** fscan ** 🔧Tool update
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/abd2ba094762e0edeb883554e6fe19e4a50df267
commitUpdate log:
update readme
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/abd2ba094762e0edeb883554e6fe19e4a50df267
commitUpdate log:
update readme
GitHub
update readme · shadow1ng/fscan@abd2ba0
一款内网综合扫描工具,方便一键自动化、全方位漏扫扫描。. Contribute to shadow1ng/fscan development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
GitHub
GitHub - redrays-io/CVE-2022-41272: Improper access control in SAP NetWeaver Process Integration
Improper access control in SAP NetWeaver Process Integration - GitHub - redrays-io/CVE-2022-41272: Improper access control in SAP NetWeaver Process Integration
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45771
Github: https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
Describe:
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
Mumber: CVE-2022-45771
Github: https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
Describe:
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
GitHub
GitHub - p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE: Pwndoc local file inclusion to remote code execution of Node.js code on the…
Pwndoc local file inclusion to remote code execution of Node.js code on the server - p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
** fscan ** 🔧Tool update
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/79d44e00b3c906327ec15964d07ad9f8ba6b4089
commitUpdate log:
Merge pull request #254 from ruishawn/dev5
Doc: add English Readme
Tools name:fscan
Tools url:https://github.com/shadow1ng/fscan/commit/79d44e00b3c906327ec15964d07ad9f8ba6b4089
commitUpdate log:
Merge pull request #254 from ruishawn/dev5
Doc: add English Readme
GitHub
Merge pull request #254 from ruishawn/dev5 · shadow1ng/fscan@79d44e0
Doc: add English Readme
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-46381
Github: https://github.com/amitlttwo/CVE-2022-46381
Describe:
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
Mumber: CVE-2022-46381
Github: https://github.com/amitlttwo/CVE-2022-46381
Describe:
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
GitHub
GitHub - amitlttwo/CVE-2022-46381
Contribute to amitlttwo/CVE-2022-46381 development by creating an account on GitHub.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45451
Github: https://github.com/alfarom256/CVE-2022-45451
Describe:
**
Mumber: CVE-2022-45451
Github: https://github.com/alfarom256/CVE-2022-45451
Describe:
**
GitHub
GitHub - alfarom256/CVE-2022-45451: PoC for Acronis Arbitrary File Read - CVE-2022-45451
PoC for Acronis Arbitrary File Read - CVE-2022-45451 - alfarom256/CVE-2022-45451
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-28672
Github: https://github.com/hacksysteam/CVE-2022-28672
Describe:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16640.
Mumber: CVE-2022-28672
Github: https://github.com/hacksysteam/CVE-2022-28672
Describe:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16640.
GitHub
GitHub - hacksysteam/CVE-2022-28672: Foxit PDF Reader Remote Code Execution Exploit
Foxit PDF Reader Remote Code Execution Exploit. Contribute to hacksysteam/CVE-2022-28672 development by creating an account on GitHub.
** nps ** 🔧Tool update
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
GitHub
Merge pull request #866 from freeoa/master · ehang-io/nps@ab648d6
add build to apple silicon(M1)
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-44215
Github: https://github.com/JBalanza/CVE-2022-44215
Describe:
**
Mumber: CVE-2022-44215
Github: https://github.com/JBalanza/CVE-2022-44215
Describe:
**
GitHub
GitHub - JBalanza/CVE-2022-44215: Public disclosure of TitanFTP 19.X Open Redirection vulnerability
Public disclosure of TitanFTP 19.X Open Redirection vulnerability - JBalanza/CVE-2022-44215
** nps ** 🔧Tool update
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
Tools name:nps
Tools url:https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc
commitUpdate log:
Merge pull request #866 from freeoa/master
add build to apple silicon(M1)
GitHub
Merge pull request #866 from freeoa/master · ehang-io/nps@ab648d6
add build to apple silicon(M1)
🥰1
CVE PUSH ⚠️ pinned «⚠️ This channel is deprecated, please join @CVEhub 本频道已弃用,请加入 @CVEhub»