From c1bbf4667ce55aa906dde68b32eebe5375f46ae4 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Tue, 5 Mar 2024 09:22:38 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 46411776 -> 46411776 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index b5c4ba6cf92..b157a7d44da 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -99,3 +99,18 @@ bcbd9f17c1044d124feefcde88ec7f68 81d654e3790f24e95ae01827ed5921f4 8e6fbe86ac5457552786fe2b03b16957 2c1ce4b09b78c6ee77783da94c48cd3c +214a0018cfa480cd3d62a88a150adf1c +19a14b73c689a7c7b320e6be67ec363c +2a395997ed3f061929dc4de73f8935b2 +d95df145aa19d637866f3527123004c1 +8ce2f0209315f76ef2e918a6bbe627ab +73968726d35f204920b0bd14d5c77d8e +e40dcdc4c8909a7870506aa4331a5a8d +57e10f9252e5edd613456eaf6847832e +a57869efe886594ff82e3be29c115bbe +47615b2fde548cf30bbb21235ef27617 +1f7ac34772acff74f45f9f6d40a84040 +68017357c74e99bdb37c648f948a3a9c +5487400ae7f7c9b4fb83e28213827a59 +c46842b9cca70ea542188e234ce94ba6 +e26197855ea1af60fa9b4d5770956e1b diff --git a/data/cves.db b/data/cves.db index 9b218b9d6645cbc7fe2df87c9736349b6f556dee..e8d14d07cf7883f839fe1d37de1c5d0c6631fc21 100644 GIT binary patch delta 4222 zcmb8vXLME776ss!OYf+FAT2ZzA$WQb5t7iGK&Td+=iYlRpaCSHh=>w&q991IL_`T{ zP_a=}5D*aTy%+3K?7f%go7XXTKBKSw_Js&c`a}bwA#oUSIB^8gh-geSA&w-P63vLCh~`8K zq9xIaXiel2ZHTr+JEA?&fjFAzNE}0SB90|G6J3ZrqAPJ6VGt%^5jNovF5wYA5fCA9 zJkgCff#^=0Nc13j68S^{QAqS6dJ}z!zC=HwKQVw9NDLwd6GMoTh@r$VVmMJmj37o5 zqlnSO7-B4OGI0uVDsdVyjyRoAeC?)0+7ZDc|B<2y95SJ43i3P-E#6n^b zaXGP=SVAl%mJwGFR}xndR}*E#HN3vnN@mDomXC+;V95Ic!o!~?`` zVh`~k@euJa@d)uK@fh(q@dWWC@f7hi@eJ`S@f`6y@dEK8@e=Ve@e1)O@fxw0c%68I zc$0XGc$;{Kc$avO*hlOq4iE>4_lXaP4~dV6kBLu+Pl?Zn&xtRHFNv>+uZeGnZ;9`S z?};CXABmrcpNU_HzZ1XCN6sSTNJ6SeRjDS`rH0g$T2fo;NL{HX^`(I{l*8n3IYJsq zV`(BsN>gbjM@e&OAuXkqw3b|HBW~&gou!N9Nmn^e3^BzLTO4u4 z6JG)e<#_2PCrEcWQF=&E$(I5tlwQ(X`bb~tC;erB43t4KScb?+GE|1ia4C`zGEzp# zXc;48>dPqxZ7*)I3X4%sQYhP)|n$=mXdyesd?KG`n^QX~$N-e1^b)>G;llsy? z8p>gExEvvkq_H%SBc-V{lcS`$w2+q4N?J>R>*a7y{wdSStU2fjdGJz$ZEM+ZjoDMjoc=;%N=s3+$C#e zovfD)vQak4-ExoIE1PAD+$URQn{1c+WrysPUGjkJPHe}XL`CZ^jdQ;HTZ4l7OY7~e z*Rk%nI%{eltUb2YhFT43PN=b?Mw9B(sy$cDth%Jifhu{4c{>^|>6-I!PJU@^Rt&B= zxLK#}cDwO*Y}Ok^l%g%Eg%Qwqb zuJxOiH<+q|F0TXl{R;-?7WOYJ${jIg|FVVUQ-^d{ zj+h`jtUirUm6(e@85`z^%IhV(lW;`pBFCap|5R_{_7+ejvpmTB2;oU!!D z|BDdse+Y51A$<>pM6MrrVVsGBz;i<Y(KqedMm9}R^?`-5$MaGViPNh>$DhQ1*@&n&+4KIou+cqON z3euI%WjlJ!17}W2DKd9Ne$l|FI1}YMhHIxL<_;~HIC*+pGOc{qj|G+9Mx0Idv&p>< zCHr>h1-|8_Z8u{XPG}iPBbhcerYYY~2Y))OV|m7ZNiLtde^sK%AKpvvY;cer;KFQh zc7TIaY-J3~2yN5N_?}*g{w|0--J+)v`_pnTEw60ttm4*xp5NcDFw9*+q zWqWqz6_Fibdw4W{VygU$jhhlpe_y42v$d_#?yTtX+p=q;;+E+|hGA-IBPTFYX*=y% zQ4mC?YeZ_}Ule!!