From e469e044d24fa94250ee66279688719f553e8e45 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Sat, 12 Oct 2024 12:41:11 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 49635328 -> 49635328 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index 6641cb41c58..8c1913cb37c 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -128,3 +128,18 @@ c06d3d38c8160900f6e38856c2780665 72f5a3dfb7be4d5da0df17db2b452c73 cb3ff3014afcfcbc6e351b182804269c e6749972d7bce2c245d9e1db5c67e93c +a8221977bb56a2177eb286721c70a1ac +6086cece8fdff422e756065824d50788 +927ac88b5f3fae9f490e5ba9addc538d +2be8c2cbb67a66e31f497be307cd3e07 +21ed7b6baef971485c77a475905581fd +ffd440a4c366ad022a06f29d7ec93c9c +2fbede71c556afa408931f8bab996297 +2fd159234db806c80d8607fa8be19d46 +8b0034f5623be387cab3875d514a023c +068bbcb4321b0f5f95496ced61e9c0ff +b37cebfb4a4d77b48571bfceddbdee5f +5dc2a88ae2ded0963f831af5de5b69c4 +ee851e213daf3c9e91ae689b5b397dfb +ada4d4565453aac21e40203a0d6aed34 +9b951664ffe695ea7591b7c4cd4063f5 diff --git a/data/cves.db b/data/cves.db index c8b7ca4cc48d1078eed846d68cb82f4affe5cecf..2e395a82aae509600956c814ee72d1d81b47ff17 100644 GIT binary patch delta 4537 zcmbuDQCM@^fev{7-a3B$855sjph(K0P6@_nB3Jf}vP$uuZi4Za8=TlQmL zk|kS~QYaK5OU5osWsQ{Gbw4w>_cpn&m)Gn5@jic?^T+4;eb4XvOkezZr|G!3OVQ|A zUHcS`t`(Icm5j<(Dos?HsuZg^0&MMoh?4Z&`rK?Iel^s=fQpu|9tg?&Bt}45!?5?thN_Uk#ReGrGrLwomJ}MO1xVyKuZmWr+7sJJSgimwu=gepB%_E$MTrI*TqDhH|bRw-3ESf!83Au4@U4pr%= z(qCnO%3&%4RSs7vQ#nFqkjh|{Au2;v%2kG`3|ASUGE(J8l~F3ARmP|srE;{&Se0W` zm`|hsi?}?D(9%2t1?67JeBiRE>M}Na-qsaDi^EF zQn^IsQkBb8E?2oiWwy$dDp#pot#XaZwJO)CT(444xk2Sdm77#ORk>T`9+i7l?o*kka=*$0Di5kWr1G%Je3eI39#wfv<#Ck-DhpMfP+6q1 zSmjBTr&OL+S)#I3rm|e+d6gGbR;awF@{-ESDl1i9QF&G6HI>&@R;j$9 zQm68!%3CULtGuJ~uF88V@2h;EvRdUsm5)?DR{2C_jmlb;bt<2#e5Ufb$`>kMs(hug zUgc|*Z&Ws@e52PbxpF{G#%!%0E?pn;}Irr3e{pg(hf)O z3wvW9lwe=%2LmQ7*l^&&gO30qdSZVZfL=Hd2cb7gaWMMe5cI{N=!gCofWt5lhocNf zU=Rjl2!^5@!!R5pFcL>%6h>nVj>6Fxi(^nf{|GU1NRT3raTt#Z9E%Bw+=|<9JMO@pn1j187kA?x+>84#5BK8% zJcx(zFy`YCJc`HgI2K?bp1>k3#*=soPh$y|;u$=P=dcXR@jPC@3cQGy@G@576}*bq z@H$rE4b3u>QzkD>Ok<6r&lMqXk-`6}Coew81vm7H!cE+o3%= zpd&h=Gq%SL=z^~3h8?jJve+5BU{~yh-LVI{V^8$JUf3J^palD3KNv7!!G;4D9()7{ z(G&aQ0QACvI0(H_ii6PyhoCPGML+b%033#aI2>g-0)sFZLogKO7>3~(fsr^8qc9p{ za1@TlSR8};`A3M6LxL1}jKg?T;8;w+L>z}oRACa1M>Qs+1}ES|oP;Tuij#2)PQ__B z9n&x!wKxN3;w&i6#yL0_GjJZx#|4;)3vm%H#w=WdOK}-4#}$~3D{&RB#x=MW*Wr2; za070{O}H7i;8xs*+i?f(#2nm(xwsqm;9lH^dAJ`B;6XfuhcO?I;88q=$FTql@dOrO zF`mRzcp6Kv6wlyUJcngij_2_LR^UavgqN`rui#a@hS#wQZ=eou;w`+5cknLW!