Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[opcua] opcua Vulnerable to Out-of-bounds Write

  • Posted inHIGH
  • Posted byGitHub
  • 08/25/202209/02/2022

The package opcua from 0.0.0 until 0.11.0 is vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the …

[node-opcua] node-opcua DoS when bypassing limitations for excessive memory consumption

  • Posted inHIGH
  • Posted byGitHub
  • 08/25/202209/02/2022

The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.
References

h…

[github.com/gravitational/teleport] Improper token validation leading to code execution in Teleport

  • Posted inHIGH
  • Posted byGitHub
  • 08/25/202208/31/2022

Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in plac…

[ansible-runner] ansible-runner vulnerable to shell command injection

  • Posted inHIGH
  • Posted byGitHub
  • 08/25/202209/02/2022

A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host’s shell command. A developer could unintentionally write code that ge…

[asyncua] Uncontrolled Resource Consumption in asyncua and opcua

  • Posted inHIGH
  • Posted byGitHub
  • 08/24/202209/30/2022

All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit …

[opcua] Uncontrolled Resource Consumption in opcua

  • Posted inHIGH
  • Posted byGitHub
  • 08/24/202208/31/2022

The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks – per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an u…

[node-opcua] node-opcua DoS vulnerability via message with memory allocation that exceeds v8’s memory limit

  • Posted inHIGH
  • Posted byGitHub
  • 08/24/202209/02/2022

The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit.
References

https://nvd.ni…

[ansible-runner] ansible-runner 2.0.0 default temporary files written to world R/W locations

  • Posted inHIGH
  • Posted byGitHub
  • 08/24/202209/02/2022

A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansibl…

[notrinos/notrinos-erp] Missing password strength check in notrinos/notrinos-erp

  • Posted inHIGH
  • Posted byGitHub
  • 08/23/202209/07/2022

In versions of notrinos/notrinoserp prior to 0.7 new account passwords were missing a password strength check.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-2927
https://github.com/notrinos/notrinoserp/commit/e61e76b44c6a2b28a4a648a06ef34f65c37…

[notrinos/notrinos-erp] Exposure of password hashes in notrinos/notrinos-erp

  • Posted inHIGH
  • Posted byGitHub
  • 08/22/202208/31/2022

The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the ad…

Posts navigation

Previous Posts 1 … 22 23 24 25 26 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close