Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[matrix-synapse] Improper Verification of Cryptographic Signature in matrix-synapse

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202209/20/2022

Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs. Events sent over /send_join, /send_leave, and /invite may not be correctly signed, or may not come from the expected servers.
References

https://nvd.nist.gov/vuln/detai…

[org.apache.solr:solr-core] Apache Solr vulnerable to XML Bomb

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202211/08/2022

Solr versions prior to 5.0.0 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it?s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses t…

[org.jenkins-ci.plugins:gitea] Improper handling of untrusted branches in Gitea Jenkins Plugin

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202209/15/2022

Jenkins Gitea Plugin prior to 1.1.2 did not implement trusted revisions, allowing attackers without commit access to the Git repo to change Jenkinsfiles even if Jenkins is configured to consider them to be untrusted.
References

https://nvd.nist.gov/vu…

[org.jenkins-ci.plugins:pipeline-maven] XML External Entity processing vulnerability in Pipeline Maven Integration Jenkins Plugin

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202209/09/2022

An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory’s content on the agent running the Maven build to have Jenkins parse a maliciously craft…

[org.jenkins-ci.plugins:influxdb] Plaintext password storage in Jenkins InfluxDB Plugin

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202209/09/2022

Jenkins InfluxDB Plugin Prior to 1.22 stored credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
References

https://nvd.nist.gov/vuln/detail/CVE-2019-1…

[Microsoft.ChakraCore] Chakra Scripting Engine and ChakraCore Vulnerable to Memory Corruption

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202208/31/2022

Chakra Scripting Engine and ChakraCore are vulnerable to memory corruption due to an out-of-bounds write. The Microsoft advisory for CVE-2021-42279 was modified in August 2022 to include Microsoft.ChakraCore as an affected product.
References

https://…

[org.jenkins-ci.main:jenkins-core] Missing Authorization in Jenkins

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202210/26/2022

FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-21695
https://www.jenkins.io…

[org.jenkins-ci.main:jenkins-core] Improper Input Validation in Jenkins

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202210/26/2022

Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global config.xml file.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-21605
https://www.jen…

[Microsoft.AspNetCore.App.Runtime.linux-musl-arm] ASP.NET Core and Visual Studio Denial of Service Vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202211/04/2022

A denial-of-service vulnerability exists in the way Kestrel parses HTTP/2 requests. The security update addresses the vulnerability by fixing the way the Kestrel parses HTTP/2 requests. Users are advised to upgrade.
References

https://nvd.nist.gov/vul…

[Microsoft.AspNetCore.Http] Cookie parsing failure

  • Posted inHIGH
  • Posted byGitHub
  • 05/25/202211/24/2022

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being …

Posts navigation

Previous Posts 1 … 25 26 27 28 29 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close