Skip to content

トピトピニュース

Header Image
Archive

Month: May 2022

251 Posts

Featured

Posted byByakuya Biz Books
シンガポール発のコーヒーチェーン「フラッシュコーヒー」が2年で250店舗に拡大した理由
Posted byGoogle Japan Blog
個人情報を考える週間: パスワードとオンライン アカウントを安全に保つためのヒント
Posted byねっと特報
ウクライナ戦争に見るワイパー攻撃の実態とデジタル情報操作
Posted byFunglr Games(日本語)
「エースコンバット」と「トップガン マーヴェリック」が夢のコラボ!マーヴェリックスキンの「F-14A Tomcat」や「F/A-18E Super Hornet」が登場!

[org.apache.atlas:atlas-common] Cross-site Scripting in Apache Atlas

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/05/2022

Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stored Cross-Site Scripting in the edit-tag functionality.
References

https://nvd.nist.gov/vuln/detail/CVE-2017-3151
https://lists.apache.org/thread.html/4a4fef91e067…

[org.richfaces:richfaces] Remote code execution due to insecure deserialization

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

A flaw was found in the way JBoss RichFaces handled deserialization. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of securit…

[org.apache.struts:struts2-struts1-plugin] Code execution in Apache Struts 1 plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/04/2022

The Struts 1 plugin used with Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
References

https://nvd.nist.gov/vuln/detail/CVE-2017-9791
https://security.netapp.c…

[org.apache.sling:org.apache.sling.xss] Cross site scripting in Apache Sling

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/04/2022

In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vuln…

[org.apache.commons:commons-collections4] Deserialization of Untrusted Data in Apache commons collections

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/04/2022

It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the…

[org.apache.myfaces.core:myfaces-impl] Path Traversal in Apache MyFaces

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/02/2022

Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax.fa…

[org.vivoweb:vitro-project] Command Injection in VIVO Vitro

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/02/2022

SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request…

[org.gradle:gradle-core] Insecure transport protocol in Gradle

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/02/2022

Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.goo…

[org.apache.orc:orc] Apache ORC vulnerable to Uncontrolled Recursion

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/08/2022

In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser. The impact of this bug is most likely denial-of-service against software that uses the ORC file parser. With the C++ parser, t…

[org.richfaces:richfaces-core] Arbitrary code execution in Richfaces

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData o…

Posts navigation

Previous Posts 1 … 20 21 22 23 24 … 26 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close