e0dd09df222f018ca8279834246a2f9</td>
<td>CVE-2024-20710</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Adobe Substance 3D Stager越界读取漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93447">详情</a></td>
</tr>

<tr>
<td>ba87d30e444276f673f3825261277ee1</td>
<td>CVE-2024-23243</td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93398">详情</a></td>
<td>bab1e266a758b522e5b7d2ab9f776ba8</td>
<td>CVE-2024-0310</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Trellix Endpoint Security跨站脚本执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93446">详情</a></td>
</tr>

<tr>
<td>332c242c828a704ed5f98897a9129ea0</td>
<td>CVE-2024-23296</td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS内存破坏漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93397">详情</a></td>
<td>c734cc2a02fdd56d7522f5334e3f6515</td>
<td>CVE-2023-48248</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner跨站脚本执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93445">详情</a></td>
</tr>

<tr>
<td>c252fd3f15b3d15380ba26dc52a8afc6</td>
<td>CVE-2024-23256</td>
<td>2024-04-12 03:23:03</td>
<td>Apple iOS和iPadOS逻辑漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93396">详情</a></td>
<td>7d4474474a5aa40449b20425876d3390</td>
<td>CVE-2023-48252</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner不合理授权漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93444">详情</a></td>
</tr>

<tr>
<td>5abefba26277d8cee0b9c4c7bf847f09</td>
<td>CVE-2024-1356</td>
<td>2024-04-12 03:23:03</td>
<td>Aruba Networks ArubaOS命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93395">详情</a></td>
<td>60e2c7763003f69e7008e36740725c90</td>
<td>CVE-2023-48253</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93443">详情</a></td>
</tr>

<tr>
<td>7c796199f0ba4ec3d406dbe761df0a15</td>
<td>CVE-2024-20840</td>
<td>2024-04-11 13:22:51</td>
<td>Samsung Voice Recorder访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93362">详情</a></td>
<td>c256421482f704add82a9fe6b64ac78f</td>
<td>CVE-2023-48251</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner硬编码凭据使用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93442">详情</a></td>
</tr>

<tr>
<td>ca73a9afdc1bcf67ae254d281e869309</td>
<td>CVE-2023-42419</td>
<td>2024-04-11 13:22:51</td>
<td>Cybellum硬编码私钥漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93361">详情</a></td>
<td>22029dda9bd19a9d0b3d47dc569a903d</td>
<td>CVE-2023-48250</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner硬编码凭据使用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93441">详情</a></td>
</tr>

<tr>
<td>6c72ab15071fdb079e5ee4df3213e205</td>
<td>CVE-2024-27627</td>
<td>2024-04-11 13:22:51</td>
<td>SuperCali跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93360">详情</a></td>
<td>1ba0be778f9db6f82d8f8530a0544dff</td>
<td>CVE-2023-48255</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner跨站脚本执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93440">详情</a></td>
</tr>

<tr>
<td>30af9581a8aad0636dea26728df0c7c4</td>
<td>CVE-2023-45597</td>
<td>2024-04-11 13:22:51</td>
<td>AiLux imx6公式元素中和错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93359">详情</a></td>
<td>61f45281cc206c09ac57f464ad89299a</td>
<td>CVE-2023-48249</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo Cordless nutrunner路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93439">详情</a></td>
</tr>

<tr>
<td>7ecabc54fbd9ba486d1eff76e6551e05</td>
<td>CVE-2023-5456</td>
<td>2024-04-11 13:22:51</td>
<td>AiLux imx6硬编码凭据使用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93358">详情</a></td>
<td>eb074d4ff2ded54d31ee75ebe6ea6cff</td>
<td>CVE-2023-48254</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner跨站脚本执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93438">详情</a></td>
</tr>

<tr>
<td>214f57797af8c7207b5238db1f272604</td>
<td>CVE-2024-20838</td>
<td>2024-04-11 13:22:51</td>
<td>Samsung Internet输入验证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93357">详情</a></td>
<td>51da69b5b7917889a7068c667c383de4</td>
<td>CVE-2023-5455</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Red Hat FreeIPA跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93437">详情</a></td>
</tr>

<tr>
<td>57e147f23673a0b0e53d9cb31f2daa6a</td>
<td>CVE-2024-20839</td>
<td>2024-04-11 13:22:51</td>
<td>Samsung Voice Recorder访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93356">详情</a></td>
<td>f50a5761605751a0142092a6c2c11321</td>
<td>CVE-2023-48257</td>
<td>2024-04-15 03:23:20 <img src="imgs/new.gif" /></td>
<td>Bosch Nexo cordless nutrunner身份认证错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/93436">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit 8ea865f

Please sign in to comment.