Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[org.apache.ivy:ivy] Apache Ivy vulnerable to path traversal

  • Posted inHIGH
  • Posted byGitHub
  • 11/08/202211/08/2022

When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied “pattern” that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates conta…

[org.apache.ivy:ivy] Apache Ivy does not verify target path when extracting the archive

  • Posted inHIGH
  • Posted byGitHub
  • 11/07/202211/08/2022

With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used
pack200 or zip packaging.
For artifacts using the “zip”, “jar” or “war” packaging Ivy prior to version 2.5.1 doesn’t …

[pulsar-client] Apache Pulsar: Disabled Certificate Validation for OAuth Client Credential Requests makes C++/Python Clients vulnerable to MITM attack

  • Posted inHIGH
  • Posted byGitHub
  • 11/05/202211/08/2022

The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a m…

[org.apache.uima:uimaj-core] Apache UIMA Path Traversal vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 11/04/202211/04/2022

A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apac…

[ckb] ckb type_id script resume may randomly fail

  • Posted inHIGH
  • Posted byGitHub
  • 11/03/202211/03/2022

Impact
https://github.com/nervosnetwork/ckb/blob/v0.101.2/script/src/verify.rs#L871-L879
TypeIdSystemScript resume handle is not correct when max_cycles is not enough, ScriptError::ExceededMaximumCycles will be raised directly ranther than suspend as e…

[muhammara] Unchecked Return Value to NULL Pointer Dereference in PDFDocumentHandler.cpp

  • Posted inHIGH
  • Posted byGitHub
  • 11/03/202211/05/2022

Impact
The package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another.
Patches
It has been patched in 2.6.0 for muhammara and not …

[apereo/phpcas] phpCAS vulnerable to Service Hostname Discovery Exploitation

  • Posted inHIGH
  • Posted byGitHub
  • 11/02/202211/02/2022

Impact
The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authen…

[openssl-src] X.509 Email Address Variable Length Buffer Overflow

  • Posted inHIGH
  • Posted byGitHub
  • 11/02/202211/05/2022

A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to
have signed a malicious certificate or for a…

[org.springframework.security:spring-security-oauth2-client] spring-security-oauth2-client vulnerable to Privilege Escalation

  • Posted inHIGH
  • Posted byGitHub
  • 11/01/202211/02/2022

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via…

[org.springframework.security:spring-security-core] Spring Security authorization rules can be bypassed via forward or include dispatcher types

  • Posted inHIGH
  • Posted byGitHub
  • 11/01/202211/02/2022

Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The applicati…

Posts navigation

Previous Posts 1 … 3 4 5 6 7 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close