From b3e555077ba13476f1464133bedbbb1e12a771ff Mon Sep 17 00:00:00 2001
From: Github-Bot <github-bot@example.com>
Date: Tue, 19 Mar 2024 07:22:18 +0000
Subject: [PATCH] Updated by Github Bot

---
 cache/Nsfocus.dat |  15 +++
 data/cves.db      | Bin 46698496 -> 46698496 bytes
 docs/index.html   | 242 +++++++++++++++++++++++-----------------------
 3 files changed, 136 insertions(+), 121 deletions(-)

diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat
index 90c193a6d6d..e0c280907a0 100644
--- a/cache/Nsfocus.dat
+++ b/cache/Nsfocus.dat
@@ -159,3 +159,18 @@ ad075e4a54cb5cbeee1fd53ca2e540b1
 1a1bc4c718af3635dd3394bdb0a7147b
 10a2efd3b14564b2981b7a7041637326
 0d81910b9fe99afa5c6462e89de370cd
+5ce69dd3174e5a3a0e0342e212fdaa77
+3530fc9a09e620e6b33160d96d8a5ed1
+72abbc2cf8f1db408564add1cf9285d3
+8810fc95262bf5466b41d8c8691e7dd7
+790a3a2a2ab45f308085fec908f6c0ce
+6666bf24cbf3001ec2541eab50ae6013
+f7ca54586218980a3ab360a06eb12ad2
+a160ce114474a674a22e5ed9317fdd70
+3b821c795726573468aad8e83efc689d
+cecff1a9d753fd63aa80ef06de85011e
+acc29703b4c7f516901155fef6708603
+046f810ee7d34f8783c666d83a7670d9
+095639ced36d0366b4b3c1d54e63db12
+34df67c7ff4cfffe4ab5d71235b73396
+6bd7854606a3229da2a17f094882d108
diff --git a/data/cves.db b/data/cves.db
index 8e3fab5ab97bda206bd5391b0d8d375bac2c3c66..79784366257c31af56b76e3d318c9008207e21e6 100644
GIT binary patch
delta 4175
zcmZwHca&4*76tG(q4(Yg7!*a+!P|0+iqea8X(E<=lbcW+7~0S*5Mir;NU?w-1_4XN
zLPtad8({CfSHz0F@_ak^)>|;VmG#SCS!aLeeCNyTRjV7%mc=a!)+{OPTCgSqqJW4I
z6^M#NC89D>g{VqYBdQZMh?+z#qBc>7s7ur%>Jtr!hD0NxG0}u*N;D&y6D^2Bq9xIa
zXiXFmZHVKD<B7J!3B-v+JK`jwJ#jK|3UMk?OmrYlBMibMEW#!nB2Ku3NBBfQoKBoU
zoJn*f&LYkxIuV_TE<{(N8_}KULG&bg5xt3Xh(1JLq94(p7(fgp1`+2HgNY%;P+}M{
zoH&mdL7Y#FBrYH>BrYN@CN!UrNDxUPB2q+}7)6XG#t>tPONbI;95J3KB_<FPiAls{
zVhT}4OeLlf(}@|xOyW}FGU9UL3St&9o5&DX5_5>T1c|GNtBGrfdBl8T0dXy{khqRm
zL@Xwj5KD>ci5rL;iJORJ#B$<h;uc~BaVxQsxQ)mXtBBi))x;WNEpZ2NCvg{XH<2Um
