Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[org.apache.struts:struts2-core] Arbitrary code execution in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
References

https://nvd.nist.gov/vuln/detail/C…

[org.apache.struts:struts2-core] ClassLoader manipulation in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to “manipulate” the ClassLoader and execute arbitrary code via a crafte…

[org.apache.struts:struts2-core] ClassLoader manipulation in Apache Struts

  • Posted inHIGH
  • Posted byGitHub
  • 05/14/202211/04/2022

CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to “manipulate” the ClassLoader and modify session state via a craf…

[org.csanchez.jenkins.plugins:kubernetes] Exposure of Sensitive Information in Jenkins Kubernetes Plugin

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
References

https://nvd.nist.g…

[org.apache.guacamole:guacamole-common] Missing Encryption of Sensitive Data in Apache Guacamole

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/04/2022

Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user’s session token. This cookie lacked the “secure” flag, which could allow an attacker eavesdropping on the network to intercept the user’s session token if unencrypted HT…

[org.grails.plugins:asset-pipeline] Asset Pipeline Grails Plugin vulnerable to Path Traversal

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/23/2022

Asset Pipeline Grails Plugin Asset-pipeline plugin version Prior to 2.14.1.1, 2.15.1 and 3.0.6 contains a Incorrect Access Control vulnerability in Applications deployed in Jetty that can result in Download .class files and any arbitrary file. This att…

[io.jenkins:configuration-as-code] Jenkins Configuration as Code Plugin has Insufficiently Protected Credentials

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/09/2022

A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to…

[com.amazonaws:aws-codepipeline] Jenkins AWS CodePipeline Plugin has Insufficiently Protected Credentials

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/08/2022

Jenkins project Jenkins AWS CodePipeline Plugin version 0.36 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodePipelineSCM.java that can result in Credentials Disclosure. This attack appear to be exploitable via local …

[com.amazonaws:aws-codebuild] Insufficiently Protected Credentials in Jenkins AWS CodeBuild Plugin

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/08/2022

Jenkins project Jenkins AWS CodeBuild Plugin version 0.26 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSClientFactory.java, CodeBuilder.java that can result in Credentials Disclosure. This attack appear to be exploitab…

[org.apache.mesos:mesos] Denial of service in Apache Mesos

  • Posted inHIGH
  • Posted byGitHub
  • 05/13/202211/02/2022

When handling a decoding failure for a malformed URL path of an HTTP request, libprocess in Apache Mesos might crash because the code accidentally calls inappropriate function. A malicious actor can therefore cause a denial of service of Mesos masters …

Posts navigation

Previous Posts 1 … 31 32 33 34 35 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close