diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat
index 3cbd0f44cb3..62371f151f4 100644
--- a/cache/Nsfocus.dat
+++ b/cache/Nsfocus.dat
@@ -189,3 +189,4 @@ c13c36912d759a0e6e12186774d5508a
a44fe25de485f1164b0dee4913383f10
c7ed7bc844865bab33e23315602ce1de
6947b25c806e2f609277ccb7d14385b3
+8db3939f4126d59012de0a8b9ac4b77a
diff --git a/data/cves.db b/data/cves.db
index d98a90ab099..b7bca808f31 100644
Binary files a/data/cves.db and b/data/cves.db differ
diff --git a/docs/index.html b/docs/index.html
index 0e7434ec8ac..6ed977ae903 100644
--- a/docs/index.html
+++ b/docs/index.html
@@ -1,4 +1,4 @@
-
+
@@ -366,7 +366,7 @@ 眈眈探求 |
+ 2024-12-08 10:15:04 |
A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. |
详情 |
@@ -374,7 +374,7 @@ 眈眈探求 |
+ 2024-12-08 07:15:04 |
A vulnerability was found in TP-Link VN020 F3v(T) TT_V6.2.1021. It has been rated as critical. This issue affects some unknown processing of the file /control/WANIPConnection of the component Incomplete SOAP Request Handler. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. |
详情 |
@@ -382,7 +382,7 @@ 眈眈探求 |
+ 2024-12-08 06:15:04 |
The WP Umbrella: Update Backup Restore & Monitoring plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.17.0 via the 'filename' parameter of the 'umbrella-restore' action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. |
详情 |
@@ -1987,6 +1987,14 @@ 眈眈探求 | TITLE
URL |
+
+ 8db3939f4126d59012de0a8b9ac4b77a |
+ CVE-2024-52314 |
+ 2024-12-10 03:38:07 |
+ data.all授权错误漏洞 |
+ 详情 |
+
+
9ea2c609df521778ee7b22e4bb5bf2ef |
CVE-2024-35419 |
@@ -2219,14 +2227,6 @@
-
- eb972db5c3474f7ff75ca79911c17183 |
- CVE-2024-9348 |
- 2024-12-06 09:25:00 |
- Docker Desktop远程代码执行漏洞 |
- 详情 |
-
-