Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Sep 28, 2023
1 parent 0f1f63a commit 6fd856c
Show file tree
Hide file tree
Showing 3 changed files with 22 additions and 21 deletions.
1 change: 1 addition & 0 deletions cache/Cert 360.dat
Original file line number Diff line number Diff line change
Expand Up @@ -115,3 +115,4 @@ b01c750520c239718c36520a80069835
5a149ee10234d0cdccf1c657f297c33a
2302ee59f937af9868dfe9834254938f
c17b5efb9dae532717913a9f7d1e6319
b41f08633537b935b5f96086398e24ba
Binary file modified data/cves.db
Binary file not shown.
42 changes: 21 additions & 21 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2023-09-27 14:26:57 -->
<!-- RELEASE TIME : 2023-09-28 08:28:23 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -27,6 +27,14 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<th width="43%">TITLE</th>
<th width="5%">URL</th>
</tr>
<tr>
<td>b41f08633537b935b5f96086398e24ba</td>
<td>CVE-2023-5217</td>
<td>2023-09-28 07:29:29 <img src="imgs/new.gif" /></td>
<td>CVE-2023-5217:Google Chrome libvpx堆缓冲区溢出漏洞通告</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=6515292822adc884abcd7fda">详情</a></td>
</tr>

<tr>
<td>c17b5efb9dae532717913a9f7d1e6319</td>
<td>CVE-2023-42820</td>
Expand Down Expand Up @@ -259,14 +267,6 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=64bf94e841dbcfd3932b47cf">详情</a></td>
</tr>

<tr>
<td>498da2f033a7ca9cfdcc92fa1674141a</td>
<td></td>
<td>2023-07-24 10:39:33</td>
<td>Atlassian 多个代码执行漏洞通告</td>
<td><a target="_blank" href="https://cert.360.cn/warning/detail?id=64be52c941dbcfd3932b47bf">详情</a></td>
</tr>

</tbody>
</table>
</div>
Expand All @@ -286,79 +286,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>6ca126e0c0ef5582d3c8dc25fe70dfbf</td>
<td>CVE-2023-43325</td>
<td>2023-09-26 00:15:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:15:00</td>
<td>A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-43325">详情</a></td>
</tr>

<tr>
<td>94a00061fadcef694b3fe144ea514352</td>
<td>CVE-2023-4259</td>
<td>2023-09-26 00:15:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:15:00</td>
<td>Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-4259">详情</a></td>
</tr>

<tr>
<td>e4dae046425a7f9c881eb0e2c575fd42</td>
<td>CVE-2023-5176</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5176">详情</a></td>
</tr>

<tr>
<td>2334088ddbe12fe26fbf0c143970af98</td>
<td>CVE-2023-5175</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>During process shutdown, it was possible that an <code>ImageBitmap</code> was created that would later be used after being freed from a different codepath, leading to a potentially exploitable crash.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5175">详情</a></td>
</tr>

<tr>
<td>af0a8b9ddc2ec226d9c40e6b963d3123</td>
<td>CVE-2023-5174</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. This bug only affects Firefox on Windows when run in non-standard configurations (such as using <code>runas</code>). Other operating systems are unaffected.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5174">详情</a></td>
</tr>

<tr>
<td>901b7e64b55ddf18c3eb4701da5cbfec</td>
<td>CVE-2023-5173</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (<code>network.http.altsvc.oe</code>) is enabled.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5173">详情</a></td>
</tr>

<tr>
<td>832295f942ce284eb9c18c62572c92a8</td>
<td>CVE-2023-5172</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5172">详情</a></td>
</tr>

<tr>
<td>1fb752e8abf33c31bd2b0595be0341a3</td>
<td>CVE-2023-5171</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5171">详情</a></td>
</tr>

<tr>
<td>49ae44d682e1640ec6faa637950432db</td>
<td>CVE-2023-5170</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5170">详情</a></td>
</tr>

<tr>
<td>1276656175991a04dc30804d7d5d3d67</td>
<td>CVE-2023-5169</td>
<td>2023-09-26 00:00:00 <img src="imgs/new.gif" /></td>
<td>2023-09-26 00:00:00</td>
<td>A compromised content process could have provided malicious data in a <code>PathRecording</code> resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2023-5169">详情</a></td>
</tr>
Expand Down Expand Up @@ -1734,15 +1734,15 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>89c9b945a6ea6935f21c8a637c7e9076</td>
<td>CVE-2023-39575</td>
<td>2023-09-26 20:04:17 <img src="imgs/new.gif" /></td>
<td>2023-09-26 20:04:17</td>
<td>ISL ARP-GUARD Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=d2a7d0a7daf44e76babf6a4d09914d81">详情</a></td>
</tr>

<tr>
<td>f4a472deba9a40702a93aea8a5cd2567</td>
<td>CVE-2023-2163</td>
<td>2023-09-26 20:04:17 <img src="imgs/new.gif" /></td>
<td>2023-09-26 20:04:17</td>
<td>LINUX LINUX_KERNEL Vulnerability</td>
<td><a target="_blank" href="https://redqueen.tj-un.com/IntelDetails.html?id=a2c5d0c2ad764fc5be8a51904b17a8a2">详情</a></td>
</tr>
Expand Down

0 comments on commit 6fd856c

Please sign in to comment.