From 8ea865f8ce524307a9ffd40896ba3057060cef00 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Tue, 16 Apr 2024 03:25:31 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++++ cache/RedQueen.dat | 2 + data/cves.db | Bin 47099904 -> 47099904 bytes docs/index.html | 158 ++++++++++++++++++++++----------------------- 4 files changed, 96 insertions(+), 79 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index d68c57190ac..cfe125175bf 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -153,3 +153,18 @@ b3e11e47a7399c56dcbad2f8f190b0a5 0f05f207e52095f7ccc12dc44e02c600 2f43c7eb600e18bd279f37860af6e2c5 64558045a0100ab1fdbda7abfe433da5 +374cbb1c703cb11c1c3f74e0cf64fafa +3b21ab8def1aadf83c14cdcbf6db7d7a +c8af76a5d61d237b671997c2743c7092 +3e0dd09df222f018ca8279834246a2f9 +bab1e266a758b522e5b7d2ab9f776ba8 +c734cc2a02fdd56d7522f5334e3f6515 +7d4474474a5aa40449b20425876d3390 +60e2c7763003f69e7008e36740725c90 +c256421482f704add82a9fe6b64ac78f +22029dda9bd19a9d0b3d47dc569a903d +1ba0be778f9db6f82d8f8530a0544dff +61f45281cc206c09ac57f464ad89299a +eb074d4ff2ded54d31ee75ebe6ea6cff +51da69b5b7917889a7068c667c383de4 +f50a5761605751a0142092a6c2c11321 diff --git a/cache/RedQueen.dat b/cache/RedQueen.dat index bb65904f837..dfd71c5c52b 100644 --- a/cache/RedQueen.dat +++ b/cache/RedQueen.dat @@ -124,3 +124,5 @@ f8aa964dcb4956c9baacad51d77f32bc 62f2b04710edcb61e6205b457d95317d 727168f026184cc424466bbecdef04bd 3a71226a12484d9d0e5a316e649805d8 +4b1ed5c5fa69e2567bde2232e0664e40 +db365e10ea056dd575cae6fecdd57688 diff --git a/data/cves.db b/data/cves.db index 73b2b889530bf6215cbe822c27e63079bc9c90f5..3c991630f190aa058b7ae3abd7baa815a935946a 100644 GIT binary patch delta 4320 zcmaLZ3A9aR9|rK8&_y>x5=q90-0XP>2^m8YQdG}Ad+#F=nW90t=@H4)q=G{X?OdT-DToS0 zhS-;=NK_&!6Z;WGL=~bcQH|K2C?*adsuMMcnnW$)K%zEr5K)IXn5awCBMu?z6NeHF zh{K46L?fax(S&G9G$RftniDOEBZ!tnE8<9^HBmwwMYJId!XzxhCLF>gJi;deA|#F` z+7j)E_QWwn2jWtuGh-t)h;&NgJaRo7x zm_^Jc<`8p$mxz~%SBO`M*NE4N zH;6Zhw}`iicZhe1_lTXuE@C(FKJfwZA@LFMG4ToUDe)QcIq?PYCGi#UHSrDcE%6=k zJ@EtaBk>dQGw}=YAL7^Ps4x>1BqRGuMX4l}Wj`sBDpFOd$^KF-2S|0PAvL9z94NKr zAgLna<+_=QF4xqmN7C`#>sd& zS0>0rIZw`)3**RWwFAL-bStyGnFNm36XS?w1YnfNYda@}N8<56dI+s5~Z*%M-F$o|G-JRkq1?