Skip to content

トピトピニュース

Header Image
Category

HIGH

381 Posts

Featured

Posted byGitHub
[phpxmlrpc/phpxmlrpc] code injection in phpxmlrpc/phpxmlrpc
Posted byGitHub
[ghost] ghost vulnerable to unauthorized newsletter modification via improper access controls
Posted byGitHub
[microweber/microweber] Account Takeover Through Password Reset Poisoning
Posted byGitHub
[apache-airflow] OS Command Injection in Apache Airflow

[october/system] October CMS Safe Mode bypass leads to authenticated Remote Code Execution

  • Posted inHIGH
  • Posted byGitHub
  • 10/14/202210/25/2022

Impact
This vulnerability only affects installations that rely on the safe mode restriction, commonly used when providing public access to the admin panel. Assuming an attacker has access to the admin panel and permission to open the “Editor” section, …

[powerline-gitstatus] Powerline Gitstatus vulnerable to arbitrary code execution

  • Posted inHIGH
  • Posted byGitHub
  • 10/13/202210/19/2022

powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus…

[node-saml] Signature bypass via multiple root elements

  • Posted inHIGH
  • Posted byGitHub
  • 10/13/202210/15/2022

Impact
A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticate…

[node-saml] Signature bypass via multiple root elements

  • Posted inHIGH
  • Posted byGitHub
  • 10/13/202210/18/2022

Impact
A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticate…

[com.amazon.redshift:redshift-jdbc42] com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution

  • Posted inHIGH
  • Posted byGitHub
  • 10/13/202210/13/2022

Impact
A potential remote command execution issue exists within redshift-jdbc42 versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via the sslhostnameverifier, socketFa…

[loader-utils] loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)

  • Posted inHIGH
  • Posted byGitHub
  • 10/12/202211/23/2022

A regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils via the resourcePath variable in interpolateName.js. A badly or maliciously formed string could be used to send craf…

[org.ini4j:ini4j] org.ini4j allows attackers to cause a Denial of Service (DoS)

  • Posted inHIGH
  • Posted byGitHub
  • 10/12/202210/19/2022

An issue in the fetch() method in the BasicProfile class of org.ini4j before v0.5.4 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-41404
https://sourceforge.net/p/ini4j…

[NuGet.Commands] NuGet Elevation of Privilege Vulnerability

  • Posted inHIGH
  • Posted byGitHub
  • 10/12/202210/15/2022

Description
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0.0-rc, .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol). This advisory also provides guid…

[melisplatform/melis-asset-manager] melisplatform/melis-asset-manager vulnerable to Path Traversal

  • Posted inHIGH
  • Posted byGitHub
  • 10/12/202210/15/2022

Impact
Attackers can read arbitrary files on affected versions of melisplatform/melis-asset-manager, leading to the disclosure of sensitive information. Conducting this attack does not require authentication.
Users should immediately upgrade to melispl…

[melisplatform/melis-cms] melisplatform/melis-cms vulnerable to deserialization of untrusted data

  • Posted inHIGH
  • Posted byGitHub
  • 10/12/202210/14/2022

Impact
Attackers can deserialize arbitrary data on affected versions of melisplatform/melis-cms, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication.
Users should immediately…

Posts navigation

Previous Posts 1 … 7 8 9 10 11 … 39 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close