Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Dec 10, 2024
1 parent 575e6e9 commit c3b19ed
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 12 deletions.
1 change: 1 addition & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -189,3 +189,4 @@ c13c36912d759a0e6e12186774d5508a
a44fe25de485f1164b0dee4913383f10
c7ed7bc844865bab33e23315602ce1de
6947b25c806e2f609277ccb7d14385b3
8db3939f4126d59012de0a8b9ac4b77a
Binary file modified data/cves.db
Binary file not shown.
24 changes: 12 additions & 12 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-12-09 15:27:47 -->
<!-- RELEASE TIME : 2024-12-10 03:40:13 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -366,23 +366,23 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>ca2aacb393d1cef87aeb84a86bb32854</td>
<td>CVE-2024-12343</td>
<td>2024-12-08 10:15:04 <img src="imgs/new.gif" /></td>
<td>2024-12-08 10:15:04</td>
<td>A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12343">详情</a></td>
</tr>

<tr>
<td>163e6f645724cfc8dd663106de7f175a</td>
<td>CVE-2024-12342</td>
<td>2024-12-08 07:15:04 <img src="imgs/new.gif" /></td>
<td>2024-12-08 07:15:04</td>
<td>A vulnerability was found in TP-Link VN020 F3v(T) TT_V6.2.1021. It has been rated as critical. This issue affects some unknown processing of the file /control/WANIPConnection of the component Incomplete SOAP Request Handler. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12342">详情</a></td>
</tr>

<tr>
<td>aebe1d1510d2a8b5101b9ebf0f83dd81</td>
<td>CVE-2024-12209</td>
<td>2024-12-08 06:15:04 <img src="imgs/new.gif" /></td>
<td>2024-12-08 06:15:04</td>
<td>The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-12209">详情</a></td>
</tr>
Expand Down Expand Up @@ -1987,6 +1987,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>8db3939f4126d59012de0a8b9ac4b77a</td>
<td>CVE-2024-52314</td>
<td>2024-12-10 03:38:07 <img src="imgs/new.gif" /></td>
<td>data.all授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107760">详情</a></td>
</tr>

<tr>
<td>9ea2c609df521778ee7b22e4bb5bf2ef</td>
<td>CVE-2024-35419</td>
Expand Down Expand Up @@ -2219,14 +2227,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107701">详情</a></td>
</tr>

<tr>
<td>eb972db5c3474f7ff75ca79911c17183</td>
<td>CVE-2024-9348</td>
<td>2024-12-06 09:25:00</td>
<td>Docker Desktop远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/107700">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit c3b19ed

Please sign in to comment.