zA=VN16891J6AuvUi4DX?ViU2M*g|Y2wh<2!+lhyW9mK=LPT~<_7qOdolz5DIoOptG
zlGsD+CH4_d5l<7(5YH0N5ziAZ5HAuh5ib+35U&!i5w8<(5N{H15pNUk5bqN25$_Wp
z5FZjB5g!wu5T6pC5uX$Li7$u)#FxZZ#Mi_(#J9wE#6jYF;s@eK;wR!~;uqpq;y2=V
z;t%3a;xFP5@o(bqc_>(j0*OflsVJ4CvQ&|(QcbE$4XG)$q_)(Nx>8T-O9N>rjij+O
zk*3m2noA2Ql$O#;T1%0%k>lieX)7nliPBC^lJ;`4oFb=6v2>8r#1K;~vBi<NxZ;T~
zft)U9$eGen&XTjGlXR9Y(p9=icj+NLrI+-UbEJ>-m44D+2FO4eB<IRt86rbvm<*Tm
zWQ3eABjp0QP%e^-B|raA5|WfiQj(TYGFrySSh++>WSoqbQkftVWs*#mDN-g=WtvQv
z88TBYmCNLExk6^iY{|%#GDqeL<tn*au90~%Ulz!<vQVy*MY33y$WpmpZjc-0CRrxS
z<z~4>R>-ZgQf`y1tdiShwXBh~a);b0cgfw7lY3;H+$;CV{qlgUmkqK}Hpyn$B3osf
zJSf}cA=x1h%T9SjcFAseR34MZ<q3IG_Q+n@Cr`=K@{Bwy&&l)hg1jg%$;<MJyehBB
z>+*)YDR0T!@{YVK@5%e}fqW<*$;a}Ed@7&G=dxeEkOT6id?jDYH}b7~CkN$w`9Xe^
zpX6uxMShjv<ahZ){*=Guko;TzE|`ayp1;JTf>e}BQdz1<RjDS`rH0g$T2fo;NL{HX
z^`(I{lt$86nn+V=Ce5XV6iQ2JC9S1M+Q@NoytI`Q<V0yFCrNubSx%8trC2)1X<~>e
zme}G*TwL+Qmq1RJGvrL^C}+vp(n&f?7wIb9q`UNxp3+Nt%Q@0V`bt0PF9T$t43cwY
zundu*GE9ccc``!ImyvRTTqqaG#gd<YC<#eQBq>SDC>bqdWUO2wB{ELNOQ}qdi84th
z%M>Y-sWMHb%M6(*m&#>wxm+Q$WVU4FN|_^bg>sc#E!W6AnJ)|ET3IO9$s$=SOJu2B
zFE_}Ia+55R<#My!A}i!pSt++kR#wUFvRc;2TDe2+l)L0^$;mykPVSZa<bHWT*2@Oj
zD4S%nY>}<9O&*l(@{sJ1hh?WcBD-X_JSvaL<MM<&DSKpZY$x``*3N2Izrwr!s?)A^
z|5{}=->BKP#{B9Bst>KUsajFhxm6BSu_`aGT)k4?ipwf&t2cZ3GqGhwb$fqaoN<|J
zRjpsM_L&BDt-)?0^8C2t8g6J?RuF|&XnJWQaD3m2Od~sS_vToG?9j>^V#Uig&6(UH
zd$4R@ta8Pm$ndhA226~#4Fc1*y^O(J%fm&hsHp8kY1d17>9mtfr_(7XOvEG4wCs4o
zv+cm$zhl?_71@=CHpGH#d$)P4QFW)-u#3%dRsBrBT;buW%~aJ0;;tPeQ<3dPhV8lu
zCt)YeDDI?OJ4%?=KUK3&73Rxs8Sqm<o$T||_rw|<aoAq@!v>jZ%(bZ6uUWf}`Kpea
z_Dv&|@*>+w`<`znUDu6#JM>)7h=PBrb{*Ee*fK1;*bTgRzmoK_^;_eOvPIVRSmi25
z9lVbc93#_+x#szVp-KpoNh|OSJK<;|anlV9(~QT{DUHbRUBf;$!BIj<>9p)iOM`+o
z*&=7}Q4{Z(k1#V9bIlIVriL<-DGk~TgUE~9>BzOi&^J<P!;MmYTyd##8J1^yR<`py
z8)Gf9wHM8ewL9iohv!4AOk?Jn=KC0~3_IalX3`7dp5?|p+j0FcjQo^ur_xE+52A7z
zuIC1w$AvS;j2~6hcg&P2C8?r;r6t)Ve+?~YoLyh{=$;1U<Lpcm=9(z3eLgNUT_c$?
