Skip to content

トピトピニュース

Header Image
Category

CRITICAL

187 Posts

Featured

Posted byGitHub
[github.com/crewjam/saml] crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
Posted byGitHub
[org.jeecgframework.boot:jeecg-boot-common] Jeecg-boot vulnerable to SQL Injection
Posted byGitHub
[electron] Heap buffer overflow in GPU
Posted byGitHub
[wger] wger vulnerable to brute force attempts

[netaddr] netaddr before 1.5.3 and 2.0.4 has Incorrect Default Permissions

  • Posted inCRITICAL
  • Posted byGitHub
  • 10/15/201907/22/2022

The netaddr gem before 1.5.3 and 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-17383
https://github.com/dspinhir…

[org.apache.tapestry:tapestry-core] Timing attack on HMAC signature comparison in Apache Tapestry

  • Posted inCRITICAL
  • Posted byGitHub
  • 09/27/201910/05/2022

The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the corr…

[org.exist-db:exist-core] exist-db:exist-core XML External Entity (XXE) vulnerability

  • Posted inCRITICAL
  • Posted byGitHub
  • 12/21/201811/16/2022

exist version <= 5.0.0-RC4 contains a XML External Entity (XXE) vulnerability in XML Parser for REST Server that can result in Disclosure of confidential data, denial of service, SSRF, port scanning.
References

https://nvd.nist.gov/vuln/detail/CVE-…

[flatmap-stream] Critical severity vulnerability that affects event-stream and flatmap-stream

  • Posted inCRITICAL
  • Posted byGitHub
  • 11/27/201809/08/2022

The NPM package flatmap-stream is considered malicious. A malicious actor added this package as a dependency to the NPM event-stream package in version 3.3.6. Users of event-stream are encouraged to downgrade to the last non-malicious version, 3.3.4,…

[org.eclipse.jetty:jetty-server] Jetty vulnerable to authorization bypass due to inconsistent HTTP request handling (HTTP Request Smuggling)

  • Posted inCRITICAL
  • Posted byGitHub
  • 10/20/201810/06/2022

Eclipse Jetty Server versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), are vulnerable to HTTP Request Smuggling when presented with two content-lengths headers, allowing authorization bypass. Wh…

[rest-client] rest-client vulnerable to Session Fixation

  • Posted inCRITICAL
  • Posted byGitHub
  • 08/14/201810/14/2022

REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
References

https://…

[eslint-config-eslint] Malicious Package in eslint-scope

  • Posted inCRITICAL
  • Posted byGitHub
  • 07/13/201809/08/2022

Version 3.7.2 of eslint-scope was published without authorization and was found to contain malicious code. This code would read the users .npmrc file and send any found authentication tokens to 2 remote servers.
Recommendation
The best course of action…

Posts navigation

Previous Posts 1 … 17 18 19
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close