<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>nginx | 今天abc看了啥🤔</title><description>现在我也不知道这频道发了啥了，各位慢慢吃瓜，将就着看联系我请去 @abc1763613206友链儿@cyberElaina@rvalue_daily@billchenla</description><link>https://channel.0w0.best</link><item><title>🔴 NGINX </title><link>https://channel.0w0.best/posts/7308</link><guid isPermaLink="true">https://channel.0w0.best/posts/7308</guid><pubDate>Thu, 14 May 2026 03:08:56 GMT</pubDate><content:encoded>&lt;i&gt;&lt;b&gt;🔴&lt;/b&gt;&lt;/i&gt; &lt;mark&gt;NGINX&lt;/mark&gt; http_rewrite 模块漏洞；或会导致堆溢出甚至远程代码执行。&lt;br /&gt;&lt;br /&gt;- 漏洞的起因是 &lt;mark&gt;nginx&lt;/mark&gt; 尝试将 escape 过的 URL 写入未 escape 长度的内存。&lt;br /&gt;- 在 ASLR 未被开启的情况下，可以导致远程代码执行。&lt;br /&gt;- 修复已于 1.30.1/1.31.0 发布。&lt;br /&gt;&lt;br /&gt;1. &lt;a href=&quot;https://depthfirst.com/nginx-rift&quot; target=&quot;_blank&quot;&gt;https://depthfirst.com/nginx-rift&lt;/a&gt;&lt;br /&gt;2. &lt;a href=&quot;https://my.f5.com/manage/s/article/K000161019&quot; target=&quot;_blank&quot;&gt;my.f5.com/~&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;CVE: CVE-2026-42945&lt;br /&gt;CVSS: 9.2 (F5 Networks)&lt;br /&gt;Affect: [0.6.27, 1.30.0]&lt;br /&gt;Fixed-At: 1.30.1, 1.31.0&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23nginx&quot;&gt;#nginx&lt;/a&gt;&lt;a href=&quot;https://depthfirst.com/nginx-rift&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Depthfirst&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;NGINX Rift&quot; src=&quot;/static/https://cdn4.telesco.pe/file/bMyDP48Z0UepnZgDEfLQ8k6j8EQ62WG5V9OA3Xaqvzgbn5MDExQHb7uG8OEfOqalZUFW77UUkDqKFRi7FLndJBqMeYFQvz7qrUhcNFGKyc2piBeqHfdmMstwJLVJIjyo7ERL-nMqFxYKB2bXpcJvgjOIUOk1ur9MsYZNvwQyuGeHp_1yen3BU9OeKXjhU5Qmw1zABHBXhu35zW9vc5tMDfz_4QyHugtMvTpKUtRfYFYn3XrSNoQWYIyC0m5eI_C5wHPiFymYxbONmFHPevtohXH6sm8FJeG7gi3FQRPw5JTvq2AnT7lkhtCzqF20Gf62V-TaZqqLO4R7wcYU_PQ0ag.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;&lt;mark&gt;NGINX&lt;/mark&gt; Rift&lt;/div&gt;
  &lt;div&gt;An 18 year old memory corruption flaw in &lt;mark&gt;NGINX&lt;/mark&gt; Plus and &lt;mark&gt;NGINX&lt;/mark&gt; Open Source lets an unauthenticated attacker crash worker processes or execute remote code with crafted HTTP requests.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>