zO~>(^&=t!{#ZysWYd@pNGs?x;UfgjyPY9Evl~YzSIorma7i)P;Up?|cPNp_<jq^d>
z6_oapVcd!Pu4VdxZ-jQ3uw5fG+?19ojQ+b<|J#7L;aYxn$>^c6*4f2h?m6me2Is5C
zGcB2Gl%HBk)wN7+B5gUzMA|kCGnKUBj+xSfFv65;nB{L@KQYUS6D6h7i-rv7GNQPz
zl?`X?iM2aoi4U)so2kQG!+c0@g?K^!*p@yCC$1dd@U>vc!0^*<Qd2B9D=o46&x$P@
zw612;Z2y`2V%3gFIDGkDrjWS?`Glkre7%u$GKgEQl}PLVLa)z^{G{&&re03ul~3?o
z|NmV6!O@*!g~vShf%&QV`8QKPe<y?U4XKkv(n_ZNv>7EFwc|Qr6q(6%VEOT={M6#6
z9T;Ov%O;HvOD2?!%Wim~QbFM{cRx0t6J$CtSMTt{sh}V`Zs+?7jUeS(M#@dtw)QRx
z^bZhf+stx(Ie}qYeY<rYSTv-xw4|tuu4!<pB(1MWQ^zE=dEw;A(@G~r*^dtGiM2Um
zq<xhgH!{tbtDEm}q@v@=lp92m_Ss3rb$v$4upKL9nN~UqL$CZu9oMwYo|D2c+U?8~
Zr=V@N)89vLU!{D8xvOm9zSx4;e*o@3!9@T7

delta 2648
zcmWmD^M4lz0EhA0ch%Cexoq3E?fPW9Wh{KERg25Ejpbz?Ix`;PT|B0H`r-W#Jg?Ui
zv2H_}2+YqI6ulr*jiBhsvVyFD6>P<^;#%>n5G%fwz)EN(vJzXNRuU_zmCQ<RrLa<3
zsjSpi8Y``p&Ps1(urgYitjtyxE2|Y|WwWwdIjo#kE-SZ{$I5Hvv+`R7tb$e{tFTqX
zDryz8id!YDl2$3Jv{l9`Yn8LgTNSK|Rwb*lRmG}mRkNyFHLRLeEvvRw$Es`9v+7$7
ztcF%2tFhI@YHBsJnp-WbmR2jPwbjOIYqhi5TOF*9Rwt{o)y1MuSF4-V-RfcWw0c>+
ztv*&?tDn{18ek2y23doxA=Xf9m^IuQVTD^Gtx?u!Ym7D48fT5SCRh`#Nmhh4*_vWa
zwWe9Nrdu<tnO3AV%bIP?v7)TG);w#zwZK|vEwZAm#nuvQskO{nZmqCZTC1$p)*5TA
zwa!{^ZLl_4o2<>&7Hg}u&Dw75uy$IztlicgYp=D>+HW1O4qAt-!`2Zi#yV;pvyNLQ
ztdrI$>$DYXow3eZ=dAPA1?!@9$+~P^v94Oztn1dt)+g4d)@RlY>vQW1>r3k^>uc*9
z>s#wP>wD`5>qqM+>!x+fx^3OD?ppV(pRHf4U#;J)`_=>Nq4mgmY(24lxBjr6TF<QK
z)(h*U^~(Cw`pf#;`p5d$`p<f8y|La}@2vNc3W`z?0tiMN#6>)WAU+ZxArc`mLXiYX
zkqpU^0x6LSsgVY0kq+sR0U41AnUMuq5r%BYjvUB|T*!?)$cuc)j{+!&LMV(PD2iez
zjuI$|QYeiwD2s9^j|!-WN~nw~sETT+jvA<mTBwaWsEc~2j|OOnMre#CXo_ZNjuvQ%
zR%nejXp44ej}GXFPUws-_|U&Ax}iIIpeK5vH~OG2`k_AtU?2uzFos|#hG95HARHqx
z3ZpRwV=)fnF#!`X2@#l#DVU0BFs5S$W+D=^FdK6ag}IoA`B;F3ScGUS#u6;WGAzdm
zti&p;#u}`}I;_VAY{VvP#ujYFHf+ZZ?8GkY#vbg&KJ3Q<9K<0U#u3EeD30McPT(X?
