Github CVE push
Github CVE 推送
Cve/Rce/Exploit/Redteam/漏洞利用/红队
Channel push 24/7 (real time)
频道全天候推送(实时)
This channel will be used to push CVEs.
If you need CVE and red team resource push please join @CVEhub
该频道将用于推送 CVE。需要CVE和红队资源推送请加入 @CVEhub
@cvepush offers specialized information about time and github for subscribers interested in Cybersecurity
排名
全球排名
#13405
-1
语言排名
#66无变化
类别排名
#50无变化
订阅者增长 (过去 28 天)
总计: 449
24 小时增长: +1 0%
Ad
Loading posts...
评分
需要登录
Loading reviews...
Ad
CVE PUSH ⚠️
Github CVE push
Github CVE 推送
Cve/Rce/Exploit/Redteam/漏洞利用/红队
Channel push 24/7 (real time)
频道全天候推送(实时)
This channel will be used to push CVEs.
If you need CVE and red team resource push please join @CVEhub
该频道将用于推送 CVE。需要CVE和红队资源推送请加入 @CVEhub
@cvepush offers specialized information about time and github for subscribers interested in Cybersecurity
排名
全球排名
#13405
-1
语言排名
#66无变化
类别排名
#50无变化
订阅者增长 (过去 28 天)
总计: 449
24 小时增长: +1 0%
Ad
Loading posts...
评分
需要登录
Loading reviews...
Loading recommended channels...
Loading recommended channels...
最新帖子
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
357
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
390
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45771
Github: https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
Describe:
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-31403
Github: https://github.com/IbrahimEkimIsik/CVE-2022-31403
Describe:
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
393
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39066
Github: https://github.com/v0lp3/CVE-2022-39066
Describe:
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
350
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45025
Github: https://github.com/yuriisanin/CVE-2022-45025
Describe:
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45265
Github: https://github.com/maikroservice/CVE-2022-45265
Describe:
**
418
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39253
Github: https://github.com/ssst0n3/docker-cve-2022-39253-poc
Describe:
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
281
Showing 10 of 10 posts
No more posts
最新帖子
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-3786
Github: https://github.com/plharraud/cve-2022-3786
Describe:
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.
357
0
0
0
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-41272
Github: https://github.com/redrays-io/CVE-2022-41272
Describe:
An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) - version 7.50 and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access to user data, make limited modifications to user data, and degrade the performance of the system, leading to a high impact on confidentiality and a limited impact on the availability and integrity of the application.
390
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45771
Github: https://github.com/p0dalirius/CVE-2022-45771-Pwndoc-LFI-to-RCE
Describe:
An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-31403
Github: https://github.com/IbrahimEkimIsik/CVE-2022-31403
Describe:
ITOP v3.0.1 was discovered to contain a cross-site scripting (XSS) vulnerability via /itop/pages/ajax.render.php.
393
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39066
Github: https://github.com/v0lp3/CVE-2022-39066
Describe:
There is a SQL injection vulnerability in ZTE MF286R. Due to insufficient validation of the input parameters of the phonebook interface, an authenticated attacker could use the vulnerability to execute arbitrary SQL injection.
350
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45025
Github: https://github.com/yuriisanin/CVE-2022-45025
Describe:
Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function.
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-45265
Github: https://github.com/maikroservice/CVE-2022-45265
Describe:
**
418
0
0
CVE PUSH ⚠️
2026年3月8日 10:51
👾CVE SERVICE 🏷#CVE
Mumber: CVE-2022-39253
Github: https://github.com/ssst0n3/docker-cve-2022-39253-poc
Describe:
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.