Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[flatbuffers] Generated code can read and write out of bounds in safe code

  • Posted inCRITICAL
  • Posted byGitHub
  • 06/17/202210/20/2022

Code generated by flatbuffers’ compiler is unsafe but not marked as such.
See https://github.com/google/flatbuffers/issues/6627 for details.
All users that use generated code by flatbuffers compiler are recommended to:

not expose flatbuffer generated …

[array-macro] `array!` macro is unsound when its length is impure constant

  • Posted inMODERATE
  • Posted byGitHub
  • 06/17/202208/15/2022

Affected versions of this crate did substitute the array length provided by an user at compile-time multiple times.
When an impure constant expression is passed as an array length (such as a result of an impure procedural macro), this can result in the…

[flower] Flower OAuth authentication bypass

  • Posted inHIGH
  • Posted byGitHub
  • 06/03/202209/14/2022

All versions of Flower, a web UI for the Celery Python RPC framework, as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by s…

[neos/neos] Neos CMS vulnerable to XSS in various backend modules

  • Posted inMODERATE
  • Posted byGitHub
  • 06/03/202208/31/2022

Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were fou…

[org.codehaus.mevenide:netbeans] Improper Certificate Validation in Apache Netbeans

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202211/15/2022

The “Apache NetBeans” autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. “Apache Net…

[matrix-synapse] Improper Verification of Cryptographic Signature in matrix-synapse

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202209/20/2022

Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs. Events sent over /send_join, /send_leave, and /invite may not be correctly signed, or may not come from the expected servers.
References

https://nvd.nist.gov/vuln/detai…

[reportlab] XML Injection in ReportLab

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/10/2022

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with ‘<span color=”‘ followed by arbitrary Python code.
References

https://nvd.nist.gov/vuln/detail/CVE-2019…

[org.apache.tapestry:tapestry-core] Deserialization of Untrusted Data in Apache Tapestry

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202211/04/2022

By manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the w…

[Microsoft.AspNetCore.SpaServices] Elevation of privilege in ASP.NET Core

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202209/03/2022

An elevation of privilege vulnerability exists when a ASP.NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests, aka ‘ASP.NET Core Elevation Of Privilege Vulnerability’.
References

https://nvd.ni…

[org.apache.solr:solr-core] Apache Solr vulnerable to XML Bomb

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202211/08/2022

Solr versions prior to 5.0.0 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it?s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses t…

Posts navigation

Previous Posts 1 … 78 79 80 81 82 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close