Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[yetiforce/yetiforce-crm] Cross site scripting in yetiforce/yetiforce-crm

  • Posted inMODERATE
  • Posted byGitHub
  • 08/23/202208/31/2022

Cross-site Scripting (XSS) – Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-2890
https://github.com/yetiforcecompany/yetiforcecrm/commit/2c14baaf8dbc7fd82d5c585f2fa0c23528…

[eth-account] Regular expression denial of service in eth-account

  • Posted inMODERATE
  • Posted byGitHub
  • 08/23/202208/31/2022

An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method
References

https://nvd.nist.gov/vuln/detail/CVE-2022-…

[notrinos/notrinos-erp] Exposure of password hashes in notrinos/notrinos-erp

  • Posted inHIGH
  • Posted byGitHub
  • 08/22/202208/31/2022

The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the ad…

[yetiforce/yetiforce-crm] Cross site scripting in yetiforce/yetiforce-crm

  • Posted inMODERATE
  • Posted byGitHub
  • 08/22/202208/31/2022

Cross-site Scripting (XSS) – Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-2885
https://github.com/yetiforcecompany/yetiforcecrm/commit/a9ad9ee089b575855b9e5e202b4990a158…

[Jellyfin.Common] Incorrect Access Control and Cross Site Scripting in Jellyfin

  • Posted inHIGH
  • Posted byGitHub
  • 08/20/202208/31/2022

In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-35909
https…

[getkirby/starterkit] Cross site scripting in getkirby/starterkit

  • Posted inMODERATE
  • Posted byGitHub
  • 08/19/202208/31/2022

A stored cross-site scripting (XSS) vulnerability in Kirby’s Starterkit v3.7.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tags field.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-35174
h…

[omniauth] OmniAuth’s `lib/omniauth/failure_endpoint.rb` does not escape `message_key` value

  • Posted inCRITICAL
  • Posted byGitHub
  • 08/19/202209/20/2022

lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-36599
https://github.com/omniauth/omniauth/commit/43a396f181ef7d0ed2ec8291c939c95e3e…

[AgileConfig.Client] Use of Hard-coded Credentials in AgileConfig.Client

  • Posted inCRITICAL
  • Posted byGitHub
  • 08/19/202208/31/2022

Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-35540
https://github.com/dotnetcore/AgileConfig/issues/91
ht…

[frontier] Incorrect parsing of EVM reversion exit reason in RPC

  • Posted inMODERATE
  • Posted byGitHub
  • 08/19/202208/27/2022

Impact
A low severity security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this w…

[oqs] oqs’s Post-Quantum Signature scheme Rainbow level I parametersets broken

  • Posted inHIGH
  • Posted byGitHub
  • 08/19/202208/19/2022

Ward Beullens found a practical key-recovery attack against Rainbow.
The level I parametersets are removed from liboqs starting from version 0.7.2.
Find the scientific details in Breaking Rainbow Takes a Weekend on a Laptop.
This means all the oqs::sig…

Posts navigation

Previous Posts 1 … 74 75 76 77 78 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close