Skip to content

トピトピニュース

Header Image
Category

CRITICAL

187 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.jeecgframework.boot:jeecg-boot-common] Jeecg-boot vulnerable to SQL Injection
Posted byGitHub
[electron] Heap buffer overflow in GPU
Posted byGitHub
[wger] wger vulnerable to brute force attempts

[org.apache.struts:struts2-struts1-plugin] Code execution in Apache Struts 1 plugin

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/04/2022

The Struts 1 plugin used with Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
References

https://nvd.nist.gov/vuln/detail/CVE-2017-9791
https://security.netapp.c…

[org.apache.commons:commons-collections4] Deserialization of Untrusted Data in Apache commons collections

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/04/2022

It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the…

[org.richfaces:richfaces-core] RichFaces vulnerable to Expression Language Injection

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource’s resource request, aka RF-14309.
References

https:/…

[org.richfaces:richfaces-core] Arbitrary code execution in Richfaces

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData o…

[org.richfaces:richfaces-core] Richfaces vulnerable to arbitrary code execution

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/08/2022

The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via or…

[org.springframework.data:spring-data-rest-core] Remote code execution in PATCH requests in Spring Data REST

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/13/202211/05/2022

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) can use specially crafted JSON data to run arbitrary Java code.
References

https://nvd.nist.gov/vuln/detail/C…

[com.github.pagehelper:pagehelper] MyBatis PageHelper vulnerable to time-blind SQL injection via orderBy parameter

  • Posted inCRITICAL
  • Posted byGitHub
  • 05/05/202210/21/2022

MyBatis PageHelper versions 3.5.x through 5.3.x were discovered to contain a time-blind SQL injection vulnerability via the orderBy parameter.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-28111
https://github.com/pagehelper/Mybatis-PageHelper
…

[org.apache.struts:struts2-core] ParameterInterceptor vulnerability allows remote command execution

  • Posted inCRITICAL
  • Posted byGitHub
  • 04/22/202211/04/2022

Regular expression in ParametersInterceptor matches top’foo’ as a valid expression, which OGNL treats as (top[‘foo’])(0) and evaluates the value of ‘foo’ action parameter as an OGNL expression. This lets malicious users put arbitrary OGNL statements in…

[poetry] Poetry before v1.1.9 contains Untrusted Search Path

  • Posted inCRITICAL
  • Posted byGitHub
  • 03/23/202209/20/2022

Poetry prior to v1.1.9 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the appli…

[SinGooCMS.Utility] Deserialization of Untrusted Data in SinGooCMS.Utility

  • Posted inCRITICAL
  • Posted byGitHub
  • 03/18/202209/08/2022

This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restri…

Posts navigation

Previous Posts 1 … 14 15 16 17 18 19 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close