z;WT1#24`^&=WziSaS4}k1y^wm*YPnv!Ke5PH}E;Wz?b+6U*j8mi|_C~e!!3T2{&;I
zw{Zt|aSuP^7yOFfa32rw5RdQ}Pw+ebz*9WKbG*PyyuzRO3xDGu{EPqa8gK9x@9;h-
zQUUfy0KtfZxQK@k#76=oL?R?cD3Ty4k|8-#ASF^EHPRq0(jh%EAR{s%GqNBn!jKKw
zkpnrA3%QX8d65tKQ2+%|2!&AuMNtgJQ354V3Z+p7Wl;|0Q2`ZE36)U=RZ$JqQ3Ewm
z3$;-Pbx{xX(Ett62#wJMP0<X^(E=^e3a!xwZP5<x(E%ON37ydeANqGiH*`l2^h7W8
zMj!M=KlH}{48$M|#t;m}Fbu~CgkvN|VKl~IEXH9xCSW2aAp(;z1yeB%#&pcUOhjT9
zW@8SbFc<SM9}BP$ix7>)Sc0WkhUHj+l~{$<ScA1#hxOQijo5_E*n+LthV9sao!Eul
z*n_>;hy6H!gE)l4ID!})#W5Vm37o_!oJK6p;4IGJJTBlOF5z<El&%CeO-c|P8vaqz
kJV_dd#wNcJ71Sd*CTw3!{g9ZjqT$B_vEfly0<#1E1LCajwg3PC

diff --git a/docs/index.html b/docs/index.html
index f8ced8a07ca..996b29a94d8 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -1,4 +1,4 @@
-<!-- RELEASE TIME : 2024-03-19 03:23:41 -->
+<!-- RELEASE TIME : 2024-03-19 07:22:17 -->
 <html lang="zh-cn">
 
  <head>
@@ -1971,6 +1971,126 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
        <th width="43%">TITLE</th>
        <th width="5%">URL</th>
       </tr>
+      <tr>
+       <td>5ce69dd3174e5a3a0e0342e212fdaa77</td>
+       <td>CVE-2023-46131</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Grails不受控制的资源消耗漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91851">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>3530fc9a09e620e6b33160d96d8a5ed1</td>
+       <td>CVE-2023-49032</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>LDAP Tool Box Self Service Password任意代码执行漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91850">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>72abbc2cf8f1db408564add1cf9285d3</td>
+       <td>CVE-2023-51390</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>journalpump访问控制错误漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91849">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>8810fc95262bf5466b41d8c8691e7dd7</td>
+       <td>CVE-2023-6768</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Amazing Little Poll身份认证绕过漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91848">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>790a3a2a2ab45f308085fec908f6c0ce</td>
+       <td>CVE-2023-6976</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Mlflow任意文件写入漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91847">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>6666bf24cbf3001ec2541eab50ae6013</td>
+       <td>CVE-2023-0011</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>u-blox TOBY-L2操作系统命令注入漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91846">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>f7ca54586218980a3ab360a06eb12ad2</td>
+       <td>CVE-2023-50628</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>libming缓冲区溢出漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91845">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>a160ce114474a674a22e5ed9317fdd70</td>
+       <td>CVE-2023-37544</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Apache Pulsar身份认证错误漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91844">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>3b821c795726573468aad8e83efc689d</td>
+       <td>CVE-2023-6769</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Amazing Little Poll跨站脚本漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91843">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>cecff1a9d753fd63aa80ef06de85011e</td>
+       <td>CVE-2023-27172</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Xpand IT Write-back Manager身份认证次数限制错误漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91842">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>acc29703b4c7f516901155fef6708603</td>
+       <td>CVE-2023-6974</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Mlflow服务器端请求伪造漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91841">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>046f810ee7d34f8783c666d83a7670d9</td>
+       <td>CVE-2023-6975</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>Mlflow路径遍历漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91840">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>095639ced36d0366b4b3c1d54e63db12</td>
+       <td>CVE-2023-47704</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>IBM Security Guardium Key Lifecycle Manager硬编码凭据使用漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91839">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>34df67c7ff4cfffe4ab5d71235b73396</td>
+       <td>CVE-2023-47702</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>IBM Security Guardium Key Lifecycle Manager路径遍历漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91838">详情</a></td>
