Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[com.compuware.jenkins:compuware-topaz-for-total-test] Jenkins Compuware Topaz for Total Test Plugin does not configure its XML parser to prevent XXE attacks

  • Posted inMODERATE
  • Posted byGitHub
  • 10/20/202210/20/2022

Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-43430
https://www.jenkins.io/security/advisory/2022-10…

[org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view] Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins

  • Posted inMODERATE
  • Posted byGitHub
  • 10/20/202210/26/2022

Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of input steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify input step IDs resulting …

[electron-markdownify] Markdownify subject to Remote Code Execution via malicious markdown file

  • Posted inHIGH
  • Posted byGitHub
  • 10/20/202210/26/2022

Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the “nodeIntegration” option enabled. …

[github.com/fluxcd/source-controller] Improper use of metav1.Duration allows for Denial of Service

  • Posted inMODERATE
  • Posted byGitHub
  • 10/20/202210/26/2022

Flux controllers within the affected versions range are vulnerable to a denial of service attack. Users that have permissions to change Flux’s objects, either through a Flux source or directly within a cluster, can provide invalid data to fields .spec….

[com.alibaba:hessian-lite] Hessian Lite for Apache Dubbo deserialization vulnerability

  • Posted inMODERATE
  • Posted byGitHub
  • 10/19/202210/20/2022

A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and …

[org.apache.isis.core:isis-core] Apache Isis Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byGitHub
  • 10/19/202210/20/2022

Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar an…

[org.apache.isis.core:isis-core] Apache Isis webconsole module may directly query the database in prototype mode

  • Posted inMODERATE
  • Posted byGitHub
  • 10/19/202210/20/2022

When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable th…

[Microsoft.NETCore.App.Runtime.Mono.tvossimulator-arm64] .NET Remote Code Execution Vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 10/19/202210/19/2022

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerabilit…

[getkirby/cms] Kirby CMS vulnerable to user enumeration in the brute force protection

  • Posted inMODERATE
  • Posted byGitHub
  • 10/19/202210/28/2022

TL;DR
This vulnerability affects all Kirby sites with user accounts (unless Kirby’s API and Panel are disabled in the config). It can only be exploited for targeted attacks because the attack does not scale to brute force.

Introduction
User enumeratio…

[getkirby/cms] Kirby CMS vulnerable to user enumeration in the code-based login and password reset forms

  • Posted inMODERATE
  • Posted byGitHub
  • 10/19/202210/26/2022

TL;DR
This vulnerability only affects you if you are using the code or password-reset auth method with the auth.methods option. It can only be successfully exploited under server configuration conditions outside of the attacker’s control.

Introduction…

Posts navigation

Previous Posts 1 … 28 29 30 31 32 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close