Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Mar 7, 2024
1 parent 059c742 commit da08ac6
Show file tree
Hide file tree
Showing 4 changed files with 92 additions and 76 deletions.
15 changes: 15 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -141,3 +141,18 @@ ff12965d963be4f178f60618a797f734
366e5d2bbe900093d269de7237751ff1
3cbcfad7897d42fa60ee3769c6d900d1
ad846ec41f98274dffad2b3453442f0a
be2659be4d194291cb033b3fa7beedf5
07f212cbcb5c68010069be403440f639
f56b0d3490b0d4c4720dd426ff939ec4
87000113f8a6ea71b9b7ab3293682bca
4e35676c365fa553a80aff5314f478c6
ecb995775c76d8c5dd5908afe2eeb132
339c997983e62c6de0ed228a4dd4f086
fff05b3ed5d54fd6eaffdcad88b4a1bf
9a56d896aef08359d8c3694580b51f3a
fef647645753877eaff73861fae44d76
d196d61ccc864734d379237a0241a1e8
45eb3f692d1d6b43e2283b505a3e257d
3eeb62bfb269d08875c96dc9cacebfa5
ed75fe3e4c31a945f0f654ef0c455a43
046298e6de7a702c21dbf4d93983d5d2
1 change: 1 addition & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -179,3 +179,4 @@ db0f880f4eb79426f5d91b7e8e46d360
499ebbf8b38026aeda386a4c5fc484e0
6dbb968974fae5570b4ccae409bc7c7c
6616a243aa5f1303fc0e5b1adfc0d8ba
f59f49f43c1c59d8d10aeb1bb9601e01
Binary file modified data/cves.db
Binary file not shown.
152 changes: 76 additions & 76 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-03-07 01:08:31 -->
<!-- RELEASE TIME : 2024-03-07 03:20:39 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -2092,123 +2092,123 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
</tr>

<tr>
<td>214a0018cfa480cd3d62a88a150adf1c</td>
<td>CVE-2023-41357</td>
<td>2024-03-05 09:20:26</td>
<td>Galaxy Software Services Vitals ESP危险类型文件不受限上传漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91123">详情</a></td>
<td>be2659be4d194291cb033b3fa7beedf5</td>
<td>CVE-2017-20188</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Synacor Zimbra zm-ajax跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91202">详情</a></td>
</tr>

<tr>
<td>19a14b73c689a7c7b320e6be67ec363c</td>
<td>CVE-2023-41343</td>
<td>2024-03-05 09:20:26</td>
<td>Ragic跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91122">详情</a></td>
<td>07f212cbcb5c68010069be403440f639</td>
<td>CVE-2023-47857</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>OpenAtom Foundation OpenHarmony内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91201">详情</a></td>
</tr>

<tr>
<td>2a395997ed3f061929dc4de73f8935b2</td>
<td>CVE-2023-45024</td>
<td>2024-03-05 09:20:26</td>
<td>Best Practical Request Tracker信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91121">详情</a></td>
<td>f56b0d3490b0d4c4720dd426ff939ec4</td>
<td>CVE-2023-48360</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>OpenAtom Foundation OpenHarmony内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91200">详情</a></td>
</tr>

<tr>
<td>d95df145aa19d637866f3527123004c1</td>
<td>CVE-2023-36621</td>
<td>2024-03-05 09:20:26</td>
<td>Boomerang Parental Control授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91120">详情</a></td>
<td>87000113f8a6ea71b9b7ab3293682bca</td>
<td>CVE-2023-49135</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>OpenAtom Foundation OpenHarmony内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91199">详情</a></td>
</tr>

<tr>
<td>8ce2f0209315f76ef2e918a6bbe627ab</td>
<td>CVE-2023-41260</td>
<td>2024-03-05 09:20:26</td>
<td>Best Practical Request Tracker信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91119">详情</a></td>
<td>4e35676c365fa553a80aff5314f478c6</td>
<td>CVE-2023-49142</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>OpenAtom Foundation OpenHarmony内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91198">详情</a></td>
</tr>

<tr>
<td>73968726d35f204920b0bd14d5c77d8e</td>
<td>CVE-2023-34260</td>
<td>2024-03-05 09:20:26</td>
<td>Kyocera TASKalfa 4053ci Printers路径遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91118">详情</a></td>
<td>ecb995775c76d8c5dd5908afe2eeb132</td>
<td>CVE-2023-47858</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Mattermost访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91197">详情</a></td>
</tr>

