Skip to content

トピトピニュース

Header Image
Author

GitHub

1143 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[bitlyshortener] Package discontinued because Bitly lowered the free quota
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability

[org.apache.geode:geode-core] Apache Geode OQL method invocation vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/08/2022

When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a us…

[org.apache.struts:struts2-core] ClassLoader manipulation in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to “manipulate” the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exis…

[org.apache.struts:struts2-core] ClassLoader manipulation in Apache Struts

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/04/2022

The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to “manipulate” the ClassLoader via the class parameter, which is passed to the getClass method.
References

https://nvd.nist.gov/vuln/detail/CVE-2014-0094
http://jvn.jp…

[org.apache.struts:struts2-core] Arbitrary code execution in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
References

https://nvd.nist.gov/vuln/detail/C…

[org.apache.struts:struts2-core] ClassLoader manipulation in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to “manipulate” the ClassLoader and execute arbitrary code via a crafte…

[org.apache.struts:struts2-core] ClassLoader manipulation in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to “manipulate” the ClassLoader and modify session state via a craf…

[org.apache.struts:struts2-core] Arbitrary code execution in Apache Struts 2

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/04/2022

The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
References

https://nvd.nist.gov/vuln/detail/CVE-2016-4438
https://bugzilla.redhat.com/show_bug.cgi?id=1348238
https:…

[org.apache.struts:struts2-core] Path Traversal in Apache Struts

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/04/2022

In Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side. This vulnerability is only exploitable when using the Struts 2 C…

[org.apache.santuario:xmlsec] Apache XML Security For Java vulnerable to Infinite Loop

  • Posted inMODERATE
  • Posted byGitHub
  • 05/14/202211/08/2022

Affected versions of xmlsec are subject to a denial of service vulnerability. Should a user check the signature of a message larger than 512 MB, the method expandSize(int newPos) of class org.apache.xml.security.utils.UnsyncByteArrayOutputStream goes i…

[org.csanchez.jenkins.plugins:kubernetes] Exposure of Sensitive Information in Jenkins Kubernetes Plugin

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
References

https://nvd.nist.g…

Posts navigation

Previous Posts 1 … 94 95 96 97 98 … 115 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close