~6IE ztMMT|!pHaoYp@pU@F_mS=lB9&;w!Aj*Z2k-@GUlG7Rsi~ErWJ%+vLZ8Y%{jaiZskcOuWH_+*|_4R#XXu{(qw+y?1FV$%{C^Lt}Cl;uXV$lmu=sD zh~0X47>BOuc}_l`dZC*}z8jjcpL24FV|aGnUHkZ=wbvB-jObfp8J1JxnU+&la%jcG zbaJ-;3Gw9dg_WyjWI7kNox3s9w3%sTO{=F}SiN|k%q{~>!wUScww=}uqt;^}wJ3?4 z#Bn{>aqTF|S!U`OmSIOm;zeml1-d+ez!n z>l4FCq-o%qsb$(pl(%zX8k$k+1!3&QcIYShc#DK-dF2B~mG>>p_L*3bR@P)^&l^+H zvCuo-m}$QGiAFW#%-U{RH?%$%k#m!r6$L?*T1lE1AtMWHGs?S3>c(D}+ww%FV{e`t zQIVchSpCTSOt-?~rkgTNivN3vW<%1dPY(Gr8QXp?jq|a?EPX$A0@pX=d@fCrI7!pO ztnW8uw(DTp;a_ChuK(&UGi41KySA0q4X)4h;$(&w#BnZmY|D&|yqgbQC-kUzW*X*< ze13~TdbU3_nmnm=aG^B+V5U>yzyX^w#ZCTmA^O!vLZ@~Its7Jy8ABw94a0Wwu4mbC zY6pHUiurUC*K{JovU80hwr>aK?9v4nb)Nm$g&o=z7PTU=*}y6rB5v*8T6YAI?$d}^ z`NVWX%XX4DFuYt~B!Or6`6!4}GfW(>QN-t_mscEDHL1EPJ1otOudJF_HEwElWJP6J zR8w6s#mD*Mfu1v zg3vbeK^(M?;-|Tg-Do^r$1+@_P`YeQX2-&9%Wo~}Qh0(3 zx%qs5&jj_Efq!OLI7;)OZ*m`Vz8^WfNetHw%zV=5VD%aEZ)L*z%whk|#A%ST za&heWk>{n%&Ix^Pjp64KJ2e{5uRde_jZA15^_c;GW0HO za;_cx)oJWMGSNG||8i*4xDKIV*7ni5{tefmgg?hK0@f*)2KgkPcPuOQUC;2`z;Y7T z@PnYy)LhRu%B%7FbIpI=Wp1SD6lLumN07TK7)JkpJw$0Rbr?zcQ+tjvg+jeT(Hm-I0u;&BLS~Kj(jrhYbC2>IT z)FhX72b+qMYJMWk*z3JR4bYlWJR}PSTU_wR%|Pd71xSq#kUez z39Up{Vk?Q2)JkS0w^CRstyETOD~*-bN@u0FGFTa{Ojc$qiSUIg+R&Fbg zmDkE=<+lo01+79>VXKH$)GB5bw@O$gtx{HLtBh6FDrc3qDp(b*N>;E{*{WhywW?Xw ztr}KMtCm&Us$RI)z23A9>k=590Vl}mzS@dacwXj-Rt*q8o8>_9=&T4OUusT|u ztj<;!tE<(`>TdP0dRo1#-c}#0uhq}$Zw;^pT7#^?)(~r`HOv}rjj%>qqbysatufYE zE5sUSjkhLP6Rkvn z_pJxkL+g?C*m`0;wVqketryly>y`D|dSkt{-dXRh57tNPll9s9Vtuu~S>LT6*00uY z*6-FI)}Pj2*5B4Y*1y(&AqtqN00bfo!Xg~PBLX5K5+WlCq9PiC5FIfP6R{8*aS#{r z5FZJU5Q&f&NstuDkQ^zH5~+|HX^sD|pOftsj=+NguNsE7J!fQD#< z#%O}3XojEto1+C)9hGPUqVib(g7=y70!8nY^1Wd#vOvV&U#WYOE49vtV%*Gtd#XQW%0xZNLEXEQn z#WF0%3arE`ti~Fw#X79V25iJ8Y{nLB#Wrlm4(!A(?8YAK#XjuE0UX339L5nG#W5Vm z37o_!oW>cP#W|eE1%%=vF5xn+;3}@+I&R=5Zs9iW;4bdrJ|5s99^o;b;3=NrIbPr; zUg0&~;4R+aJwD(gKH)RI;48l2JAU9-{D$B02mZug_#6M=U;GykqCoDCK!ib9ghO~l zKtx1BWJEz!L_-jwBL-q37Gfg~;vyd6BLNa35fUQ_k|G(BBLz|-6;dM&(jpzwBLgxb