From 6fd856c1b35f00be4e0cc48d759b260270bcd25c Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Thu, 28 Sep 2023 08:28:25 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Cert 360.dat | 1 + data/cves.db | Bin 43057152 -> 43057152 bytes docs/index.html | 42 +++++++++++++++++++++--------------------- 3 files changed, 22 insertions(+), 21 deletions(-) diff --git a/cache/Cert 360.dat b/cache/Cert 360.dat index 4ab6e6b5501..55cc1d82ae8 100644 --- a/cache/Cert 360.dat +++ b/cache/Cert 360.dat @@ -115,3 +115,4 @@ b01c750520c239718c36520a80069835 5a149ee10234d0cdccf1c657f297c33a 2302ee59f937af9868dfe9834254938f c17b5efb9dae532717913a9f7d1e6319 +b41f08633537b935b5f96086398e24ba diff --git a/data/cves.db b/data/cves.db index 066a3d4286a357c9806712491734c5a8cbb60d2b..f31b31a03e36b3ef827bbf8fe515504f08cc086e 100644 GIT binary patch delta 2680 zcmWmDb#xa57sl~-KVrbB!RY$Y4NJDsFuJ?rS;DB%9UJg4Mh-=%fD9A`3lUMILje@@s|UZ>yaYlAj|h#0pr&tm0M)tE3fb zm9k1(Wvno(tX0k`Z&k1=TH#hDtFjegRk5mC)vW4P4XdVA%c^bFvFcj&te{ojYG5_A z8d;64CRS6cnbq8CVYRecS*@)$R$D95in5}u7%SF_v)WnlR)UpiwYNH09j#7QXRC|V z)#_$-x00+LR!^&!)!XW0^|kt0{jCAkKx>dS*cxIDwT4;4tr6BpYm_zG8e@&M##!U7 z3D!hwk~P^PpJXe=O109gbSuM}VokL&t!dVDYlbz`nq_5Kv#mMSTx*^+-&$ZTv=&*5 zttHk{Ynip&T4AlUR$19rj!P;nTvNl^=tgTkQwavQ2y3^Wj z-DTZv6k;cw>oMzb>!9_7 zb;x?sI&3{<9kHIap0SQv&sxW<wW73>qF}!>tpMp^@;VV^_lg#^@VlG`qKK!`r7)& zDzYwHSFCTXtJZhc_tp>AkJeAtHS1^Vy7h~7!}`_w&HCN?!}`~qXH@-9FHX6|4h=;Hr2kqXbGK6s1raWe|q4D2MW> zfQkr5B~(TPs-P;Wp*m`yCTgKJ>Yy&_A&B~DfQD#<#%O}3Xolu!ftF~6)@Xyah(r{k z5rbI7p&jCpfJC%M2XsUybVe6+MK^Ru5_+H~dZ9P^pfCENKL%hR24OIUU?_%RI7VP3 zMqxC@U@XRAJSJcwCSfve=bwxeq#_OJ$iNg#MJA?UI%Z%dW+4l+F$Z%o5A(4A3$X}` zu>?!849l?sE3pdM$iZr?!CDyWkc;)m!v<``CTzwQYz>@Jeqi6VawSS#_+PopWru{V zDs!sT>F`T4L(T^FM^+qDvhA9*wKu}T2KH>46CSfRG^cb*Y*a>MLc5rlxS05q#F)60 zxQxVhw+D#{>Cv$%h35}!4K!&M7abL!G^%Io=*Z}p*0-B$CwKJD%9=7GJ(x6gZr057 z;Ec?ag|inITtCsc`tA-J1LY&46M~WP?V}T^+gnA)jzlIF)=$|V5-jK(dNHh^`H>Of zH8Zm221jSkO3PX_uT^kha%wPnR$6dC=Bx#a3-=zm6%rYUi!MCVtW2P0LDx!+>J`k+ zX%$+yr+!4Bbe$_Z4;JNZE;@R+DEIi4Er)_C+I8S+?v~5jPZZ^zC_FQ4Q=m=Ns5ovX cL`Ns5r6wfACa0vP#b=}?pFVXnKaf=7|C#~nh1Jq(Wwo~2SZ%F#R(q?1MW2pVC#$p7#p-Hx zv$|V7te#dctGCt1>TC70`db66fz}{vuri?!9-W^K22SUas< z)^2N$wbzQa_F4O_AFZFPpRHf41J*(7kagHPVjZ=PS;wst)=BG>b=o>(owd$c=dBCY zMeCAv*}7s~wSKjJv#wd!tsB-&>y~xfx?|n7ez*Rx?pgP(2iBj~U)DqGk@eVmVm-B< zSfQqPu%BX@cR7EvZM-9|OE!0LG)I~kiM*}oOBQ!=6 zG(|HsM+>w>E3`%%v_(6#M+bcB-w~bA8C}p7-OwF9&=bAT8-36h{m>r+Fc5<<7(*}= z!!R5pFcPCM8e=dP<1ilKn1G3xgvl_bU@E2|0@E=AGcgOZ5s4_w!CcJ4e0+{C@Fl*& z*Z2ktun>!|7~kSMEWuJN!*Z;^_xJ%Tu?nlP25Yen>#+eFu?d^81zWKV+pz;Xu?xGg z2YV5Xeb|p5@e_W=FF1gMIE2GEf}=Qw<2ZqnIEB+VgR?k?^SFSExP;5Nf~)uyzu_9L z;|6Zx7H;DX?&5d+fqS@*2lx|z;UOO3F`nQlp5ZxO;3Zz+HQwMY{>DFehxhn^fAJqa z1|k&1{s=-0#6&E_MjXUNJOm>I@sR)tkqC*A1WAz$$&msnkqW7i25FHF>5%~$kqMcR z1zC{|*^vV|kqfzz2YHbX`B4A`Q3# + @@ -27,6 +27,14 @@