@^EiSqFwo}^`(hMEf?)yT=v28CHpon*tc!ffo+QqY+9*>_^&&* QS~k|+v8MB$#OSL30Ds-kDgXcg delta 2638 zcmWmDWmgae0EOX!n26Zjh25P9c4D_)ySp3Xs+eGR7k0N|$2yI89(s*ALJA z0q;3C`fhB-XvAgXh~84x*DR)7^~C9;C7#8wh3sg=x1Zl$n-t&~=XmC6dWQd?=P zv{pJRy_LbrXl1f8TUo5ERyHfUmBY$u<+5^Hd91uvJ}bXfz$$2kS%s{^RuQYHRm>`G zm9R=$rL59c8LO;S&MI$Juqs-WtjbmutEyGas&3V=YFgn|Ei1x`v}#**th!b`tG?C1 zYG^gG8e2`QrdBg6%4%-4uv%KJtkzZ=tF6_}YHxM0I$E8q&Q=$zt3{t~R(Gq1)zj)_ z^|tz0eXV|0e`|m>&>Cb7wuV?ktzp)1YlJn@8fA^P##m#man^Wif;G{aWKFiFSkcy0 zYnnCPnqk?RY0a``TQSxgYpylVnr|(z7Fw}ZoVCbWY%Q^tTFb2E)(UH-waQv;t+Ccx z>#X(G25Y0W$=Ymfv9?;$r8o zI%%Dhur6ActjpFF>#B9lx^BI1ePDfPePn%XePVrTeP(@bePMlR zeP!LSZd$jj+t%0C9qSwGTkAXPd+Vlcx8|!!L59?3sFY9mXAM0Q1KkIFb0_H0Kfk=cPBt{Y>MKUBu3Iro1 zLXZlfNR2c|i*!hj49JK~$c!w=ifqV^9LR}W$c;S6i+sqB0w{kb<{vjgrgQB5Q*BTgSx1P`e=ZLXoSXSf~IJOC^Sb4 zv_vbkMjNz6JG4g!bVMg~Mi+F&yZ+tK9X-$!z0ezd&=>vC9|JHDgD@CFFciZu93wCi zqc9p{Fc#x59uqJTlQ0=m5RIvrhUu6AVcDZi#RO8Vl2T@EW>iF zz)GybYOKLptiyV2z(#DsW^BP$Y{Pc!KsMKUBu3Iro1LXZlfNR2c|i*!hj49JK~$c!w=ifqV^9LR}W z$c;S6i+sqB0w{kb<{vjgrgQB z5Q*BTgSx1P`e=ZLXoSXSf~IJOC^Sb4v_vbkMjNz6JG4g!bVMg~Mi+F&yZ+tK9X-$! zz0ezd&=>vC9|JHDgD@CFFciZu93wCiqc9p{Fc#x59uqJTlQ0=m5RIvrhUu6AVcDZi#RO8Vl2T@EW>iFz)GybYOKLptiyV2z(#DsW^BP$Y{Pc!Ks>z0inM maUpj?!cuk#PDm5AHef~2vE2KgpH0lx4-ZI)FM27kZP5RP+Uhs} diff --git a/docs/index.html b/docs/index.html index 386637c696d..055d6cdbf17 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 214a0018cfa480cd3d62a88a150adf1c + CVE-2023-41357 + 2024-03-05 09:20:26 + Galaxy Software Services Vitals ESP危险类型文件不受限上传漏洞 + 详情 + + + + 19a14b73c689a7c7b320e6be67ec363c + CVE-2023-41343 + 2024-03-05 09:20:26 + Ragic跨站脚本漏洞 + 详情 + + + + 2a395997ed3f061929dc4de73f8935b2 + CVE-2023-45024 + 2024-03-05 09:20:26 + Best Practical Request Tracker信息泄露漏洞 + 详情 + + + + d95df145aa19d637866f3527123004c1 + CVE-2023-36621 + 2024-03-05 09:20:26 + Boomerang Parental Control授权错误漏洞 + 详情 + + + + 8ce2f0209315f76ef2e918a6bbe627ab + CVE-2023-41260 + 2024-03-05 09:20:26 + Best Practical Request Tracker信息泄露漏洞 + 详情 + + + + 73968726d35f204920b0bd14d5c77d8e + CVE-2023-34260 + 2024-03-05 09:20:26 + Kyocera TASKalfa 4053ci Printers路径遍历漏洞 + 详情 + + + + e40dcdc4c8909a7870506aa4331a5a8d + CVE-2023-34259 + 2024-03-05 09:20:26 + Kyocera TASKalfa 4053ci Printers目录遍历漏洞 + 详情 + + + + 57e10f9252e5edd613456eaf6847832e + CVE-2023-36620 + 2024-03-05 09:20:26 + Boomerang Parental Control授权错误漏洞 + 详情 + + + + a57869efe886594ff82e3be29c115bbe + CVE-2023-41347 + 2024-03-05 09:20:26 + ASUS RT-AX55操作系统命令注入漏洞 + 详情 + + + + 47615b2fde548cf30bbb21235ef27617 + CVE-2023-41346 + 2024-03-05 