Telegram Web
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39253
Github: https://github.com/ssst0n3/docker-cve-2022-39253-poc
Describe:
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45025
Github: https://github.com/yuriisanin/CVE-2022-45025
Describe:
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
** xray ** 🔧Tool update
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/4f47fb13a2454590309eaf2279ba2c9a3b1150fe
commitUpdate log:
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from 'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)

Signed-off-by: DroidKali <[email protected]>

Signed-off-by: DroidKali <[email protected]>
Co-authored-by: DroidKali <[email protected]>
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-31403
Github: https://github.com/IbrahimEkimIsik/CVE-2022-31403
Describe:
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39066
Github: https://github.com/v0lp3/CVE-2022-39066
Describe:
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
** fscan ** 🔧Tool update
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/79d44e00b3c906327ec15964d07ad9f8ba6b4089
commitUpdate log:
Merge pull request #254 from ruishawn/dev5

Doc: add English Readme
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-46381
Github: https://github.com/amitlttwo/CVE-2022-46381
Describe:
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-28672
Github: https://github.com/hacksysteam/CVE-2022-28672
Describe:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16640.
** nps ** 🔧Tool update
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master

add build to apple silicon(M1)
** nps ** 🔧Tool update
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master

add build to apple silicon(M1)
CVE PUSH ⚠️ pinned Deleted message
⚠️
This channel is deprecated, please join @CVEhub

本频道已弃用,请加入
@CVEhub
CVE PUSH ⚠️ pinned «⚠️ This channel is deprecated, please join @CVEhub 本频道已弃用,请加入 @CVEhub»
2025/07/04 10:25:41
Back to Top
HTML Embed Code: