👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45265
Github: https://github.com/maikroservice/CVE-2022-45265
Describe:
**
Mumber: CVE-2022-45265
Github: https://github.com/maikroservice/CVE-2022-45265
Describe:
**
GitHub
GitHub - maikroservice/CVE-2022-45265
Contribute to maikroservice/CVE-2022-45265 development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39253
Github: https://github.com/ssst0n3/docker-cve-2022-39253-poc
Describe:
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
Mumber: CVE-2022-39253
Github: https://github.com/ssst0n3/docker-cve-2022-39253-poc
Describe:
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
GitHub
GitHub - ssst0n3/docker-cve-2022-39253-poc
Contribute to ssst0n3/docker-cve-2022-39253-poc development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45025
Github: https://github.com/yuriisanin/CVE-2022-45025
Describe:
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
Mumber: CVE-2022-45025
Github: https://github.com/yuriisanin/CVE-2022-45025
Describe:
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
GitHub
GitHub - yuriisanin/CVE-2022-45025: [PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom)
[PoC] Command injection via PDF import in Markdown Preview Enhanced (VSCode, Atom) - yuriisanin/CVE-2022-45025
** xray ** 🔧Tool update
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/4f47fb13a2454590309eaf2279ba2c9a3b1150fe
commitUpdate log:
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from 'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)
Signed-off-by: DroidKali <[email protected]>
Signed-off-by: DroidKali <[email protected]>
Co-authored-by: DroidKali <[email protected]>
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/4f47fb13a2454590309eaf2279ba2c9a3b1150fe
commitUpdate log:
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from 'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)
Signed-off-by: DroidKali <[email protected]>
Signed-off-by: DroidKali <[email protected]>
Co-authored-by: DroidKali <[email protected]>
GitHub
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from … · chaitin/xray@4f47fb1
…'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)
Signed-off-by: DroidKali <[email protected]>
Signed-off-by: DroidKal...
Signed-off-by: DroidKali <[email protected]>
Signed-off-by: DroidKal...
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-31403
Github: https://github.com/IbrahimEkimIsik/CVE-2022-31403
Describe:
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
Mumber: CVE-2022-31403
Github: https://github.com/IbrahimEkimIsik/CVE-2022-31403
Describe:
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
GitHub
GitHub - IbrahimEkimIsik/CVE-2022-31403
Contribute to IbrahimEkimIsik/CVE-2022-31403 development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39066
Github: https://github.com/v0lp3/CVE-2022-39066
Describe:
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
Mumber: CVE-2022-39066
Github: https://github.com/v0lp3/CVE-2022-39066
Describe:
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
GitHub
GitHub - v0lp3/CVE-2022-39066: Proof of concept of the SQL injection vulnerability affecting the ZTE MF286R router.
Proof of concept of the SQL injection vulnerability affecting the ZTE MF286R router. - v0lp3/CVE-2022-39066
** fscan ** 🔧Tool update
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/abd2ba094762e0edeb883554e6fe19e4a50df267
commitUpdate log:
update readme
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/abd2ba094762e0edeb883554e6fe19e4a50df267
commitUpdate log:
update readme
GitHub
update readme · shadow1ng/fscan@abd2ba0
一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。. Contribute to shadow1ng/fscan development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
GitHub
GitHub - redrays-io/CVE-2022-41272: Improper access control in SAP NetWeaver Process Integration
Improper access control in SAP NetWeaver Process Integration - GitHub - redrays-io/CVE-2022-41272: Improper access control in SAP NetWeaver Process Integration
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45771
Github: https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
Describe:
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
Mumber: CVE-2022-45771
Github: https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
Describe:
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
GitHub
GitHub - p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE: Pwndoc local file inclusion to remote code execution of Node.js code on the…
Pwndoc local file inclusion to remote code execution of Node.js code on the server - p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
** fscan ** 🔧Tool update
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/79d44e00b3c906327ec15964d07ad9f8ba6b4089
commitUpdate log:
Merge pull request #254 from ruishawn/dev5
Doc: add English Readme
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/79d44e00b3c906327ec15964d07ad9f8ba6b4089
commitUpdate log:
Merge pull request #254 from ruishawn/dev5
Doc: add English Readme
GitHub
Merge pull request #254 from ruishawn/dev5 · shadow1ng/fscan@79d44e0
Doc: add English Readme
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-46381
Github: https://github.com/amitlttwo/CVE-2022-46381
Describe:
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
Mumber: CVE-2022-46381
Github: https://github.com/amitlttwo/CVE-2022-46381
Describe:
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
GitHub
GitHub - amitlttwo/CVE-2022-46381
Contribute to amitlttwo/CVE-2022-46381 development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45451
Github: https://github.com/alfarom256/CVE-2022-45451
Describe:
**
Mumber: CVE-2022-45451
Github: https://github.com/alfarom256/CVE-2022-45451
Describe:
**
GitHub
GitHub - alfarom256/CVE-2022-45451: PoC for Acronis Arbitrary File Read - CVE-2022-45451
PoC for Acronis Arbitrary File Read - CVE-2022-45451 - alfarom256/CVE-2022-45451
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-28672
Github: https://github.com/hacksysteam/CVE-2022-28672
Describe:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16640.
Mumber: CVE-2022-28672
Github: https://github.com/hacksysteam/CVE-2022-28672
Describe:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16640.
GitHub
GitHub - hacksysteam/CVE-2022-28672: Foxit PDF Reader Remote Code Execution Exploit
Foxit PDF Reader Remote Code Execution Exploit. Contribute to hacksysteam/CVE-2022-28672 development by creating an account on GitHub.
** nps ** 🔧Tool update
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
GitHub
Merge pull request #866 from freeoa/master · ehang-io/nps@ab648d6
add build to apple silicon(M1)
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-44215
Github: https://github.com/JBalanza/CVE-2022-44215
Describe:
**
Mumber: CVE-2022-44215
Github: https://github.com/JBalanza/CVE-2022-44215
Describe:
**
GitHub
GitHub - JBalanza/CVE-2022-44215: Public disclosure of TitanFTP 19.X Open Redirection vulnerability
Public disclosure of TitanFTP 19.X Open Redirection vulnerability - JBalanza/CVE-2022-44215
** nps ** 🔧Tool update
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
GitHub
Merge pull request #866 from freeoa/master · ehang-io/nps@ab648d6
add build to apple silicon(M1)
CVE PUSH ⚠️ pinned «⚠️ This channel is deprecated, please join @CVEhub 本频道已弃用,请加入 @CVEhub»