Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[Jellyfin.Common] Incorrect Access Control and Cross Site Scripting in Jellyfin

  • Posted inHIGH
  • Posted byGitHub
  • 08/20/202208/31/2022

In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-35909
https…

[oqs] oqs’s Post-Quantum Signature scheme Rainbow level I parametersets broken

  • Posted inHIGH
  • Posted byGitHub
  • 08/19/202208/19/2022

Ward Beullens found a practical key-recovery attack against Rainbow.
The level I parametersets are removed from liboqs starting from version 0.7.2.
Find the scientific details in Breaking Rainbow Takes a Weekend on a Laptop.
This means all the oqs::sig…

[github.com/hashicorp/consul] HashiCorp Consul Template could reveal Vault secret contents in error messages

  • Posted inHIGH
  • Posted byGitHub
  • 08/18/202209/08/2022

In HashiCorp Consul Template through version 0.29.1, invalid templates could inadvertently reveal the contents of Vault secret in errors returned by the *template.Template.Execute 5 method, when given a template using Vault secret contents incorrectly….

[@mapbox/mapbox-maps-android] Mapbox is vulnerable to Integer Overflow

  • Posted inHIGH
  • Posted byGitHub
  • 08/17/202211/22/2022

An integer overflow exists in Mapbox’s closed source gl-native library prior to version 10.6.1, which is bundled with multiple Mapbox products including open source libraries. The overflow is caused by large image height and width values when creating …

[tower-http] tower-http’s improper validation of Windows paths could lead to directory traversal attack

  • Posted inHIGH
  • Posted byGitHub
  • 08/12/2022

tower_http::services::fs::ServeDir didn’t correctly validate Windows paths, meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially re…

[apache-avro] Apache Avro Rust SDK vulnerable to reader looping in cycle endlessly, consuming CPU

  • Posted inHIGH
  • Posted byGitHub
  • 08/10/202208/19/2022

It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avr…

[apache-avro] Apache Avro Rust SDK’s Reader could consume memory beyond allowed constraints

  • Posted inHIGH
  • Posted byGitHub
  • 08/10/202208/31/2022

It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should updat…

[apache-avro] Apache Avro Rust SDK corrupted data read can cause crash

  • Posted inHIGH
  • Posted byGitHub
  • 08/10/202208/19/2022

It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 wh…

[org.postgresql:postgresql] PostgreSQL JDBC Driver SQL Injection in ResultSet.refreshRow() with malicious column names

  • Posted inHIGH
  • Posted byGitHub
  • 08/06/202209/23/2022

Impact
The PGJDBC implementation of the java.sql.ResultRow.refreshRow() method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. ;, could lead to SQL injection. This could lead to executing…

[mongoose] automattic/mongoose vulnerable to Prototype pollution via Schema.path

  • Posted inHIGH
  • Posted byGitHub
  • 07/29/202211/25/2022

Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.\n\nAffected versions of this package are vulnerable to Prototype Pollution. The Schema.path() function is vulnerable to prototype pollution when setting the sch…

Posts navigation

Previous Posts 1 … 23 24 25 26 27 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close