Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[org.apache.geode:geode-core] Apache Geode unsafe deserialization in TcpServer

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/08/2022

In Apache Geode before v1.4.0, the TcpServer within the Geode locator opens a network port that deserializes data. If an unprivileged user gains access to the Geode locator, they may be able to cause remote code execution if certain classes are present…

[org.apache.ode:ode] Apache ODE Path Traversal vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/09/2022

The ODE process deployment web service was sensible to deployment messages with forged names. Using a path for the name was allowing directory traversal, resulting in the potential writing of files under unwanted locations, the overwriting of existing …

[org.graylog2:graylog2-server] Cross-site Scripting in Graylog

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/05/2022

Graylog before v2.4.4 has an XSS security issue with unescaped text in dashboard names, related to components/dashboard/Dashboard.jsx, components/dashboard/EditDashboardModal.jsx, and pages/ShowDashboardPage.jsx.
References

https://nvd.nist.gov/vuln/d…

[org.graylog2:graylog2-server] Cross-site Scripting in Graylog Server

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/05/2022

Graylog before v2.4.4 has an XSS security issue with unescaped text in notifications, related to toastr and util/UserNotification.js.
References

https://nvd.nist.gov/vuln/detail/CVE-2018-11650
https://github.com/Graylog2/graylog2-server/pull/4727
http…

[org.apache.struts:struts2-core] Special top object can be used to access Struts’ internals

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

ValueStack defines special top object which represents root of execution context. It can be used to manipulate Struts’ internals or can be used to affect container’s settings. Applying better regex which includes pattern to exclude request parameters t…

[org.apache.struts:struts2-core] Possible DoS attack when using URLValidator

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/04/2022

If an application allows enter an URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.
References

https://nvd.nist.gov/vuln/…

[org.csanchez.jenkins.plugins:kubernetes] Exposure of Sensitive Information in Jenkins Kubernetes Plugin

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/04/2022

A exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.7.0 and older in ContainerExecDecorator.java that results in sensitive variables such as passwords being written to logs.
References

https://nvd.nist.gov/vuln/deta…

[org.jvnet.hudson.plugins:groovy-postbuild] Jenkins Groovy Postbuild Plugin vulnerable to Cross-site Scripting

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/23/2022

A persisted cross-site scripting vulnerability exists in Jenkins Groovy Postbuild Plugin 2.3.1 and older in various Jelly files that allows attackers able to control build badge content to define JavaScript that would be executed in another user’s brow…

[net.opentsdb:opentsdb] OpenTSDB Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/23/2022

An issue was discovered in OpenTSDB 2.3.0. There is XSS in parameter json to the /q URI.
References

https://nvd.nist.gov/vuln/detail/CVE-2018-12973
https://github.com/OpenTSDB/opentsdb/issues/1240
https://github.com/advisories/GHSA-r68m-wq3x-2hqw

[io.jenkins:configuration-as-code] Jenkins Configuration as Code Plugin vulnerable to Exposure of Sensitive Information

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/09/2022

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in ConfigurationAsCode.java that allows attackers with Overall/Read access to obtain the YAML export of the Jenkins configuration. Ve…

Posts navigation

Previous Posts 1 … 90 91 92 93 94 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close