From f1e875033d38980882acb85bf913c97d3c15f158 Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 25 Apr 2024 07:23:37 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Nsfocus.dat | 15 +++ data/cves.db | Bin 47239168 -> 47243264 bytes docs/index.html | 242 +++++++++++++++++++++++----------------------- 3 files changed, 136 insertions(+), 121 deletions(-) diff --git a/cache/Nsfocus.dat b/cache/Nsfocus.dat index e4e926f5196..f444150ae9a 100644 --- a/cache/Nsfocus.dat +++ b/cache/Nsfocus.dat @@ -133,3 +133,18 @@ aacd0b4a71126b2e578f5f1a3a78445a da34fd1cce20f9eb618bace073265b22 aff24424388dbbe3da897958bd9ade53 2e86c3c1241581e57ae5041ebe7f1e94 +875bb675a73e20aec42cee75dbb1f37c +efd6f912f8f0e243c68474c554260dd1 +084a3a7b8b9865afef22f7d5273bbea9 +24654bc968df520e4b1692c088b6c059 +ea4315593bc948451349a62db9c939ae +45404f0733a972ab85c7d16a74aea708 +96194b3303a1bd3cec052c4ee74b8b0c +bf3d800e80ff3a32bc332871d7701c3f +f693c98a214f024dd5eb11ae320121b9 +b7eda7b8fd169d557c1b1fb0883d6709 +a97f54c3568e80c9601eb00213a2e682 +c7d45539f7ed70cd01366f66bfc9f8b9 +42e392f592288339f51cb33f1eaf21bc +a1ec46fcb6ef79449d1f85c80f4e456b +6f5d25a12e9b936c12438e3cb3649b95 diff --git a/data/cves.db b/data/cves.db index 4ba4852749c45bb8c9cd8696034335e29ff6bf05..fca03b3c5953d5e4e621b89c48405bbdbe10334f 100644 GIT binary patch delta 4441 zcmaLZcXU+c76tHRLMYO^2*My>!{FRHb5(>GA|NdgM6j{%%-k!HCIk@`gi*JEsDLdZ z>VO5Yp$0T6C@5AC#oi0{F82O>`?};UL3n@s&dSP~HT$0Po$n@dmThb|XT!#Ji#irB zC@3gtwm9CWa6t}4ArT{rhB1L$_VZ`CY5kzm|NTLtXmnbEUBFcz;Via*4F`5`d98a7;oJgERoJ@=*G#{Tx6B!~)1Vl)jLX0D-h*OF2 z!~|j@F^QN=oJLF`rV`b}G~#q(I&lUugE*5oi#VH@Nz5Y7A!ZYEh#YY)aUO9#LE-{p zE-{aoPh3bWATA;Tti$-Tu0=IWyEsg zdg2D+M&c%71#vU6lDLJqmAH+#ow$QoMchf;Mchr)603+M-aX;|@v6fgz zJV-o5tS2@Q4-=0N8;M7W$B4&?Cx|DBr-)6&X5wjL3-Ju`EU}e%j(DDUfq0R4iFlcK zg?N>Cjd-1SgLsp8i+G!Ohj^FRM!ZM7PkcapNPI+mOngFoN_<9qPJBUpNqj|oO>8H= zA-*NPBfckoAbuo%B7P=*A$}!(BYr3TApS%AIUj`=qflZ}B=w|N>PrJ@D2-$2ik5kTc~hIa_AREICJJ%N)tcxpJPIFO&;puFRA9a-l4ci{xUt zL>9^-SuB^zWpcS(Ay-O`TqR57YFR4R$hC5v_tzlw0IhxlL}D zJ7ksIDR;@;QY))vjoc&mN}b#%_savaR@TXb@{p{T4f3!