Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[org.apache.atlas:atlas-common] Cross-site Scripting in Apache Atlas

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/05/2022

Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stored Cross-Site Scripting in the edit-tag functionality.
References

https://nvd.nist.gov/vuln/detail/CVE-2017-3151
https://lists.apache.org/thread.html/4a4fef91e067…

[org.richfaces:richfaces] Remote code execution due to insecure deserialization

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

A flaw was found in the way JBoss RichFaces handled deserialization. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of securit…

[org.apache.struts:struts2-struts1-plugin] Code execution in Apache Struts 1 plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/04/2022

The Struts 1 plugin used with Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
References

https://nvd.nist.gov/vuln/detail/CVE-2017-9791
https://security.netapp.c…

[org.apache.sling:org.apache.sling.xss] Cross site scripting in Apache Sling

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/04/2022

In the XSS Protection API module before 1.0.12 in Apache Sling, the encoding done by the XSSAPI.encodeForJSString() method is not restrictive enough and for some input patterns allows script tags to pass through unencoded, leading to potential XSS vuln…

[org.apache.commons:commons-collections4] Deserialization of Untrusted Data in Apache commons collections

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/04/2022

It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the…

[org.apache.myfaces.core:myfaces-impl] Path Traversal in Apache MyFaces

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/02/2022

Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax.fa…

[org.vivoweb:vitro-project] Command Injection in VIVO Vitro

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/02/2022

SPARQL Injection in VIVO Vitro v1.10.0 allows a remote attacker to execute arbitrary SPARQL via the uri parameter, leading to a regular expression denial of service (ReDoS), as demonstrated by crafted use of FILTER%20regex in a /individual?uri= request…

[org.gradle:gradle-core] Insecure transport protocol in Gradle

  • Posted inMODERATE
  • Posted byGitHub
  • 05/13/202211/02/2022

Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.goo…

[org.apache.orc:orc] Apache ORC vulnerable to Uncontrolled Recursion

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/08/2022

In Apache ORC 1.0.0 to 1.4.3 a malformed ORC file can trigger an endlessly recursive function call in the C++ or Java parser. The impact of this bug is most likely denial-of-service against software that uses the ORC file parser. With the C++ parser, t…

[org.richfaces:richfaces-core] RichFaces vulnerable to Expression Language Injection

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource’s resource request, aka RF-14309.
References

https:/…

Posts navigation

Previous Posts 1 … 98 99 100 101 102 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close