Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jan 14, 2025
1 parent 60260aa commit d37163a
Show file tree
Hide file tree
Showing 3 changed files with 73 additions and 65 deletions.
8 changes: 8 additions & 0 deletions cache/Nsfocus.dat
Original file line number Diff line number Diff line change
Expand Up @@ -147,3 +147,11 @@ b8f57baec14ba4708b8ed142c0f9309c
00ae7d4a37debb2321027ed007f666b3
5dd3ebe9ca9b09dc42b6b3d0f41401a0
16ac851b69ce826813f5578f03e58e82
e5805dcb0d1ef9c66ee61f8d17edf37c
aeefbe48003b9e86b1618138f4085ecf
232692ead90ac2aec849b01b6da0f3a8
6b0240f107a9789b90bf8ee5e4611513
5bda007cdc90550b6fe3e7f6b3e16707
c5e034f9e477ba0d52a78ba8de7de9c0
90979a64e7c9e81494a1945075b8824c
1ae776e1a34fa96b0d4a822fb18871a0
Binary file modified data/cves.db
Binary file not shown.
130 changes: 65 additions & 65 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2025-01-14 03:23:55 -->
<!-- RELEASE TIME : 2025-01-14 12:43:06 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -1987,6 +1987,70 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>e5805dcb0d1ef9c66ee61f8d17edf37c</td>
<td>CVE-2025-21315</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Brokering File System权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109526">详情</a></td>
</tr>

<tr>
<td>aeefbe48003b9e86b1618138f4085ecf</td>
<td>CVE-2025-21309</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Remote Desktop Services远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109525">详情</a></td>
</tr>

<tr>
<td>232692ead90ac2aec849b01b6da0f3a8</td>
<td>CVE-2025-21299</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Kerberos安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109524">详情</a></td>
</tr>

<tr>
<td>6b0240f107a9789b90bf8ee5e4611513</td>
<td>CVE-2025-21292</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows Search Service权限提升漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109523">详情</a></td>
</tr>

<tr>
<td>5bda007cdc90550b6fe3e7f6b3e16707</td>
<td>CVE-2025-21269</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft Windows HTML Platforms安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109522">详情</a></td>
</tr>

<tr>
<td>c5e034f9e477ba0d52a78ba8de7de9c0</td>
<td>CVE-2025-21268</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft MapUrlToZone安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109521">详情</a></td>
</tr>

<tr>
<td>90979a64e7c9e81494a1945075b8824c</td>
<td>CVE-2025-21219</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft MapUrlToZone安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109520">详情</a></td>
</tr>

<tr>
<td>1ae776e1a34fa96b0d4a822fb18871a0</td>
<td>CVE-2025-21189</td>
<td>2025-01-15 12:40:58 <img src="imgs/new.gif" /></td>
<td>Microsoft MapUrlToZone安全功能绕过漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109519">详情</a></td>
</tr>

<tr>
<td>b23974f7dc98647139d25f8836cb14f5</td>
<td>CVE-2024-28172</td>
Expand Down Expand Up @@ -2163,70 +2227,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109512">详情</a></td>
</tr>

<tr>
<td>00ae7d4a37debb2321027ed007f666b3</td>
<td>CVE-2024-53752</td>
<td>2025-01-13 03:21:48 <img src="imgs/new.gif" /></td>
<td>WordPress plugin Stripe Donation跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109511">详情</a></td>
</tr>

<tr>
<td>5dd3ebe9ca9b09dc42b6b3d0f41401a0</td>
<td>CVE-2024-45520</td>
<td>2025-01-13 03:21:48 <img src="imgs/new.gif" /></td>
<td>WithSecure Atlant拒绝服务漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109510">详情</a></td>
</tr>

<tr>
<td>16ac851b69ce826813f5578f03e58e82</td>
<td>CVE-2024-53742</td>
<td>2025-01-13 03:21:48 <img src="imgs/new.gif" /></td>
<td>WordPress Multilevel Referral Affiliate Plugin跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109509">详情</a></td>
</tr>

<tr>
<td>8cbedb6803b07435e26e49959487dd6d</td>
<td>CVE-2024-45511</td>
<td>2025-01-10 06:31:04</td>
<td>Zimbra Collaboration (ZCS)跨站脚本漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109429">详情</a></td>
</tr>

<tr>
<td>ae63ac0f80087b3a1d5e0e6504e430f6</td>
<td>CVE-2024-33439</td>
<td>2025-01-10 06:31:04</td>
<td>Kasda LinkSmart Router KW5515操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109428">详情</a></td>
</tr>

<tr>
<td>8e0d582d32ce359329d22936884e8b91</td>
<td>CVE-2024-52739</td>
<td>2025-01-10 06:31:04</td>
<td>D-Link DI-8400远程代码执行漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109427">详情</a></td>
</tr>

<tr>
<td>f7cd080ce17a66e235271ace4ec7dcca</td>
<td>CVE-2024-29292</td>
<td>2025-01-10 06:31:04</td>
<td>Kasda LinkSmart Router KW6512操作系统命令注入漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109426">详情</a></td>
</tr>

<tr>
<td>274970d111617fa6323b6bfcfe8446d9</td>
<td>CVE-2024-52796</td>
<td>2025-01-10 06:31:04</td>
<td>Password Pusher不受限资源分配错误漏洞</td>
<td><a target="_blank" href="http://www.nsfocus.net/vulndb/109425">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand Down

0 comments on commit d37163a

Please sign in to comment.