z6EY(UvLYL@BL{LK7jh#H@**GdqW}t`5DKFRilP{bqXbH#6iTBE%Ay>~qXH_T5`s|~ zRZtbxP#rZ;6SYtqbx;@eP#+D@5RK3nP0$q0@Uwq&v_MO=LTj`^TeL%abU;URLT7YA zS9C*n^gvJaLT~gzU-UzN48TAP!e9)+Pz=LxjKD~Yf-xFnFcu*ghw+$ziI{}Rn1ZR8 zhUu7rnV5yyn1i{Phxu55g;<2eSc0WkhUHj+l~{$;hy6H!gE)l4ID(@%hT}MalQ@ObID@k|hx53AP+Y_%T*eh##Wh^V4cx>n z+{PW;#Xa1|13bhdJjN3|#WOs|3%tZDyv7^6#XG#m2YkdQe8v}i#W#EpJg6UmE2>2Z l3<~`vdefl8F^^mbI1sQqN4Jt?BmUf@VGoBk{SlZu;D1z$K@b1{ diff --git a/docs/index.html b/docs/index.html index e0a7a43edeb..e01c2a449f5 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -1979,6 +1979,126 @@

眈眈探求 | TITLE URL + + a8221977bb56a2177eb286721c70a1ac + CVE-2024-7201 + 2024-10-12 12:38:53 + Simopro Technology WinMatrix3 Web package SQL注入漏洞 + 详情 + + + + 6086cece8fdff422e756065824d50788 + CVE-2024-5670 + 2024-10-12 12:38:53 + Softnext Mail SQR Expert and Mail Archiving Expert操作系统命令注入漏洞 + 详情 + + + + 927ac88b5f3fae9f490e5ba9addc538d + CVE-2024-42053 + 2024-10-12 12:38:53 + Splashtop Streamer for Windows默认权限错误漏洞 + 详情 + + + + 2be8c2cbb67a66e31f497be307cd3e07 + CVE-2024-42052 + 2024-10-12 12:38:53 + Splashtop Streamer for Windows权限管理错误漏洞 + 详情 + + + + 21ed7b6baef971485c77a475905581fd + CVE-2024-42051 + 2024-10-12 12:38:53 + Splashtop Streamer for Windows权限管理错误漏洞 + 详情 + + + + ffd440a4c366ad022a06f29d7ec93c9c + CVE-2024-42050 + 2024-10-12 12:38:53 + Splashtop Streamer for Windows权限管理错误漏洞 + 详情 + + + + 2fbede71c556afa408931f8bab996297 + CVE-2024-6520 + 2024-10-12 12:38:53 + WordPress Happy Addons for Elementor Plugin跨站脚本漏洞 + 详情 + + + + 2fd159234db806c80d8607fa8be19d46 + CVE-2024-7202 + 2024-10-12 12:38:53 + Simopro Technology WinMatrix3 Web package SQL注入漏洞 + 详情 + + + + 8b0034f5623be387cab3875d514a023c + CVE-2024-37381 + 2024-10-12 12:38:53 + Ivanti Endpoint Manager SQL注入漏洞 + 详情 + + + + 068bbcb4321b0f5f95496ced61e9c0ff + CVE-2024-41637 + 2024-10-12 12:38:53 + RaspAP命令注入漏洞 + 详情 + + + + b37cebfb4a4d77b48571bfceddbdee5f + CVE-2024-41139 + 2024-10-12 12:38:53 + SKYSEA Client View权限分配错误漏洞 + 详情 + + + + 5dc2a88ae2ded0963f831af5de5b69c4 + CVE-2024-41143 + 2024-10-12 12:38:53 + SKYSEA Client View来源验证错误漏洞 + 详情 + + + + ee851e213daf3c9e91ae689b5b397dfb + CVE-2024-41126 + 2024-10-12 12:38:53 + SKYSEA Client View路径遍历漏洞 + 详情 + + + + ada4d4565453aac21e40203a0d6aed34 + CVE-2024-41881 + 2024-10-12 12:38:53 + SDoP堆栈缓冲区溢出漏洞 + 详情 + + + + 9b951664ffe695ea7591b7c4cd4063f5 + CVE-2024-6124 + 2024-10-12 12:38:53 + M-Files Hubshare跨站脚本漏洞 + 详情 + + 73003f18bdb351c594e21063510c69d7 CVE-2024-42029 @@ -2099,126 +2219,6 @@

