Skip to content

トピトピニュース

Header Image
Category

CRITICAL

187 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.jeecgframework.boot:jeecg-boot-common] Jeecg-boot vulnerable to SQL Injection
Posted byGitHub
[electron] Heap buffer overflow in GPU
Posted byGitHub
[wger] wger vulnerable to brute force attempts

[xalan:xalan] Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets

  • Posted inCRITICAL
  • Posted byGitHub
  • 07/20/202211/08/2022

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
A fix…

[awesome_spawn] OS Command Injection in awesome spawn

  • Posted inCRITICAL
  • Posted byGitHub
  • 07/01/202207/22/2022

Awesome spawn prior to version 1.2.0 contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to …

[flatbuffers] Generated code can read and write out of bounds in safe code

  • Posted inCRITICAL
  • Posted byGitHub
  • 06/17/202210/20/2022

Code generated by flatbuffers’ compiler is unsafe but not marked as such.
See https://github.com/google/flatbuffers/issues/6627 for details.
All users that use generated code by flatbuffers compiler are recommended to:

not expose flatbuffer generated …

[reportlab] XML Injection in ReportLab

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/10/2022

ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in colors.py, as demonstrated by a crafted XML document with ‘<span color=”‘ followed by arbitrary Python code.
References

https://nvd.nist.gov/vuln/detail/CVE-2019…

[org.apache.tapestry:tapestry-core] Deserialization of Untrusted Data in Apache Tapestry

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202211/04/2022

By manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the w…

[org.jenkins-ci.main:jenkins-core] Improper Authorization in Jenkins

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202210/26/2022

When creating temporary files, agent-to-controller access to create those files is only checked after they’ve been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-21693
https://www.je…

[org.jenkins-ci.main:jenkins-core] Missing Authorization in Jenkins

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202210/26/2022

FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-21689
https://www.jenkins.io/security/advisory/202…

[apache-airflow] Missing Authentication for Critical Function in Apache Airflow

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/21/2022

The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, infor…

[org.jenkins-ci.plugins:nuget] XML external entity vulnerability in Jenkins Nuget Plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202209/08/2022

Jenkins Nuget Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-21658
https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2340
http://w…

[System.Drawing.Common] .NET Core Remote Code Execution Vulnerability

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/25/202210/26/2022

A remote code execution vulnerability exists when parsing certain types of graphics files. This vulnerability only exists on systems running on MacOS or Linux. This CVE ID is unique from CVE-2021-26701.
References

https://nvd.nist.gov/vuln/detail/CVE-…

Posts navigation

Previous Posts 1 … 11 12 13 14 15 … 19 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close