&A{*sVc}yOcC*(x#Ia>P5 z02wI9$RHUkLu9B7lL{FwBcxJB%CRy^j+4)hmD3fHeoF-Fbs#MD~IbEj988So8l(Xb)nJKg69GNY1Bq!&}d2+r`E|9r0 zPv*;ovOq49i{%noD2rsVTq>8z<#L5wDK&DHERm~asazx1%5{>LWwKnZmmB0pxk*;Y z&9YK%kz3_9xn1s%RdT1?C3j1$td=!$kK7x35OuNT?=&tbD15Bw+Jfl+z4cArt&7bo ziZx!c{>u03V#N)MOPX?Zy@ks@uZyYN7nS>?@<3G9MrB=89*oLEQCT0A4N-YGDvv~E zV^kiE%41P^JStB_<;kc#6_rg<*&LOpqp~F`&&1X*`~2Bh_QkHv3lMQ>G>vrTLP>Y|3qovheQGHW}I;*vo& znaE@lhUL1U>!!nu7pBtQuCb2i*%bqZl@A>_I$kzx=*ZHtk@2ztr6UwuUbF2jbjrsE zZHW~Z|08v5l$wfCV>?oPFBv*^#&X>eGu73wI=@)t{eCr^2k^dRfOwW{k8ErW2ZV)=egM*Jo-^iT|fhCy|SDbwQL` zrRj#QXJx#UZyI)}Q_E(ZAZ-|aV3`R+hq}8|cTcHh`E5hC#yZ#A`8XXzZPw2IUz?$o zO(hZj2#3?JDo}={x&1b(%j&y{W}?2v!=uFbLH{D!$(WAzIE-qk~+ z7%PgIwIjxMv`AqhX<6DI(@&=yZLi__N!t(n{PH!cVy&BawquR(GvlZE=?OL4dd_IS zyYKEFeYc(K#oC#F-M=FB5csxbIF4tfGoGEY9mBFc-!-#oFXLIBAM850l;K+W?JHKs zx)y)EZeGQ}e4p3m7Ve$j&~$68{y)xWq@t2`t`%#~j@lTaB-3^sTPbcT8#-npu+v&e zGow{ZyBgfTmcn&RqpUn$F>Z1&scJ^N%%57*xA!k?^UI2MxoCcr<>Y#>_N*wYT3Lyd z?OV~_r@fTx_+b#5W|+)6X3|Qh1OH!Hj%6ABN(NU=8XxaBa70PUH1$sT`=^q!(we)& z)*Y{#zctoq$1#nHGTmHT)}E=%1CEU*8D`zkGt4j*CIZv8GH%LF+8M{OO*fIv8aqwW zDsfYWJ)mlupBYybFPmIFv1(E<Jg(Y)cSvw;No2al<(n+V?q~j;8 zz)bi-#x^tBJ13jg^|q3`uAZUWP_t-C_cldl|H=8`8`s3T z>yd0H*NLl(qhs|I=^JX)4Krys2$P;|ds!pYZP2Z^1KV-ayF{8sD&bTP8dF(b8ZVnr Z6-=5IA5|5ck@t_^6zjZmSk%Am{ukGZF?av~ delta 2738 zcmWmGQ*@qb7=_{FPt&ALZQHhO+uXHnPKsUIZfYB;Q(H6BG1^YY9d_)wzk};OdC&G* z&suNn&>Cb7wuV?ktzp)1YlJn@8fA^P##m#man^Wif;G{aWKFiFSW~TO z)^zJNE7qD}&9r7&vn^Y5thv@aYreI>T4*h@7F$cKrPeZQxwXPtX|1wWTWhSf);epw zwZYnGZL&67Tdb{CoVCr`ZtbvkTDz>>)*frGwa?mb9k32shpfZa5$mXR%sOtJuufX1 ztkYJ!b;detowLqc7p#lcB`d+YY+bRgTGy=W)(z{Xb<4VK-LdXk_pJNY1M8vn$a-wO zZoOf>X+5#tvfj4dvEH@bv);Epus*atvOcz+TFr?A9>vQW1>r3k^>uc+! z^^Ntd^_}&-^@H`J^~(Cm`q}!