From d8cafbaad975d516b1a209731cee744061d44c1a Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Mon, 28 Oct 2024 09:26:54 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 49844224 -> 49848320 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 027b3f9ecf3..24301cb6d01 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -168,3 +168,18 @@ d7ea38e6da8f928cd1b8f7df93c4fcb3 1871c659553f85e0bec49c03cb14c099 c1bae505d5850debc153af1d5434729f f58581ecff1ee73dc13096bbf121156a +b9c2454f2ba7a259cbc7e286e7648741 +eca9172b335850116c780bb129d0904a +221c725f8954f8c62d704406ab6f406e +802e7fd04affb3b5063801d81b995297 +d1d5593dc6561405819cab9e902fac5b +6810c049fec26809f456e928b74f3c61 +e9f5a9f3eabd8a23016e026558b05b4b +cc8c1b4e5c481b517d034f709500659b +9d1c820515e429480cb35251a676af5e +5f358831bcf2225f940ed51b24e9ea38 +f0c2e28b6f2191fd0704174db8993c95 +86bb9f37331894d2d7999c86ef943896 +148a5a86f85f9f536092130072cb7282 +89e93c3f2f098787c685285d3a300857 +bbb60a5841b208054789d710c40d53b5 diff --git a/data/cves.db b/data/cves.db index d3aa807b766ef945f67835a60b85198e41ddd5d5..506c67bfb6f1b2d8dc328339e98ba9e52a2398c4 100644 GIT binary patch delta 4672 zcmbW(d6?C68wPNlc9lvoE$EabA^r9xOVWz=eNpc7JIgf8l4eR-J8~nmib3TRmAyh) zqwHkgmt!lM5E07Gd!OFx^2fY+|M17>nQN|@Yo7Dm-{TEt=oH{?7gO z>vq+Gc#k?evmojaF`_O}kEl;HAQ}>lh{nYJL=&PZ(Tq5NXil^sS`r5mt%%mdLBzpC z5z&TdOSB`}6NeCo5{D5Th&a)a=tLY&96=mO97S{{jwZSg#}LO7#}QqLtPam0AyOkx5tkvNM`J_#Zsl0=F~6B(kIm_(EiXA|cT zr9>G~PE-(+iF1i5L?uy0OeLlf=MmG18N~U-1;mBKMa0F#CB#f3OI%9KA}%9HTuxj; zTuIC(t|G1`t|8_SbBTGxd}0BykhqpuL|jK)PgD~(5H}Jx5sQf>#8TpBB1bGEmJ_!S zw-PIemBcFIHsW^T4&qMYF5+(D9%41IhFDA7OWa4?Ppl)>6Aus%5)Tm%6ORy&5*vue zh{uVI#3tei;z{Bu;%VX;;#uN3;(6i)Vl(j~@e=Ve@e1)O@fz_u@doiG@fPtm@ec7W z@gDI$@d1%1J|sROJ|;dPJ|(sgTZzwz&xvhB4Y8g0g7}j7ir7JXO?*S_B)%oSBX$wr z6F(3?61#~##81S}#4p6J#Bap!#2>_;#9y;fXAbH}OzKKKsV@zrp)``lvcEKurqWCf zkmk}tTFQaaN?OZ7ahst5nLE_R;I?3U3gd8bHNoP4)y2vqdtQ;p@ z<#_2PhL~cBEsnV2i7$bK(p^rF6Xhg1S$fDR(o;^AUea6oNMGqE{pB<{UCxjJGEfG| zU>PDqWta??5i(Ln$!HlPV`ZF-mosI8Oq8>vkbgoVNlHr6l96JWBqegToFk=DCgoBg zljU5QB9&4lQ)QZ*C(~tyoG%y1g>sQxESJbk$;zcNOD+@2<#L5wDYNA&xmvD~IWkw~ z$$VKL3*}l_B-hFHQY|;gjdGJLmL;-OZkC)ZljU-Y+$t+%rL2@_;-j56Q#wh&(DALY|bTE^o-2@|L_U@5sCIp1dy~NM1gakK|+dL_U=*vQ<8l&t;p`$aeWczLc+I zhkPyH$WHlIzLQ<@z5F0Q%5K>sKgrMXi~K6T$?x)q{3(CcnT?pPzr>`j)RX$sKpILT zX)OCo6KN{V!mPt|~ zXUjQKDrHhG6*5`Ql_^pwRWenk$$2teX2|(+fm|pT$;EPs%#^HLDzoG=pevOyk`$7Q2zk|*Rzc}kv^XXIIV zPM((+WV5^|FUiaDio7bX$?NilyeV(V+wzXQEAPqs@`2>#L-|NPmQUnU*&q7aaP<9r|w}tXuq3kM@?