CVE PUSH ⚠️
429 subscribers
2 videos
752 links
Github CVE push
Github CVE 推送
Cve/Rce/Exploit/Redteam/漏洞利用/红队

Channel push 24/7 (real time)
频道全天候推送(实时)

This channel will be used to push CVEs.
If you need CVE and red team resource push please join @CVEhub
该频道将用于推送 CVE。需要CVE和红队资源推送请加入 @CVEhub
Download Telegram
** Behinder ** 🔧Tool update
Tools name:Behinder
Tools url:https://github.com/rebeyond/Behinder/releases/tag/Behinder_v4.0.3
Update log:
### 2022.7.31 v4.0.3 更新日志

1.修复了自定义传输协议修改之后需要重启才能生效的问题;
2.修复了因loadAgent参数过长导致Agent型内存马注入失败的问题;
3.修复了在某些场景下会提示无法找到JDK环境的问题;
4.Agent内存马注入类名随机化;
5.优化了在某些自定义web容器下的兼容性;
6.其他一些优化;
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-24853
Github: https://github.com/secure-77/CVE-2022-24853
Describe:
Metabase is an open source business intelligence and analytics application. Metabase has a proxy to load arbitrary URLs for JSON maps as part of our GeoJSON support. While we do validation to not return contents of arbitrary URLs, there is a case where a particularly crafted request could result in file access on windows, which allows enabling an `NTLM relay attack`, potentially allowing an attacker to receive the system password hash. If you use Windows and are on this version of Metabase, please upgrade immediately. The following patches (or greater versions) are available: 0.42.4 and 1.42.4, 0.41.7 and 1.41.7, 0.40.8 and 1.40.8.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-27925
Github: https://github.com/vnhacker1337/CVE-2022-27925-PoC
Describe:
Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.
👍1
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-27255
Github: https://github.com/infobyte/cve-2022-27255
Describe:
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-34169
Github: https://github.com/bor8/CVE-2022-34169
Describe:
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
🤩2
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-21789
Github: https://github.com/docfate111/CVE-2022-21789
Describe:
In audio ipi, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06478101; Issue ID: ALPS06478101.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-20224
Github: https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20224
Describe:
In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure in the Bluetooth stack with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220732646
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-20229
Github: https://github.com/ShaikUsaf/system_bt_AOSP10_r33_CVE-2022-20229
Describe:
In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184