Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[System.Drawing.Common] .NET Core Remote Code Execution Vulnerability

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202210/26/2022

A remote code execution vulnerability exists when parsing certain types of graphics files. This vulnerability only exists on systems running on MacOS or Linux. This CVE ID is unique from CVE-2021-26701.
References

https://nvd.nist.gov/vuln/detail/CVE-…

[Microsoft.NETCore.App.Runtime.ios-arm] Denial of service in .NET core

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202211/02/2022

.NET Core and Visual Studio Denial of Service Vulnerability due to a vulnerability which exists when creating HTTPS web request during X509 certificate chain building.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-1721
https://portal.msrc.micro…

[org.jenkins-ci.main:jenkins-core] Improper Input Validation in Jenkins

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202210/26/2022

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global config.xml file.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-21605
https://www.jen…

[jupyterhub] Cross-Site Request Forgery in JupyterHub

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202209/10/2022

JupyterHub 1.1.0 allows CSRF in the admin panel via a request that lacks an _xsrf field, as demonstrated by a /hub/api/user request (to add or remove a user account).
References

https://nvd.nist.gov/vuln/detail/CVE-2020-36191
https://github.com/jupyte…

[Microsoft.AspNetCore.App.Runtime.linux-musl-arm] ASP.NET Core and Visual Studio Denial of Service Vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202211/04/2022

A denial-of-service vulnerability exists in the way Kestrel parses HTTP/2 requests. The security update addresses the vulnerability by fixing the way the Kestrel parses HTTP/2 requests. Users are advised to upgrade.
References

https://nvd.nist.gov/vul…

[org.keycloak:keycloak-core] Keycloak vulnerable to Server-Side Request Forgery

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202210/08/2022

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) …

[io.jenkins.plugin-management:plugin-management-parent-pom] Download of Code Without Integrity Check in Jenkins Plugin Installation Manager

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Plugin Installation Manager Tool 2.1.3 and earlier does not verify plugin downloads.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2320
https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-1856
http://www.openwall.com/lists/oss…

[org.jenkins-ci.plugins:active-directory] Improper Authentication in Jenkins Active Directory Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-2299
https://www.jenkins.io/security/advisory/2020-11-04/#SECURIT…

[org.jenkins-ci.plugins:active-directory] Improper Authentication (empty password) in Jenkins Active Directory Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Active Directory Plugin prior to 2.20 does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
References

https:…

[org.jenkins-ci.plugins:active-directory] Authentication cache in Active Directory Jenkins Plugin allows logging in with any password

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/09/2022

Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
References

https://nvd.nist.gov/vuln/…

Posts navigation

Previous Posts 1 … 80 81 82 83 84 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close