Skip to content

トピトピニュース

Header Image
Archive

Month: May 2022

251 Posts

Featured

Posted byByakuya Biz Books
シンガポール発のコーヒーチェーン「フラッシュコーヒー」が2年で250店舗に拡大した理由
Posted byGoogle Japan Blog
個人情報を考える週間: パスワードとオンライン アカウントを安全に保つためのヒント
Posted byねっと特報
ウクライナ戦争に見るワイパー攻撃の実態とデジタル情報操作
Posted byFunglr Games(日本語)
「エースコンバット」と「トップガン マーヴェリック」が夢のコラボ!マーヴェリックスキンの「F-14A Tomcat」や「F/A-18E Super Hornet」が登場!

[org.apache.geode:geode-core] Apache Geode unsafe deserialization of application objects

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/08/2022

In Apache Geode before v1.4.0, the Geode server stores application objects in serialized form. Certain cluster operations and API invocations cause these objects to be deserialized. A user with DATA:WRITE access to the cluster may be able to cause remo…

[org.apache.ode:ode] Apache ODE Path Traversal vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/09/2022

The ODE process deployment web service was sensible to deployment messages with forged names. Using a path for the name was allowing directory traversal, resulting in the potential writing of files under unwanted locations, the overwriting of existing …

[org.graylog2:graylog2-server] Cross-site Scripting in Graylog Server

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/05/2022

Graylog before v2.4.4 has an XSS security issue with unescaped text in notifications, related to toastr and util/UserNotification.js.
References

https://nvd.nist.gov/vuln/detail/CVE-2018-11650
https://github.com/Graylog2/graylog2-server/pull/4727
http…

[org.graylog2:graylog2-server] Cross-site Scripting in Graylog

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/05/2022

Graylog before v2.4.4 has an XSS security issue with unescaped text in dashboard names, related to components/dashboard/Dashboard.jsx, components/dashboard/EditDashboardModal.jsx, and pages/ShowDashboardPage.jsx.
References

https://nvd.nist.gov/vuln/d…

[org.apache.struts:struts2-core] Special top object can be used to access Struts’ internals

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

ValueStack defines special top object which represents root of execution context. It can be used to manipulate Struts’ internals or can be used to affect container’s settings. Applying better regex which includes pattern to exclude request parameters t…

[org.apache.struts:struts2-core] Possible DoS attack when using URLValidator

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/04/2022

If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.
References

https://nvd.nist.gov/vuln/…

[org.jvnet.hudson.plugins:groovy-postbuild] Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/23/2022

A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user’s brow…

[org.csanchez.jenkins.plugins:kubernetes] Exposure of Sensitive Information in Jenkins Kubernetes Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/04/2022

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.
References

https://nvd.nist.gov/vuln/deta…

[net.opentsdb:opentsdb] OpenTSDB Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/23/2022

An issue was discovered in OpenTSDB 2.3.0. There is XSS in parameter json to the /q URI.
References

https://nvd.nist.gov/vuln/detail/CVE-2018-12973
https://github.com/OpenTSDB/opentsdb/issues/1240
https://github.com/advisories/GHSA-r68m-wq3x-2hqw

[io.jenkins:configuration-as-code] Jenkins Configuration as Code Plugin vulnerable to Exposure of Sensitive Information

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/09/2022

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration. Ve…

Posts navigation

Previous Posts 1 … 12 13 14 15 16 … 26 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close