Skip to content

トピトピニュース

Header Image
Category

CRITICAL

187 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.jeecgframework.boot:jeecg-boot-common] Jeecg-boot vulnerable to SQL Injection
Posted byGitHub
[electron] Heap buffer overflow in GPU
Posted byGitHub
[wger] wger vulnerable to brute force attempts

[org.apache.sling:org.apache.sling.xss] XML External Entity Reference in Apache Sling

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/17/202211/04/2022

In the XSS Protection API module before 1.0.12 in Apache Sling, the method XSS.getValidXML() uses an insecure SAX parser to validate the input string, which allows for XXE attacks in all scripts which use this method to validate user input, potentially…

[org.jenkins-ci.main:jenkins-core] Exposure of Sensitive Information in Jenkins Core

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/02/2022

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
References

https://nvd.nist.gov/vuln/d…

[org.apache.geode:geode-core] Apache Geode unsafe deserialization in TcpServer

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/08/2022

In Apache Geode before v1.4.0, the TcpServer within the Geode locator opens a network port that deserializes data. If an unprivileged user gains access to the Geode locator, they may be able to cause remote code execution if certain classes are present…

[org.apache.camel:camel-hessian] Apache Camel camel-hessian component vulnerable to Java object deserialization

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/23/2022

The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
References

https://nvd.nist.gov/vuln/detail/C…

[org.apache.struts:struts2-core] Arbitrary code execution in Apache Struts 2

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/04/2022

The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
References

https://nvd.nist.gov/vuln/detail/CVE-2016-4438
https://bugzilla.redhat.com/show_bug.cgi?id=1348238
https:…

[org.apache.struts:struts2-core] Path Traversal in Apache Struts

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/14/202211/04/2022

In Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side. This vulnerability is only exploitable when using the Struts 2 C…

[org.apache.jmeter:ApacheJMeter] Missing certificate validation in Apache JMeter

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/05/2022

When using Distributed Test only (RMI based), Apache JMeter 2.x and 3.x uses an unsecured RMI connection. This could allow an attacker to get Access to JMeterEngine and send unauthorized code.
References

https://nvd.nist.gov/vuln/detail/CVE-2018-1297
…

[org.apache.jmeter:ApacheJMeter] Missing certificate validation in Apache JMeter

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/05/2022

In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Dist…

[org.jvnet.hudson.plugins:ssh] Jenkins SSH Plugin user passwords for encrypted SSH keys stored in plaintext

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/23/2022

The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. User passwords and passphrases for encrypted SSH keys are stored in plaintext in a configuration file.
References

https://nvd.nist.gov/vuln/detail/CVE-20…

[io.hawt:project] Insecure cookie sharing in Hawtio

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/05/2022

It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy…

Posts navigation

Previous Posts 1 … 13 14 15 16 17 … 19 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close