眈眈探求 | 详情 - - e5f28ba928f75cc38ff2d90b5b10a9ed - CVE-2024-41112 - 2024-10-11 09:23:02 - streamlit-geospatial输入验证错误漏洞 - 详情 - - - - a1b7d11b11132756d7b65d22ca692806 - CVE-2024-6661 - 2024-10-11 09:22:06 - WordPress ParityPress – Parity Pricing with Discount Rules跨站脚本漏洞 - 详情 - - - - 22bee4d934505369b3508678261b2f87 - CVE-2024-6634 - 2024-10-11 09:22:06 - WordPress Master Currency WP Plugin跨站脚本漏洞 - 详情 - - - - a96c59451064ce1b9b4d86839a3d5cc2 - CVE-2024-6591 - 2024-10-11 09:22:06 - WordPress Ultimate WordPress Auction Plugin未授权邮件创建漏洞 - 详情 - - - - 7a76238d0f00302376bf6ea558732ac1 - CVE-2024-6573 - 2024-10-11 09:22:06 - WordPress Intelligence Plugin完整路径泄露漏洞 - 详情 - - - - cc90f10451c3db4d0b91ee13cb8cd563 - CVE-2024-6566 - 2024-10-11 09:22:06 - WordPress Aramex Shipping WooCommerce Plugin完整路径泄露漏洞 - 详情 - - - - 4ed7b40ee6e6d3106101ff230571272f - CVE-2024-6548 - 2024-10-11 09:22:06 - WordPress Add Admin JavaScript Plugin完整路径泄露漏洞 - 详情 - - - - 7ad8fa25ef01182e7b68fa4df5ec52ce - CVE-2024-6547 - 2024-10-11 09:22:06 - WordPress Add Admin CSS Plugin完整路径泄露漏洞 - 详情 - - - - e4a315dca4650fe9e703fb85beca1ff8 - CVE-2024-6546 - 2024-10-11 09:22:06 - WordPress One Click Close Comments Plugin完整路径泄露漏洞 - 详情 - - - - a542e458fdef7f8bcd442bffb9404774 - CVE-2024-6545 - 2024-10-11 09:22:06 - WordPress Admin Trim Interface Plugin完整路径泄露漏洞 - 详情 - - - - c06d3d38c8160900f6e38856c2780665 - CVE-2024-6549 - 2024-10-11 09:22:06 - WordPress Admin Post Navigation Plugin完整路径泄露漏洞 - 详情 - - - - 7dcbaed96391fff5f09eec3578978fee - CVE-2024-4603 - 2024-10-11 09:22:06 - OpenSSL拒绝服务漏洞 - 详情 - - - - 72f5a3dfb7be4d5da0df17db2b452c73 - CVE-2024-4609 - 2024-10-11 09:22:06 - Rockwell Automation FactoryTalk View SESQL注入漏洞 - 详情 - - - - cb3ff3014afcfcbc6e351b182804269c - CVE-2024-4956 - 2024-10-11 09:22:06 - Sonatype Nexus Repository路径遍历漏洞 - 详情 - - - - e6749972d7bce2c245d9e1db5c67e93c - CVE-2024-27260 - 2024-10-11 09:22:06 - IBM AIX命令执行漏洞 - 详情 - -