09:20:26 + ASUS RT-AX55操作系统命令注入漏洞 + 详情 + + + + 1f7ac34772acff74f45f9f6d40a84040 + CVE-2023-41345 + 2024-03-05 09:20:26 + ASUS RT-AX55操作系统命令注入漏洞 + 详情 + + + + 68017357c74e99bdb37c648f948a3a9c + CVE-2023-38965 + 2024-03-05 09:20:26 + Lost and Found Information System授权绕过漏洞 + 详情 + + + + 5487400ae7f7c9b4fb83e28213827a59 + CVE-2023-42027 + 2024-03-05 09:20:26 + IBM CICS TX和TXSeries for Multiplatforms跨站请求伪造漏洞 + 详情 + + + + c46842b9cca70ea542188e234ce94ba6 + CVE-2023-41259 + 2024-03-05 09:20:26 + Best Practical Request Tracker信息泄露漏洞 + 详情 + + + + e26197855ea1af60fa9b4d5770956e1b + CVE-2023-44271 + 2024-03-05 09:20:26 + Pillow拒绝服务漏洞 + 详情 + + 10debfb0324d6cb28ba4a12cddb0ac43 CVE-2023-6271 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - a5babef69646cd15e5636acf1b6d8acc - CVE-2023-5963 - 2024-03-04 10:18:09 - GitLab EE输入验证错误漏洞 - 详情 - - - - 68ff571ebc13f66b0251a1b64a0f365e - CVE-2023-47234 - 2024-03-04 10:18:09 - FRRouting FRR拒绝服务漏洞 - 详情 - - - - eb0ed3dba54a0f4922c91421559574f4 - CVE-2023-41726 - 2024-03-04 10:18:09 - Ivanti Avalanche默认权限错误漏洞 - 详情 - - - - f10cc92671d553ddef8223a3c268a399 - CVE-2023-5877 - 2024-03-04 03:22:39 - WordPress affiliate-toolkit WordPress plugin服务器请求伪造漏洞 - 详情 - - - - ec667bc2ae50b825e50e709f0a13f4c2 - CVE-2023-6000 - 2024-03-04 03:22:39 - WordPress Popup Builder WordPress plugin跨站脚本漏洞 - 详情 - - - - bcbd9f17c1044d124feefcde88ec7f68 - CVE-2023-6485 - 2024-03-04 03:22:39 - WordPress Html5 Video Player WordPress plugin跨站脚本漏洞 - 详情 - - - - 81d654e3790f24e95ae01827ed5921f4 - CVE-2023-6421 - 2024-03-04 03:22:39 - WordPress Download Manager WordPress plugin信息泄露漏洞 - 详情 - - - - 8e6fbe86ac5457552786fe2b03b16957 - CVE-2023-6037 - 2024-03-04 03:22:39 - WordPress WP TripAdvisor Review Slider WordPress plugin存储型跨站脚本漏洞 - 详情 - - - - 2c1ce4b09b78c6ee77783da94c48cd3c - CVE-2023-6113 - 2024-03-04 03:22:39 - WordPress WP STAGING WordPress Backup Plugin信息泄露漏洞 - 详情 - - - - 658e37d0e3744c18e6fe7ae30cc7a8c7 - CVE-2023-46851 - 2024-03-01 07:19:01 - Apache Allura输入验证错误漏洞 - 详情 - - - - 65e49614c3e940a2c0e7a49ed64d4b1f - CVE-2023-5506 - 2024-03-01 07:19:01 - WordPress ImageMapper Plugin授权错误漏洞 - 详情 - - - - b562666422ad8dafd89dcb4092bdeffa - CVE-2023-42551 - 2024-03-01 07:19:01 - Samsung Account敏感通信漏洞 - 详情 - - - - 224ce80dec1b53540efb1d357dc79fbc - CVE-2023-42539 - 2024-03-01 07:19:01 - Samsung Health PendingIntent劫持漏洞 - 详情 - - - - 22065445da0d5b32aeeb0a31e4c0cd4b - CVE-2023-42540 - 2024-03-01 07:19:01 - Samsung Account访问控制错误漏洞 - 详情 - - - - 512dc7d352633ad822607f657cad5951 - CVE-2023-42541 - 2024-03-01 07:19:01 - Samsung Push Service授权错误漏洞 - 详情 - -