Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[Akka] Remote code execution vulnerability in dependency System.Drawing.Common

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/2022

Impact
The core Akka module depended on an old System.Configuration.ConfigurationManager version 4.7.0 which transitively depends on System.Common.Drawing v4.7.0. The System.Common.Drawing v4.7.0 is affected by a remote code execution vulnerability htt…

[tensorflow] Tensorflow vulnerable to Out-of-Bounds Read

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/2022

Impact
When the BaseCandidateSamplerOp function receives a value in true_classes larger than range_max, a heap oob vuln occurs.
tf.raw_ops.ThreadUnsafeUnigramCandidateSampler(
true_classes=[[0x100000,1]],
num_true = 2,
num_sampled = 2,
…

[silverstripe/versioned-admin] Stored XSS in Compare Mode

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

A malicious content author could add a Javascript payload to a page’s meta description and get it executed in the versioned history compare view.
This vulnerability requires access to the CMS to be deployed. The attacker must then convince a privileged…

[silverstripe/framework] Blind SQL Injection via GridFieldSortableHeader

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

Gridfield state is vulnerable to SQL injections. The vast majority of Gridfields in Silverstripe CMS are affected by this vulnerability.
An attacker with CMS access could execute an arbitrary SQL statement by adding an SQL payload in some parts of the …

[silverstripe/framework] Reflected XSS in querystring parameters

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request.
To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malici…

[silverstripe/framework] Stored XSS using HTMLEditor

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

A malicious content author could add a JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters.
An attacker must have access to the CMS to exploit this issue.
References

https://github.com/FriendsOf…

[silverstripe/framework] Stored XSS using uppercase characters in HTMLEditor

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/2022

A malicious content author could add a Javascript payload to the href attribute of a link. A similar issue was identified and fixed via CVE-2022-28803. However, the fix didn’t account for the casing of the href attribute. An attacker must have access t…

[silverstripe/cms] Stored XSS in custom meta tags

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

A malicious content author could create a custom meta tag and execute an arbitrary JavaScript payload. This would require convincing a legitimate user to access a page and enter a custom keyboard shortcut.
This requires CMS access to exploit.
Reference…

[silverstripe/assets] XSS in shortcodes

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

A malicious content author could add arbitrary attributes to HTML editor shortcodes which could be used to inject a JavaScript payload on the front end of the site. The shortcode providers that ship with Silverstripe CMS have been reviewed and attribut…

[silverstripe/assets] XSS via uploaded gpx file

  • Posted inMODERATE
  • Posted byGitHub
  • 11/22/202211/22/2022

A malicious content author could upload a GPX file with a Javascript payload. The payload could then be executed by luring a legitimate user to view the file in a browser with support for GPX files. GPX is an XML-based format used to store GPS data.
By…

Posts navigation

Previous Posts 1 2 3 4 5 6 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close