+fLJLiw>!b{EQ?*v0{ieu}O8?Z{^O>&+X)_iH}(fF;d# zH5=6Q;imPP^xc0|<6Vu>XhWlh4WkCD8*FSje|nwfbsvmxs`)zBJKLD~l12mDb_wlf zBcmwtjD#CFW@H(G;W~a0rhL;#I!4O1BX|3w8@Dgc^%~Wut7TYDSI724tAC<2XLfoq z)~1PRbhU!G5q7tn>gDU3cg$@X@N=x*P|wYFV}4TOfo(fy>#Io+rb9bvXRM4727cft zy}-2sH)SVm!w6izRulb(*?(#xIcaLVcS&(cmDilN=z+Ak}o>=`x`)J$K z^RjW~i#1y35_L75AmJtgFB7<#Fyq>u5n84i`c^XXt-z|?)pn~Ftm{^kE50}$YoEiD zKgAj}{NLe*d4ASlKBM8f{C7Anio%TT+qM~mPRdI8VHhR@FP#Y;I|#j6ZIqyI|BLCy zdqK7X^XbBL#hNZ-B(1a+L|(=+Lo<^ye8Vw)Clv*uvJPt>oFCd@??h!~VrpqseE5vY zs;6!*OIOD2-owwEQI;Dz_Jvs6e>lz4y)fI9`BY(JdZ@9RvE3lB%_y0%EKAWkMmptc zeVlZdPS`=Md9A=SjP!s+)OW<_+^)HMV(s>IcE|fhA=TvHsfH;t8CZsEx@pG>oxn&& zwrja&!t=dECO7oM_hPMD`o8lok{s@v+4jswg@Gn$pky*gnvs)slTKhpuIZ-?+sXJw z=o*IShEc779Lw>|M6#-+qP((OVoFs>M&DEqy{l=P7JIMAzVAe-Z)HQ~6MOGOTXjuq zB@^14bRtRx3ClK2FKt+!>jshGMo#Unf$h2d6P1%ndR0uB93Qp!7<*Nel}#-#shSb* zlPW2Eo^1=S+53~~1=E(rb8GtS-uFcr=G%p^@psss&M0X(VJ4llyub)Ej_ajEEtl_P z?4)PbPCzT{{)^xT`A)V4^Jf);@23b-X3BL#JC*cY&vXnoFvDab(pzCz%G9kLffX2z zGk9{kynkX!Sw;Db+^*f5V@3b4wUO^;4`Y5};ku;ND=@6IuUq0IGMPy4n&H`jVWxE8 zVdz?6?I+09;DLSO!_s9HRq1#tU3pGb#pIgn*4E5fy^XWBuUnQ|rhr@TYnvzf zUiK*FClm&)RCCKRlfJG>5V}q#NP2oBG>YLRbbIwBT{~axeK2mu^mJ*w=ZGOX)RDvc zZCi0u&E1cG{>W|HuFdAQEPXw8=syhJ%lESZ^Jnf|w4%bIB@?0PTam46>l&u%CH=sN zBGU>}MyNb$HFpiyu6}KdQ*`o>(y7HI<^Z(iX5q^;E#QgZeS(ND$MPbr%l!O%}{DkF($tdaTDf804 r=LEh}d)<65G)GrVNe!8juB?prElre_lo!Wy2|d#t|M8iQ`Qd*6pbD+G delta 2844 zcmWmG)6yOY6hzVFk8RtwZQD*dwrzH7+qP}nwr$Q#M*F*1`vJP@RGlG*pT-%o_-UNU z2|_&z7A(t{DM^b2e>7B9a4X0PVTH6pS)r{kR#+>X72b+qMYJMWk*z3JR4bYl-HKtw zv|?GYtvFU(E1nhKN?;|l5?P6@Bvw)@nU&m1VWqTES*fiwR$42amEOu=WwbI`nXN2V zRx6v8-O6F*v~pRwtvpsS*5KqR#~f@Ro<## zRkSKum8~jPRjZm+-Kt^Lv}#$ktvXg+tDaTgYG5_A8d;64CKmfNwVGMYtrk{GtCiK- zYGbvv+F9+b4pv92lhxVkVs*8;S>3H3R!^&!)!XW0^|kt0{jCAkKx>dS*cxIDwT4;4 ztr3>3k=7_{v^B;WYmKwUTNA8_)+B4PHN~20O|zz3Gpw1`ENiwk$C_)+v*ue1tcBJh zYq7P&T52t`mRl>VmDVb2wYA1tYpt`^TN|v6)+TGSwZ+#%jiI%*xWj$0?Jlh!Hgv~|WhYn`*sTNkX0)+Ot*b;Y`BU9+xRH>{i1 zE$g;*$GU6Xv+i3DtcTVk>#_C3dTKqho?9=hm)0xmwe`k&YrV7HTOX{C)+g(;^~L&X zeY3t>KdhhDFY6EMPwOx1xAnL6kM*zh-xvj-px_8X2!uo^ghm*IML2{<1Vlt6L`D=u zMKnZ548%k%#6}#%MLfhu0whEtBt{Y>MKUBu3Zz6Tq(&N~MLMKM24qAgWJVTbMK)wd z4&+2GOR7Mq4MKx4M4b(&} z)J7fDMLpC<12jYXpau)h)(E?F6fGG=#C!fiC*Z9 zKIn^n=#K#yh(Q>PAsC8b7>*GzMq(63V+_V(9L8e;CSnpMV+y8X8m40gW?~j*V-DtG z9_C{K7Ge<=V+odG8J1%OR$>)aV-40~9oAz5HewStV+*!o8@6Kyc48NHV-NOXANJz_ z4&o3F;|Px87>?rvPT~|!;|$K?9M0ncF5(g{;|i|g8m{98ZsHbh;|}iP9`54-9^w%m z;|ZSP8J^<>Ug8yA;|<>89p2*uKH?KT;|spx8@}TQe&QGYz@PXFzwtNz!N2$~_!tFo z{s=+{ghVKWMi_)eID|(8L_{P+MifLvG(<-X#6&E_MjXUNJj6!=Bt#-4MiL}NG9*U| zq(myDMjE6=I;2MiWJD%pMiyj6He^Q*=HB?6p)I=@RMjg~eJ=8}7G(;mbMiT_~Z;EDUjuvQ%R%nej zXp44ej}GXFPUws-=!$OWjvnZVUg(WJ=!<^nj{z8nK^Tl77>Z#Sju9|MViZPW48~#{ z#$y5|ViG1}3Z`Njreg+XVism&4(4JW=3@aCVi6W&36^3RmSY80Vii_n4c1~E)?))U zViPuF3$|h#wqpl&Vi$H}5B6do_TvB!;t&qw2#(?yj^hMQ;uKEf49?;l&f@|u;u0?7 z3a;WBuHy!7;udb>4({R}?&AR-;t?L>37+B^p5p~x;uT)w4c-PF(7T}JlfteKSut4P zc|8 + @@ -1979,6 +1979,126 @@

眈眈探求 | TITLE URL + + b9c2454f2ba7a259cbc7e286e7648741 + CVE-2024-7691 + 2024-10-28 09:24:46 + WordPress Flaming Forms Plugin跨站脚本漏洞 + 详情 + + + + eca9172b335850116c780bb129d0904a + CVE-2024-5053 + 2024-10-28 09:24:46 + WordPress Contact Form Plugin未授权Malichimp API密钥更新漏洞 + 详情 + + + + 221c725f8954f8c62d704406ab6f406e + CVE-2024-42058 + 2024-10-28 09:24:46 + Zyxel ATP和USG多款产品空指针解引用漏洞 + 详情 + + + + 802e7fd04affb3b5063801d81b995297 + CVE-2024-5148 + 2024-10-28 09:24:46 + GNOME Remote desktop数据元素泄露漏洞 + 详情 + + + + d1d5593dc6561405819cab9e902fac5b + CVE-2024-28044 + 2024-10-28 09:24:46 + OpenHarmony整数溢出漏洞 + 详情 + + + + 6810c049fec26809f456e928b74f3c61 + CVE-2024-43775 + 2024-10-28 09:24:46 + Huachu Digital Easytest Online Test Platform SQL注入漏洞 + 详情 + + + + e9f5a9f3eabd8a23016e026558b05b4b + CVE-2024-8365 + 2024-10-28 09:24:46 + HashiCorp Vault Community Edition和Vault Enterprise信息泄露漏洞 + 详情 + + + + cc8c1b4e5c481b517d034f709500659b + CVE-2024-42471 + 2024-10-28 09:24:46 + actions/artifact任意文件写入漏洞 + 详情 + + + + 9d1c820515e429480cb35251a676af5e + CVE-2024-43774 + 2024-10-28 09:24:46 + Huachu Digital Easytest Online Test Platform SQL注入漏洞 + 详情 + + + + 5f358831bcf2225f940ed51b24e9ea38 + CVE-2024-28100 + 2024-10-28 09:24:46 + eLabFTW跨站脚本漏洞 + 详情 + + + + f0c2e28b6f2191fd0704174db8993c95 + CVE-2024-7939 + 2024-10-28 09:24:46 + Dassault Systèmes 3DSwymer跨站脚本漏洞 + 详情 + + + + 86bb9f37331894d2d7999c86ef943896 + CVE-2024-43773 + 2024-10-28 09:24:46 + Huachu Digital Easytest Online Test Platform SQL注入漏洞 + 详情 + + + + 148a5a86f85f9f536092130072cb7282 + CVE-2024-7354 + 2024-10-28 09:24:46 + WordPress Ninja Forms Plugin跨站脚本漏洞 + 详情 + + + + 89e93c3f2f098787c685285d3a300857 + CVE-2024-7871 + 2024-10-28 09:24:46 + Huachu Digital Easytest Online Test Platform SQL注入漏洞 + 详情 + + + + bbb60a5841b208054789d710c40d53b5 + CVE-2024-43792 + 2024-10-28 09:24:46 + Halo跨站脚本漏洞 + 详情 + + a2463fffefe91aec8e124763540bbda4 CVE-2024-22269 @@ -2099,126 +2219,6 @@

眈眈探求 | 详情 - - ca1efd6e16d2a6389810f4377ab28dfa - CVE-2024-38882 - 2024-10-24 09:23:24 - Horizon Business Services Caterease操作系统命令注入漏洞 - 详情 - - - - f12cecdf95126b8bd210c2b093fb60a3 - CVE-2024-40498 - 2024-10-24 09:23:24 - PuneethReddyHc Online Shopping System Advanced SQL注入漏洞 - 详情 - - - - 2a4ba50941ab8038461ef9983577bfe7 - CVE-2024-6361 - 2024-10-24 09:23:24 - OpenText ALM Octane跨站脚本漏洞 - 详情 - - - - c2d8a411bfac7f2527d7380d6a1e14a0 - CVE-2024-42008 - 2024-10-24 09:23:24 - Roundcube跨站脚本漏洞 - 详情 - - - - d94c8a98d7522e0d55f9c75742b3101d - CVE-2024-38856 - 2024-10-24 09:23:24 - Apache OFBiz授权错误漏洞 - 详情 - - - - c7af34b23f209846f528b5029578f90b - CVE-2024-41816 - 2024-10-24 09:23:24 - WordPress Cooked Plugin跨站脚本漏洞 - 详情 - - - - ae2a6ed49a411f234ca623e9cbd8f438 - CVE-2024-41820 - 2024-10-24 09:23:24 - Kubean权限分配错误漏洞 - 详情 - - - - 23e6743a5055938e4e4d735dabaebdea - CVE-2024-42009 - 2024-10-24 09:23:24 - Roundcube跨站脚本漏洞 - 详情 - - - - 45ebd3febf3ec2a02b58d9619a746d53 - CVE-2024-38887 - 2024-10-24 09:23:24 - Horizon Business Services Caterease操作系统命令注入漏洞 - 详情 - - - - a8382d4b5309b45e09b92fa68bf98d26 - CVE-2024-7409 - 2024-10-24 09:23:24 - QEMU NBD Server同步错误漏洞 - 详情 - - - - 4de16b38e5dbcab450704c22561a2dbd - CVE-2024-7395 - 2024-10-24 09:23:24 - Korenix JetPort 5601身份认证绕过漏洞 - 详情 - - - - 066851318c60141716ab7eb6e4a9bc20 - CVE-2024-40531 - 2024-10-24 09:23:24 - UAB Pantera CRM访问控制错误漏洞 - 详情 - - - - c6875d32470c7180f7f416069b45b9ce - CVE-2024-21978 - 2024-10-24 09:23:24 - AMD SEV-SNP输入验证错误漏洞 - 详情 - - - - 217842cc302e8a486a4360eed2f84342 - CVE-2024-41200 - 2024-10-24 09:23:24 - KMPlayer分段错误漏洞 - 详情 - - - - 86082974107f81548dabbd1134b9314d - CVE-2024-6709 - 2024-10-24 09:23:24 - WordPress Sync Post With Other Site Plugin未授权数据修改漏洞 - 详情 - -