👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-42045
Github: https://github.com/ReCryptLLC/CVE-2022-42045
Describe:
**
Mumber: CVE-2022-42045
Github: https://github.com/ReCryptLLC/CVE-2022-42045
Describe:
**
GitHub
GitHub - ReCryptLLC/CVE-2022-42045
Contribute to ReCryptLLC/CVE-2022-42045 development by creating an account on GitHub.
** xray ** 🔧Tool update
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/a9ddda5e28119f72e391b8a0c8fb753d6c53c0d5
commitUpdate log:
Update jellyfin-cve-2021-29490.yml (#1632)
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/a9ddda5e28119f72e391b8a0c8fb753d6c53c0d5
commitUpdate log:
Update jellyfin-cve-2021-29490.yml (#1632)
GitHub
Update jellyfin-cve-2021-29490.yml (#1632) · chaitin/xray@a9ddda5
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档. Contribute to chaitin/xray development by creating an account on GitHub.
👍1
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-36433
Github: https://github.com/afine-com/CVE-2022-36433
Describe:
**
Mumber: CVE-2022-36433
Github: https://github.com/afine-com/CVE-2022-36433
Describe:
**
GitHub
GitHub - afine-com/CVE-2022-36433: Cross-site Scripting (XSS) in blog-post creation functionality in Amasty Blog Pro for Magento…
Cross-site Scripting (XSS) in blog-post creation functionality in Amasty Blog Pro for Magento 2 - afine-com/CVE-2022-36433
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-36432
Github: https://github.com/afine-com/CVE-2022-36432
Describe:
**
Mumber: CVE-2022-36432
Github: https://github.com/afine-com/CVE-2022-36432
Describe:
**
GitHub
GitHub - afine-com/CVE-2022-36432: Cross-site Scripting (XSS) in Preview functionality in Amasty Blog Pro for Magento 2
Cross-site Scripting (XSS) in Preview functionality in Amasty Blog Pro for Magento 2 - afine-com/CVE-2022-36432
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-35500
Github: https://github.com/afine-com/CVE-2022-35500
Describe:
**
Mumber: CVE-2022-35500
Github: https://github.com/afine-com/CVE-2022-35500
Describe:
**
GitHub
GitHub - afine-com/CVE-2022-35500: Stored Cross-site Scripting (XSS) in leave comment functionality in Amasty Blog Pro for Magento…
Stored Cross-site Scripting (XSS) in leave comment functionality in Amasty Blog Pro for Magento 2 - GitHub - afine-com/CVE-2022-35500: Stored Cross-site Scripting (XSS) in leave comment functionali...
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-35501
Github: https://github.com/afine-com/CVE-2022-35501
Describe:
**
Mumber: CVE-2022-35501
Github: https://github.com/afine-com/CVE-2022-35501
Describe:
**
GitHub
GitHub - afine-com/CVE-2022-35501: Stored Cross-site Scripting (XSS) in blog-post creation functionality in Amasty Blog Pro for…
Stored Cross-site Scripting (XSS) in blog-post creation functionality in Amasty Blog Pro for Magento 2 - GitHub - afine-com/CVE-2022-35501: Stored Cross-site Scripting (XSS) in blog-post creation f...
👾KEYWORD SERVICE 🏷#cnvd
Name: CNVD-2022-55416-poc-exp
Github: https://github.com/SCAMagic/CNVD-2022-55416-poc-exp
Name: CNVD-2022-55416-poc-exp
Github: https://github.com/SCAMagic/CNVD-2022-55416-poc-exp
GitHub
GitHub - SCAMagic/CNVD-2022-55416-poc-exp
Contribute to SCAMagic/CNVD-2022-55416-poc-exp development by creating an account on GitHub.
👍1
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-1679
Github: https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679
Describe:
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Mumber: CVE-2022-1679
Github: https://github.com/EkamSinghWalia/-Detection-and-Mitigation-for-CVE-2022-1679
Describe:
A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
** mimikatz ** 🔧Tool update
Tools name:mimikatz
Tools url:https://github.com/gentilkiwi/mimikatz/commit/c78b1cf37c517ae9d0e872447bb103da9fa6034a
commitUpdate log:
Revert to Visual Studio 2013 (due to an error in Microsoft headers, can't build in Win32)
Tools name:mimikatz
Tools url:https://github.com/gentilkiwi/mimikatz/commit/c78b1cf37c517ae9d0e872447bb103da9fa6034a
commitUpdate log:
Revert to Visual Studio 2013 (due to an error in Microsoft headers, can't build in Win32)
GitHub
Revert to Visual Studio 2013 (due to an error in Microsoft headers, c… · gentilkiwi/mimikatz@c78b1cf
…an't build in Win32)
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-32938
Github: https://github.com/iCMDgithub/CVE-2022-32938
Describe:
**
Mumber: CVE-2022-32938
Github: https://github.com/iCMDgithub/CVE-2022-32938
Describe:
**
** xray ** 🔧Tool update
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/a9ddda5e28119f72e391b8a0c8fb753d6c53c0d5
commitUpdate log:
Update jellyfin-cve-2021-29490.yml (#1632)
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/a9ddda5e28119f72e391b8a0c8fb753d6c53c0d5
commitUpdate log:
Update jellyfin-cve-2021-29490.yml (#1632)
GitHub
Update jellyfin-cve-2021-29490.yml (#1632) · chaitin/xray@a9ddda5
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档. Contribute to chaitin/xray development by creating an account on GitHub.