<tr>
<td>e40dcdc4c8909a7870506aa4331a5a8d</td>
<td>CVE-2023-34259</td>
<td>2024-03-05 09:20:26</td>
<td>Kyocera TASKalfa 4053ci Printers目录遍历漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91117">详情</a></td>
<td>339c997983e62c6de0ed228a4dd4f086</td>
<td>CVE-2024-0193</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Linux kernel内存错误引用漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91196">详情</a></td>
</tr>

<tr>
<td>57e10f9252e5edd613456eaf6847832e</td>
<td>CVE-2023-36620</td>
<td>2024-03-05 09:20:26</td>
<td>Boomerang Parental Control授权错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91116">详情</a></td>
<td>fff05b3ed5d54fd6eaffdcad88b4a1bf</td>
<td>CVE-2024-0189</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>RRJ Nueva Ecija Engineer Online Portal跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91195">详情</a></td>
</tr>

<tr>
<td>a57869efe886594ff82e3be29c115bbe</td>
<td>CVE-2023-41347</td>
<td>2024-03-05 09:20:26</td>
<td>ASUS RT-AX55操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91115">详情</a></td>
<td>9a56d896aef08359d8c3694580b51f3a</td>
<td>CVE-2023-48732</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Mattermost信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91194">详情</a></td>
</tr>

<tr>
<td>47615b2fde548cf30bbb21235ef27617</td>
<td>CVE-2023-41346</td>
<td>2024-03-05 09:20:26</td>
<td>ASUS RT-AX55操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91114">详情</a></td>
<td>fef647645753877eaff73861fae44d76</td>
<td>CVE-2023-50333</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Mattermost访问控制错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91193">详情</a></td>
</tr>

<tr>
<td>1f7ac34772acff74f45f9f6d40a84040</td>
<td>CVE-2023-41345</td>
<td>2024-03-05 09:20:26</td>
<td>ASUS RT-AX55操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91113">详情</a></td>
<td>d196d61ccc864734d379237a0241a1e8</td>
<td>CVE-2023-6693</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>QEMU堆栈缓冲区溢出漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91192">详情</a></td>
</tr>

<tr>
<td>68017357c74e99bdb37c648f948a3a9c</td>
<td>CVE-2023-38965</td>
<td>2024-03-05 09:20:26</td>
<td>Lost and Found Information System授权绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91112">详情</a></td>
<td>45eb3f692d1d6b43e2283b505a3e257d</td>
<td>CVE-2015-10128</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>WordPress rt-prettyphoto Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91191">详情</a></td>
</tr>

<tr>
<td>5487400ae7f7c9b4fb83e28213827a59</td>
<td>CVE-2023-42027</td>
<td>2024-03-05 09:20:26</td>
<td>IBM CICS TX和TXSeries for Multiplatforms跨站请求伪造漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91111">详情</a></td>
<td>3eeb62bfb269d08875c96dc9cacebfa5</td>
<td>CVE-2023-6436</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Ekol Ekol Informatics Website Template SQL注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91190">详情</a></td>
</tr>

<tr>
<td>c46842b9cca70ea542188e234ce94ba6</td>
<td>CVE-2023-41259</td>
<td>2024-03-05 09:20:26</td>
<td>Best Practical Request Tracker信息泄露漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91110">详情</a></td>
<td>ed75fe3e4c31a945f0f654ef0c455a43</td>
<td>CVE-2023-4280</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Silicon Labs TrustZone越界写入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91189">详情</a></td>
</tr>

<tr>
<td>e26197855ea1af60fa9b4d5770956e1b</td>
<td>CVE-2023-44271</td>
<td>2024-03-05 09:20:26</td>
<td>Pillow拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91109">详情</a></td>
<td>046298e6de7a702c21dbf4d93983d5d2</td>
<td>CVE-2018-25097</td>
<td>2024-03-06 03:18:25 <img src="imgs/new.gif" /></td>
<td>Acumos Design Studio跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/91188">详情</a></td>
</tr>

</tbody>
Expand Down

0 comments on commit da08ac6

Please sign in to comment.