CVE PUSH ⚠️
429 subscribers
2 videos
752 links
Github CVE push
Github CVE 推送
Cve/Rce/Exploit/Redteam/漏洞利用/红队

Channel push 24/7 (real time)
频道全天候推送(实时)

This channel will be used to push CVEs.
If you need CVE and red team resource push please join @CVEhub
该频道将用于推送 CVE。需要CVE和红队资源推送请加入 @CVEhub
Download Telegram
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-24086
Github: https://github.com/oK0mo/CVE-2022-24086-RCE-PoC
Describe:
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-31061
Github: https://github.com/Vu0r1/CVE-2022-31061
Describe:
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-22620
Github: https://github.com/springsec/CVE-2022-22620
Describe:
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-1857
Github: https://github.com/frostb1ten/CVE-2022-1857
Describe:
Insufficient policy enforcement in File System API in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to bypass file system restrictions via a crafted HTML page.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-31101
Github: https://github.com/karthikuj/CVE-2022-31101
Describe:
prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-29968
Github: https://github.com/jprx/CVE-2022-29968
Describe:
An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-33980
Github: https://github.com/HKirito/CVE-2022-33980
Describe:
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starting with version 2.4 and continuing through 2.7, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Configuration 2.8.0, which disables the problematic interpolators by default.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-1421
Github: https://github.com/nb1b3k/CVE-2022-1421
Describe:
The Discy WordPress theme before 5.2 lacks CSRF checks in some AJAX actions, allowing an attacker to make a logged in admin change arbitrary 's settings including payment methods via a CSRF attack
** Behinder ** 🔧Tool update
Tools name:Behinder
Tools url:https://github.com/rebeyond/Behinder/releases/tag/Behinder_v4.0.3
Update log:
### 2022.7.31 v4.0.3 更新日志

1.修复了自定义传输协议修改之后需要重启才能生效的问题;
2.修复了因loadAgent参数过长导致Agent型内存马注入失败的问题;
3.修复了在某些场景下会提示无法找到JDK环境的问题;
4.Agent内存马注入类名随机化;
5.优化了在某些自定义web容器下的兼容性;
6.其他一些优化;
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-24853
Github: https://github.com/secure-77/CVE-2022-24853
Describe:
Metabase is an open source business intelligence and analytics application. Metabase has a proxy to load arbitrary URLs for JSON maps as part of our GeoJSON support. While we do validation to not return contents of arbitrary URLs, there is a case where a particularly crafted request could result in file access on windows, which allows enabling an `NTLM relay attack`, potentially allowing an attacker to receive the system password hash. If you use Windows and are on this version of Metabase, please upgrade immediately. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8.