*&$EK)AEcw zE6>UE@`Ai5FUiaDio7bX$?NilyeV(V+wzXQEAPop*(JN>efdB>l#k?N`9waI&*XFY zLcWx*v{FEA`|MsV|301363@N+W43O{A$blf$LCw2&jDrL>YGrL~mE zQPM^XF~t&F9C5`HUjhl`XlX0$q`e#?9pqT)D4nFU94B3*t8|m@(nEU6@zP6rOCLEw z`pSvYPfn8lGC&5($udYzkyB-`43X31bU8x``;R0mu_Tg8PKL^vGEB~r;W9$bmXR__ z&XLhFM#joG887F`1eqx3$@y}DTqu*|BDq*5OQ~EUQ{+;iOqI)InoO6=WrkcKGi8>{ zmN_z4u9U0fYPm+Pm3eZVTrcxwf!rVqWs&4%u`H3La-%Gho8)G>MQ)Yb&n(L~ua&8|PjS2b=U4l_+Q6zSs}@&@iq;g>-Y>1Zs&dszNyRl4>+d@%bKmM3 zi~GK!FPg1c)~QPGdM!KeQ(WpMS=)0{(?}!3^^(N(-8f3UTpAaC_kv*ex}`hk%<4R_ zONnJzPKjj)q2DtdIegf>FM7UTJ72bCdBz?Q_-339;u8H+w!|^aq$Kdeu*9_7$aS1J zcC4h-Wm(5U)d7X7PS#8lH+FN87p9i$`Pn43EZa&A&vR18*h|%*yz0oY`PuRMOz+eW zZQqZ~sKhf6lQSBXJ|NY z=c49y@-=#I%M|6eYmmz2gII+UL1|-_wJ($yu0cFA=eSm2#<691u@OeG>*pL#`wc=X z45NJM?CqHYi^EQ%#>Qth>XS|!)u?lRN#Sq#3ku6B&n<5~EVSNkPwQqjGP0@f2e~lG zdbz+#f?VL*hK`-%BztY${kPT&B^;x)70cQdN=#DgmQHAxBvF`6%rFWQBWov)pTw@G zPllcBWjjWBi3a%1HAQ=soGNj;Ujr+G)-=w2maOqA-_wS?wm)SbIq~ z{~_Hh^lp_lWLa29A6i(uky^3ud$wWNIo%20FoM+fe8=!DHxBbl&e4V|xcR~52eNa; zZJD}%YPUSlE^WrLpb$7(fqvpRe&Hu_qsTEFC(K%gW4VFvCAR&0V8*q6Yq9!!Yi918 zGi~>rsk>%P+qG~?ev{5f?LW?l;}o8yU&t<8rP#N1sjbMca(YX6iSJrg&b4hPRqw9p z{&q$x1poH@dKGrymNsFTr`Q&w6q}9oR5Ur^K*L zqyLz6#E4-N=RIw=YW26%-K9{%D{a6sx6pa45_W1Ni4i6_OC1|#5J!RKhk@-_ju%Yw2cpOAI--}$mh7!y6vz~8;p&whm zW5>SUHG2s+^QHZYGWGtJUfz08NVoT-+gZzuvO$vO%qU87fgPJpoW$9jmuO9Xw3qb! z+s}8%wE1h(VIkJ~Bi47~Y}QnRcAPcM*o^I*@1#bY^PF6i+gq&l4^3CnzFlKuyXD(6 Hk7WJ}rrZic delta 2668 zcmWmDRhJb607YT%rDN#s?v9~`?(VKbcXtnQfT6p)ySrxSMx{|oK|#TmP*B`He1BlC zwZoqtOA(GaX#=5i(^U?Hj+Yg%f>tyux)sBUX~nW)TXC$oRy-@d6=Ef@5?YC@#8wh3 zsg=x1Zl$nNTB)qmRvIgu<*f2n1*@V}$*OEsv8r0ttm;+`tEN@U zs%_P=>RR=z`c?z0q1DK0Y&Ef(TFtEHRtu}8)yisZwXxb-?X30|eL7ejtxi^FtBcju z>SlGfdRRTJURH0bkJZ=eXZ5!RSOcv=)?jOhHPjkr4Yx*EBdt-^Xlsl$)*5GpTjQ+> z)`YV_0|S!qqWJ}Y;Cc&THCDc)(&f@waeOV?XmV+`>g%e0qdZ3$U1Btv5s2D ztmD=R>!fwcinOAv)7Ba5taZ*hZ(Xo1T9>TL))nijbo_0a$g(Fl#v z1WnNl&Cvoa(F(2625r#}?eTyA4(NzZ=!`Dtif-tR9_Wc)=#4(;i+<>j0T_ru7>pqp zieVUz5g3V47>zL)i*X3Ycuc@VOoA~PQ!o_~n1<Mb9{j>aTB+28+ULQ_i!H%@D;wsLp;J` zJi$|ZgKzN+&+#3;#|yl~5BL$U@ESkiXZ(U+@f&`}ANUh*@D}gz9)IC)e85NigMaZU z5TPLZBZz2-ju?oEScr`{h>LiLj}Rn4LL@?BBtcRnLvo}*N~A(+q(NGwLwaODMr1-} zWIt^6hToGLve(n1WKY5N}~+IP!{D-9u-g#l~5T~ zP!-is9W_uBwNM*%P#5)39}UnDjnEiP&=k$k94*iit06fR5;d&gg=! z=!Wj-fu87v-spqA=!gCofPol3~(fsq)6(HMiV7>96-#{^8oBp8!11yd1$ zX_$@~n2A}KjX9W$d6pfzIEhn;L=;Zr49?;l&f@|u;u0?73a;WBt_M%* qMsUOG7=e(m&q5*-M}-CQ1|u^?wF}0MySdPsCV|MXoi~E#g8u>4 + @@ -366,7 +366,7 @@