眈眈探求 | TITLE URL + + b41f08633537b935b5f96086398e24ba + CVE-2023-5217 + 2023-09-28 07:29:29 + CVE-2023-5217:Google Chrome libvpx堆缓冲区溢出漏洞通告 + 详情 + + c17b5efb9dae532717913a9f7d1e6319 CVE-2023-42820 @@ -259,14 +267,6 @@

眈眈探求 | 详情 - - 498da2f033a7ca9cfdcc92fa1674141a - - 2023-07-24 10:39:33 - Atlassian 多个代码执行漏洞通告 - 详情 - - @@ -286,7 +286,7 @@

眈眈探求 | + 2023-09-26 00:15:00 A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL. 详情 @@ -294,7 +294,7 @@

眈眈探求 | + 2023-09-26 00:15:00 Two potential buffer overflow vulnerabilities at the following locations in the Zephyr eS-WiFi driver source code. 详情 @@ -302,7 +302,7 @@

眈眈探求 | + 2023-09-26 00:00:00 Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. 详情 @@ -310,7 +310,7 @@

眈眈探求 | + 2023-09-26 00:00:00 During process shutdown, it was possible that an ImageBitmap was created that would later be used after being freed from a different codepath, leading to a potentially exploitable crash. 详情 @@ -318,7 +318,7 @@

眈眈探求 | + 2023-09-26 00:00:00 If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. This bug only affects Firefox on Windows when run in non-standard configurations (such as using runas). Other operating systems are unaffected. 详情 @@ -326,7 +326,7 @@

眈眈探求 | + 2023-09-26 00:00:00 In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (network.http.altsvc.oe) is enabled. 详情 @@ -334,7 +334,7 @@

眈眈探求 | + 2023-09-26 00:00:00 A hashtable in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash. 详情 @@ -342,7 +342,7 @@

眈眈探求 | + 2023-09-26 00:00:00 During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. 详情 @@ -350,7 +350,7 @@

眈眈探求 | + 2023-09-26 00:00:00 In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked. 详情 @@ -358,7 +358,7 @@

眈眈探求 | + 2023-09-26 00:00:00 A compromised content process could have provided malicious data in a PathRecording resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. 详情 @@ -1734,7 +1734,7 @@

眈眈探求 | + 2023-09-26 20:04:17 ISL ARP-GUARD Vulnerability 详情 @@ -1742,7 +1742,7 @@

眈眈探求 | + 2023-09-26 20:04:17 LINUX LINUX_KERNEL Vulnerability 详情