Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[com.smalltest:smalltest] Jenkins SmallTest Plugin improperly validates hostname

  • Posted inHIGH
  • Posted byGitHub
  • 09/22/202209/23/2022

Jenkins SmallTest Plugin 1.0.4 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.
References

https://nvd.nist.gov/vuln/…

[com.meowlomo.jenkins:scm-httpclient] Jenkins SCM HttpClient Plugin vulnerable to Cross-Site Request Forgery

  • Posted inHIGH
  • Posted byGitHub
  • 09/22/202209/23/2022

A cross-site request forgery (CSRF) vulnerability in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing cred…

[autogluon.multimodal] autogluon.multimodal vulnerable to unsafe YAML deserialization

  • Posted inHIGH
  • Posted byGitHub
  • 09/22/2022

Impact
A potential unsafe deserialization issue exists within the autogluon.multimodal module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of untrusted data may allow an unprivileged third party to cause…

[arr-pm] arr-pm vulnerable to arbitrary shell execution when extracting or listing files contained in a malicious rpm.

  • Posted inHIGH
  • Posted byGitHub
  • 09/22/202209/24/2022

Impact
Arbitrary shell execution is possible when using RPM::File#files and RPM::File#extract if the RPM contains a malicious “payload compressor” field.
This vulnerability impacts the extract and files methods of the RPM::File class in the affected ve…

[org.apache.inlong:inlong-common] Apache InLong vulnerable to Deserialization of Untrusted Data

  • Posted inHIGH
  • Posted byGitHub
  • 09/21/202209/22/2022

In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentiall…

[org.xwiki.platform:xwiki-platform-oldcore] XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups

  • Posted inHIGH
  • Posted byGitHub
  • 09/21/2022

Impact
It’s possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation.
More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a refer…

[org.xwiki.platform:xwiki-platform-security] XWiki Platform Security Parent POM vulnerable to overwriting of security rules of a page with a final page having the same reference

  • Posted inHIGH
  • Posted byGitHub
  • 09/21/202209/21/2022

Impact
A bug in the security cache is storing rules associated to document Page1.Page2 and space Page1.Page2 in the same cache entry.
That means that it’s possible to overwrite the rights of a space or a document by creating the page of the space with …

[@fastly/js-compute] Fastly Compute@Edge JS Runtime has fixed random number seed during compilation

  • Posted inHIGH
  • Posted byGitHub
  • 09/21/202209/22/2022

Impact
Math.random and crypto.getRandomValues methods failed to use sufficiently random values. The initial value to seed the CSPRNG (cryptographically secure pseudorandom number generator) was baked-in to the final WebAssembly module meaning the seque…

[github.com/cri-o/cri-o] CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure

  • Posted inHIGH
  • Posted byGitHub
  • 09/20/202209/23/2022

Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to …

[com.fasterxml.woodstox:woodstox-core] Denial of Service due to parser crash

  • Posted inHIGH
  • Posted byGitHub
  • 09/17/202210/26/2022

Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may …

Posts navigation

Previous Posts 1 … 14 15 16 17 18 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close