Skip to content

Commit

Permalink
Updated by Github Bot
Browse files Browse the repository at this point in the history
  • Loading branch information
Github-Bot committed Jun 13, 2024
1 parent 8fc7433 commit 79b2a32
Show file tree
Hide file tree
Showing 3 changed files with 21 additions and 11 deletions.
10 changes: 10 additions & 0 deletions cache/RedQueen.dat
Original file line number Diff line number Diff line change
Expand Up @@ -100,3 +100,13 @@ f2fb7c1aa73f8fde72b2216088b722a9
e8ea214826d3db0c15583dbcec7ed773
f5e9a0adc5283d6ddd58abcf334c4832
08546c569b91af3510c1f59381387884
4eb93a4d079b06edbaf60f9671dd8e8d
450b8697fc4434c35e858bb5d005cf15
765c7bc0d59d9fcb0d285cdce67171a3
37d7d6cd8d8ad94b98309bfc47599ddf
e7e575f156756f7f97325f6c24816c52
01f12205b7643a4e883b4c25c116d6be
87a6d8d75747a76675c0d9f354bb7892
807954c868802b0c5f2d37a12fb2e9ad
b8457168af4d949e7336edf049aad644
0aa1a78113b0abbb708a3143d561560e
Binary file modified data/cves.db
Binary file not shown.
22 changes: 11 additions & 11 deletions docs/index.html
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
<!-- RELEASE TIME : 2024-06-12 09:22:43 -->
<!-- RELEASE TIME : 2024-06-13 01:23:44 -->
<html lang="zh-cn">

<head>
Expand Down Expand Up @@ -286,79 +286,79 @@ <h2><a href="https://exp-blog.com" target="_blank">眈眈探求</a> | <a href="h
<tr>
<td>50962c6423c92d79bf3eb91d622eef4d</td>
<td>CVE-2024-5702</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5702">详情</a></td>
</tr>

<tr>
<td>15c7dd82cba467fcb1f0e9ab76220e7d</td>
<td>CVE-2024-5701</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>Memory safety bugs present in Firefox 126. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5701">详情</a></td>
</tr>

<tr>
<td>b474ad87d2a1c8b10f9a1328b81972cf</td>
<td>CVE-2024-5700</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5700">详情</a></td>
</tr>

<tr>
<td>08a289b0f9252f3445659e081a6bc76c</td>
<td>CVE-2024-5699</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>In violation of spec, cookie prefixes such as `__Secure` were being ignored if they were not correctly capitalized - by spec they should be checked with a case-insensitive comparison. This could have resulted in the browser not correctly honoring the behaviors specified by the prefix. This vulnerability affects Firefox < 127.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5699">详情</a></td>
</tr>

<tr>
<td>8096e402c0b5868a1de8a0c06a68cf49</td>
<td>CVE-2024-5698</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5698">详情</a></td>
</tr>

<tr>
<td>57d6749782d9051bff0310e5357b9c6e</td>
<td>CVE-2024-5697</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>A website was able to detect when a user took a screenshot of a page using the built-in Screenshot functionality in Firefox. This vulnerability affects Firefox < 127.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5697">详情</a></td>
</tr>

<tr>
<td>2c7dbb56713db3fd0fbf4cb514840637</td>
<td>CVE-2024-5696</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>By manipulating the text in an `&lt;input&gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5696">详情</a></td>
</tr>

<tr>
<td>88af31d92ceac08939afd9155664db84</td>
<td>CVE-2024-5695</td>
<td>2024-06-11 13:15:51 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:51</td>
<td>If an out-of-memory condition occurs at a specific point using allocations in the probabilistic heap checker, an assertion could have been triggered, and in rarer situations, memory corruption could have occurred. This vulnerability affects Firefox < 127.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5695">详情</a></td>
</tr>

<tr>
<td>954e493bb68a7c450adeafb91fc39bf0</td>
<td>CVE-2024-5694</td>
<td>2024-06-11 13:15:50 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:50</td>
<td>An attacker could have caused a use-after-free in the JavaScript engine to read memory in the JavaScript string section of the heap. This vulnerability affects Firefox < 127.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5694">详情</a></td>
</tr>

<tr>
<td>2baae96bfaca3dfcc04d0652cd7e3891</td>
<td>CVE-2024-5693</td>
<td>2024-06-11 13:15:50 <img src="imgs/new.gif" /></td>
<td>2024-06-11 13:15:50</td>
<td>Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12.</td>
<td><a target="_blank" href="https://www.tenable.com/cve/CVE-2024-5693">详情</a></td>
</tr>
Expand Down

0 comments on commit 79b2a32

Please sign in to comment.