$`qlc)`rZ1&`qTQ$`rG=)`q%nzzQPwP93ey?5h9To zQHVwoBt;C8AvsbYB~l?Z(jYC;Aw4o6BQhZ~vLGw6AvYy&_p*|X*AsV4EnxH9~ zp*dQhC0e01+Mq4kp*=dFBRZiox}Yn%p*wn@CxZQZp*Q-VFZ!WB24EltVK9bZD28D; zMqngHVKl~IEXH9xCSW2aVKSy*DyCsNUPCNqU?yf^HjFu#i+Pxj1z3nhSd1lDie*@i z6OR7Mq4 zMKx4M4b(&})J7fDMLpC<12jY1WMLV=d2XsUybVe6+MK^Ru z5A;N^e=qb#AM`~(^v3`U#2^gD5DdjI495tJ#3+o$7>va@jK>5_#3W3{6imf5Ovh`8 z#SF~EEX;;62XiqG^RWO6u?UN?1WU0D%drA0u?nlP25Yen>#+eFu?d^81zQn^ZP<<- z*oj@(jXl_leb|o!IEX_yj3YRTV>pfzIEhm@9lEIa(6*;BG3&#xM{EuY{(A|@p2dge zMTD}3C9HW7ABv2Q42$AnY23^B5IGa%Y>;z7&Ih>=P)gae`Tn}<1 z$ju + @@ -1971,6 +1971,126 @@

眈眈探求 | TITLE URL + + 875bb675a73e20aec42cee75dbb1f37c + CVE-2024-1328 + 2024-04-25 07:21:26 + WordPress Newsletter2Go Plugin跨站脚本漏洞 + 详情 + + + + efd6f912f8f0e243c68474c554260dd1 + CVE-2023-6814 + 2024-04-25 07:21:26 + Hitachi Cosminexus信息泄露漏洞 + 详情 + + + + 084a3a7b8b9865afef22f7d5273bbea9 + CVE-2024-25331 + 2024-04-25 07:21:26 + D-Link DIR-822和DIR-822-CA远程代码执行漏洞 + 详情 + + + + 24654bc968df520e4b1692c088b6c059 + CVE-2024-26521 + 2024-04-25 07:21:26 + CE Phoenix Cart HTML注入漏洞 + 详情 + + + + ea4315593bc948451349a62db9c939ae + CVE-2024-28163 + 2024-04-25 07:21:26 + SAP NetWeaver Process Integration(PI)信息泄露漏洞 + 详情 + + + + 45404f0733a972ab85c7d16a74aea708 + CVE-2023-49453 + 2024-04-25 07:21:26 + Racktables跨站脚本漏洞 + 详情 + + + + 96194b3303a1bd3cec052c4ee74b8b0c + CVE-2024-21584 + 2024-04-25 07:21:26 + Pleasanter跨站脚本漏洞 + 详情 + + + + bf3d800e80ff3a32bc332871d7701c3f + CVE-2024-25999 + 2024-04-25 07:21:26 + PHOENIX CONTACT CHARX SEC输入验证错误漏洞 + 详情 + + + + f693c98a214f024dd5eb11ae320121b9 + CVE-2024-25996 + 2024-04-25 07:21:26 + PHOENIX CONTACT CHARX SEC源验证错误漏洞 + 详情 + + + + b7eda7b8fd169d557c1b1fb0883d6709 + CVE-2024-25998 + 2024-04-25 07:21:26 + PHOENIX CONTACT CHARX SEC输入验证错误漏洞 + 详情 + + + + a97f54c3568e80c9601eb00213a2e682 + CVE-2024-25995 + 2024-04-25 07:21:26 + PHOENIX CONTACT CHARX SEC身份认证错误漏洞 + 详情 + + + + c7d45539f7ed70cd01366f66bfc9f8b9 + CVE-2024-25994 + 2024-04-25 07:21:26 + PHOENIX CONTACT CHARX SEC输入验证错误漏洞 + 详情 + + + + 42e392f592288339f51cb33f1eaf21bc + CVE-2024-27121 + 2024-04-25 07:21:26 + Omron Machine Automation Controller NJ Series和NX Series路径遍历漏洞 + 详情 + + + + a1ec46fcb6ef79449d1f85c80f4e456b + CVE-2024-21805 + 2024-04-25 07:21:26 + SKYSEA Client View访问控制错误漏洞 + 详情 + + + + 6f5d25a12e9b936c12438e3cb3649b95 + CVE-2024-0906 + 2024-04-25 07:21:26 + WordPress fx Private Site Plugin信息泄露漏洞 + 详情 + + 567431a4283ad2e12a5cb7067f11a11d CVE-2023-50933 @@ -2091,126 +2211,6 @@