眈眈探求 | + 2024-04-14 22:15:58 A vulnerability was found in Emlog Pro 2.2.10. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/twitter.php of the component Whisper Page. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260602 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 详情 @@ -374,7 +374,7 @@

眈眈探求 | + 2024-04-14 13:15:49 In malidp_mw_connector_reset, new memory is allocated with kzalloc, but no check is performed. In order to prevent null pointer dereferencing, ensure that mw_state is checked before calling __drm_atomic_helper_connector_reset. 详情 @@ -382,7 +382,7 @@

眈眈探求 | + 2024-04-14 13:15:48 In function pci1xxxx_spi_probe, there is a potential null pointer that may be caused by a failed memory allocation by the function devm_kzalloc. Hence, a null pointer check needs to be added to prevent null pointer dereferencing later in the code. To fix this issue, spi_bus->spi_int[iter] should be checked. The memory allocated by devm_kzalloc will be automatically released, so just directly return -ENOMEM without worrying about memory leaks. 详情 @@ -2092,123 +2092,123 @@

眈眈探求 | 详情 + 374cbb1c703cb11c1c3f74e0cf64fafa + CVE-2024-20712 + 2024-04-15 03:23:20 + Adobe Substance 3D Stager越界读取漏洞 + 详情 - b934e59552c8702826087b924ad60590 - CVE-2024-23225 - 2024-04-12 03:23:03 - Apple iOS和iPadOS内存破坏漏洞 - 详情 + 3b21ab8def1aadf83c14cdcbf6db7d7a + CVE-2024-20713 + 2024-04-15 03:23:20 + Adobe Substance 3D Stager越界读取漏洞 + 详情 - 4e33ea8aef29c13be04d319b35e70215 - CVE-2023-26282 - 2024-04-12 03:23:03 - IBM Watson CP4D Data Stores文件名称或路径外部控制漏洞 - 详情 + c8af76a5d61d237b671997c2743c7092 + CVE-2024-20711 + 2024-04-15 03:23:20 + Adobe Substance 3D Stager越界读取漏洞 + 详情 - 3890256ede4452caf3e677882e696ef7 - CVE-2024-2055 - 2024-04-12 03:23:03 - Artica Proxy身份认证绕过漏洞 - 详情 + 3e0dd09df222f018ca8279834246a2f9 + CVE-2024-20710 + 2024-04-15 03:23:20 + Adobe Substance 3D Stager越界读取漏洞 + 详情 - ba87d30e444276f673f3825261277ee1 - CVE-2024-23243 - 2024-04-12 03:23:03 - Apple iOS和iPadOS内存破坏漏洞 - 详情 + bab1e266a758b522e5b7d2ab9f776ba8 + CVE-2024-0310 + 2024-04-15 03:23:20 + Trellix Endpoint Security跨站脚本执行漏洞 + 详情 - 