👾KEYWORD SERVICE 🏷#cnvd
Name: cnvd_general_assets
Github: https://github.com/zhizhuoshuma/cnvd_general_assets
Name: cnvd_general_assets
Github: https://github.com/zhizhuoshuma/cnvd_general_assets
GitHub
GitHub - expzhizhuo/cnvd_general_assets: 配合爱企查和fofa实现注册资本大于5000w公司的公网通用资产查询搜索,方便证书挖掘
配合爱企查和fofa实现注册资本大于5000w公司的公网通用资产查询搜索,方便证书挖掘. Contribute to expzhizhuo/cnvd_general_assets development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-43959
Github: https://github.com/secware-ru/CVE-2022-43959
Describe:
**
Mumber: CVE-2022-43959
Github: https://github.com/secware-ru/CVE-2022-43959
Describe:
**
GitHub
GitHub - secware-ru/CVE-2022-43959: Bitrix Vulnerability CVE-2022-43959
Bitrix Vulnerability CVE-2022-43959. Contribute to secware-ru/CVE-2022-43959 development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-40687
Github: https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner
Describe:
**
Mumber: CVE-2022-40687
Github: https://github.com/williamkhepri/CVE-2022-40687-metasploit-scanner
Describe:
**
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-21907
Github: https://github.com/Malwareman007/CVE-2022-21907
Describe:
HTTP Protocol Stack Remote Code Execution Vulnerability.
Mumber: CVE-2022-21907
Github: https://github.com/Malwareman007/CVE-2022-21907
Describe:
HTTP Protocol Stack Remote Code Execution Vulnerability.
GitHub
GitHub - Malwareman007/CVE-2022-21907: POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.
POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. - Malwareman007/CVE-2022-21907
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-0739
Github: https://github.com/destr4ct/CVE-2022-0739
Describe:
The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user supplied POST data before it is used in a dynamically constructed SQL query via the bookingpress_front_get_category_services AJAX action (available to unauthenticated users), leading to an unauthenticated SQL Injection
Mumber: CVE-2022-0739
Github: https://github.com/destr4ct/CVE-2022-0739
Describe:
The BookingPress WordPress plugin before 1.0.11 fails to properly sanitize user supplied POST data before it is used in a dynamically constructed SQL query via the bookingpress_front_get_category_services AJAX action (available to unauthenticated users), leading to an unauthenticated SQL Injection
GitHub
GitHub - destr4ct/CVE-2022-0739: Proof-of-Concept exploit (SQLI BookingPress before 1.0.11)
Proof-of-Concept exploit (SQLI BookingPress before 1.0.11) - destr4ct/CVE-2022-0739
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-30910
Github: https://github.com/arozx/CVE-2022-30910
Describe:
H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the GO parameter at /goform/aspForm.
Mumber: CVE-2022-30910
Github: https://github.com/arozx/CVE-2022-30910
Describe:
H3C Magic R100 R100V100R005 was discovered to contain a stack overflow vulnerability via the GO parameter at /goform/aspForm.
GitHub
GitHub - arozx/CVE-2022-30190: A very simple MSDT "Follina" exploit **patched**
A very simple MSDT "Follina" exploit **patched**. Contribute to arozx/CVE-2022-30190 development by creating an account on GitHub.
** xray ** 🔧Tool update
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/4f47fb13a2454590309eaf2279ba2c9a3b1150fe
commitUpdate log:
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from 'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)
Signed-off-by: DroidKali <DroidKali@users.noreply.github.com>
Signed-off-by: DroidKali <DroidKali@users.noreply.github.com>
Co-authored-by: DroidKali <DroidKali@users.noreply.github.com>
Tools name:xray
Tools url:https://github.com/chaitin/xray/commit/4f47fb13a2454590309eaf2279ba2c9a3b1150fe
commitUpdate log:
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from 'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)
Signed-off-by: DroidKali <DroidKali@users.noreply.github.com>
Signed-off-by: DroidKali <DroidKali@users.noreply.github.com>
Co-authored-by: DroidKali <DroidKali@users.noreply.github.com>
GitHub
Fix Python3 Flask bug: ImportError: cannot import name 'escape' from … · chaitin/xray@4f47fb1
…'jinja2' (/usr/local/lib/python3.9/dist-packages/jinja2/__init__.py) (#1680)
Signed-off-by: DroidKali <DroidKali@users.noreply.github.com>
Signed-off-by: DroidKal...
Signed-off-by: DroidKali <DroidKali@users.noreply.github.com>
Signed-off-by: DroidKal...