眈眈探求 | 详情 - - 34e5edcd375e76ccb9a876da1d284514 - CVE-2024-1290 - 2024-04-24 05:25:36 - WordPress User Registration Plugin信息泄露漏洞 - 详情 - - - - 1cb3cbfc95968913bb3565e75f1ad80d - CVE-2024-23610 - 2024-04-24 05:25:36 - National Instruments LabVIEW越界写入漏洞 - 详情 - - - - 4781cc8684e14f7f9da2d9a13758669e - CVE-2024-23611 - 2024-04-24 05:25:36 - National Instruments LabVIEW越界写入漏洞 - 详情 - - - - fb291f63f63d384c9dc454c95aab69bb - CVE-2024-23717 - 2024-04-24 05:25:36 - Google Android按键注入漏洞 - 详情 - - - - 1bb8e4eda2552ccd10a24b6f14711a17 - CVE-2024-25987 - 2024-04-24 05:25:36 - Google Pixel越界写入漏洞 - 详情 - - - - 86515035dcc73a73d046b3f88085c4f5 - CVE-2024-25991 - 2024-04-24 05:25:36 - Google Pixel越界读取漏洞 - 详情 - - - - 78503f855ffda646265a1e975098db02 - CVE-2024-25985 - 2024-04-24 05:25:36 - Google Pixel越界写入漏洞 - 详情 - - - - 28db3dbb50e5d5ba2bfdd6db46d57f4c - CVE-2024-25990 - 2024-04-24 05:25:36 - Google Pixel越界写入漏洞 - 详情 - - - - cd75681d81d34a8048c41d4b2742c387 - CVE-2024-1696 - 2024-04-24 05:25:36 - Santesoft Sante FFT Imaging越界写入漏洞 - 详情 - - - - 38afd1882fe13601131d68802c2d7304 - CVE-2024-0046 - 2024-04-24 05:25:36 - Google Android限制绕过漏洞 - 详情 - - - - 29112aafeaf029b4da3491b8271f51b0 - CVE-2024-0047 - 2024-04-24 05:25:36 - Google Android拒绝服务漏洞 - 详情 - - - - ccd7987217a20bda9f9333c1db94d2be - CVE-2024-0045 - 2024-04-24 05:25:36 - Google Android越界读取漏洞 - 详情 - - - - 7ee640c65d71b60d05b02f7adf8a4cc3 - CVE-2024-23612 - 2024-04-24 05:25:36 - National Instruments LabVIEW异常情况处理错误漏洞 - 详情 - - - - 2d0823fb3af70cad015ef58321a5a58a - CVE-2024-0039 - 2024-04-24 05:25:36 - Google Android越界写入漏洞 - 详情 - - - - cb6827f79cbe1787d002b5b7a54dbf3e - CVE-2024-0044 - 2024-04-24 05:25:36 - Google Android输入验证错误漏洞 - 详情 - -