332c242c828a704ed5f98897a9129ea0 - CVE-2024-23296 - 2024-04-12 03:23:03 - Apple iOS和iPadOS内存破坏漏洞 - 详情 + c734cc2a02fdd56d7522f5334e3f6515 + CVE-2023-48248 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner跨站脚本执行漏洞 + 详情 - c252fd3f15b3d15380ba26dc52a8afc6 - CVE-2024-23256 - 2024-04-12 03:23:03 - Apple iOS和iPadOS逻辑漏洞 - 详情 + 7d4474474a5aa40449b20425876d3390 + CVE-2023-48252 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner不合理授权漏洞 + 详情 - 5abefba26277d8cee0b9c4c7bf847f09 - CVE-2024-1356 - 2024-04-12 03:23:03 - Aruba Networks ArubaOS命令注入漏洞 - 详情 + 60e2c7763003f69e7008e36740725c90 + CVE-2023-48253 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner SQL注入漏洞 + 详情 - 7c796199f0ba4ec3d406dbe761df0a15 - CVE-2024-20840 - 2024-04-11 13:22:51 - Samsung Voice Recorder访问控制错误漏洞 - 详情 + c256421482f704add82a9fe6b64ac78f + CVE-2023-48251 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner硬编码凭据使用漏洞 + 详情 - ca73a9afdc1bcf67ae254d281e869309 - CVE-2023-42419 - 2024-04-11 13:22:51 - Cybellum硬编码私钥漏洞 - 详情 + 22029dda9bd19a9d0b3d47dc569a903d + CVE-2023-48250 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner硬编码凭据使用漏洞 + 详情 - 6c72ab15071fdb079e5ee4df3213e205 - CVE-2024-27627 - 2024-04-11 13:22:51 - SuperCali跨站脚本漏洞 - 详情 + 1ba0be778f9db6f82d8f8530a0544dff + CVE-2023-48255 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner跨站脚本执行漏洞 + 详情 - 30af9581a8aad0636dea26728df0c7c4 - CVE-2023-45597 - 2024-04-11 13:22:51 - AiLux imx6公式元素中和错误漏洞 - 详情 + 61f45281cc206c09ac57f464ad89299a + CVE-2023-48249 + 2024-04-15 03:23:20 + Bosch Nexo Cordless nutrunner路径遍历漏洞 + 详情 - 7ecabc54fbd9ba486d1eff76e6551e05 - CVE-2023-5456 - 2024-04-11 13:22:51 - AiLux imx6硬编码凭据使用漏洞 - 详情 + eb074d4ff2ded54d31ee75ebe6ea6cff + CVE-2023-48254 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner跨站脚本执行漏洞 + 详情 - 214f57797af8c7207b5238db1f272604 - CVE-2024-20838 - 2024-04-11 13:22:51 - Samsung Internet输入验证错误漏洞 - 详情 + 51da69b5b7917889a7068c667c383de4 + CVE-2023-5455 + 2024-04-15 03:23:20 + Red Hat FreeIPA跨站请求伪造漏洞 + 详情 - 57e147f23673a0b0e53d9cb31f2daa6a - CVE-2024-20839 - 2024-04-11 13:22:51 - Samsung Voice Recorder访问控制错误漏洞 - 详情 + f50a5761605751a0142092a6c2c11321 + CVE-2023-48257 + 2024-04-15 03:23:20 + Bosch Nexo cordless nutrunner身份认证错误漏洞 + 详情