+      </tr>
+
+      <tr>
+       <td>6bd7854606a3229da2a17f094882d108</td>
+       <td>CVE-2023-47705</td>
+       <td>2024-03-19 07:20:08 <img src="imgs/new.gif" /></td>
+       <td>IBM Security Guardium Key Lifecycle Manager输入验证错误漏洞</td>
+       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91837">详情</a></td>
+      </tr>
+
       <tr>
        <td>68a52fa4cb4d9434b518f9429de47e50</td>
        <td>CVE-2023-51655</td>
@@ -2091,126 +2211,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
        <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91737">详情</a></td>
       </tr>
 
-      <tr>
-       <td>d903fbd53056a7d9cb344311cdd53683</td>
-       <td>CVE-2023-5880</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Genie Aladdin Connect garage door opener跨站脚本漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91801">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>cb6d6fc218550f7b42b827bdc85a6776</td>
-       <td>CVE-2023-5879</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Genie Aladdin Connect Mobile Application信息泄露漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91800">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>582da042db10cad425201cef93baec45</td>
-       <td>CVE-2023-50090</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>UReport2任意文件写入漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91799">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>c9277227345cae3a951674a0b1895ad3</td>
-       <td>CVE-2023-46929</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>GPAC拒绝服务漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91798">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>943870a48015d85ec91759ce1e74e542</td>
-       <td>CVE-2024-21633</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Apktool路径遍历漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91797">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>a619a558fafe2fd6caab194fd3f43e90</td>
-       <td>CVE-2023-5881</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Genie Aladdin Connect garage door opener访问控制错误漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91796">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>c3ae8695206034a9e3754f2a3388fe80</td>
-       <td>CVE-2023-49442</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>JEECG不受信任数据的反序列化漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91795">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>a5f2f45d77fc6f45788fe3fb39e9be6b</td>
-       <td>CVE-2023-6338</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Lenovo Universal Device Client不受控制的搜索路径漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91794">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>da966c4762f8bbe9f35709d9170cf63b</td>
-       <td>CVE-2023-6540</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Lenovo Browser Mobile代码注入漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91793">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>a9b04ed2637dd9c931af7effedd7ead0</td>
-       <td>CVE-2023-50256</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Froxlor输入验证错误漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91792">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>b583bfd49c113dd5c969e6c15a460401</td>
-       <td>CVE-2024-21634</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Amazon Ion拒绝服务漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91791">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>ad075e4a54cb5cbeee1fd53ca2e540b1</td>
-       <td>CVE-2024-20802</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>SAMSUNG Mobile devices访问控制错误漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91790">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>1a1bc4c718af3635dd3394bdb0a7147b</td>
-       <td>CVE-2024-20803</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>SAMSUNG Mobile devices身份验证错误漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91789">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>10a2efd3b14564b2981b7a7041637326</td>
-       <td>CVE-2024-23328</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>Dataease反序列化漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91788">详情</a></td>
-      </tr>
-
-      <tr>
-       <td>0d81910b9fe99afa5c6462e89de370cd</td>
-       <td>CVE-2024-20804</td>
-       <td>2024-03-18 03:21:33 <img src="imgs/new.gif" /></td>
-       <td>SAMSUNG Mobile devices路径遍历漏洞</td>
-       <td><a target="_blank" href="http://www.nsfocus.net/vulndb/91787">详情</a></td>
-      </tr>
-
      </tbody>
     </table>
    </div>