Skip to content

トピトピニュース

Header Image
Category

MODERATE

505 Posts

Featured

Posted byGitHub
[org.keycloak:keycloak-core] Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
Posted byGitHub
[baserproject/basercms] baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability
Posted byGitHub
[org.postgresql:postgresql] TemporaryFolder on unix-like systems does not limit access to created files
Posted byGitHub
[com.h2database:h2] Password exposure in H2 Database

[temporary] `temporary` makes use of uninitialized memory

  • Posted inMODERATE
  • Posted byGitHub
  • 08/12/202208/12/2022

Uninit memory is used as a RNG seed in temporary. This has been resolved in the 0.6.4 release. The crate is not intended to be used outside of a testing environment. For a general purpose crate to create temporary directories, tempfile is an alternativ…

[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths

  • Posted inMODERATE
  • Posted byGitHub
  • 08/11/202208/24/2022

Cross-linking to https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm
Most of the fixes will be in this repo, though, so having it here gives us the private fork to work on patches
Below is currently a duplicate of the original r…

[owning_ref] owning_ref vulnerable to multiple soundness issues

  • Posted inMODERATE
  • Posted byGitHub
  • 08/11/202208/11/2022

OwningRef::map_with_owner is unsound and may result in a use-after-free.
OwningRef::map is unsound and may result in a use-after-free.
OwningRefMut::as_owner and OwningRefMut::as_owner_mut are unsound and may result in a use-after-free.
The crate viol…

[gollum] Gollum Cross-site Scripting vulnerability via filename parameter to New Page dialog

  • Posted inMODERATE
  • Posted byGitHub
  • 07/16/202208/11/2022

Cross site scripting (XSS) in gollum 5.0 to 5.1.2 via the filename parameter to the ‘New Page’ dialog.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-35305
https://github.com/Szarny/
https://github.com/gollum/
https://github.com/gollum/gollum/re…

[io.fabric8:kubernetes-client] fabric8 kubernetes-client vulnerable

  • Posted inMODERATE
  • Posted byGitHub
  • 07/15/202211/03/2022

fabric8 Kubernetes client had an arbitrary code execution flaw in versions 5.0.0-beta-1 and higher. Attackers could potentially insert malicious YAMLs due to misconfigured YAML parsing.
References

https://nvd.nist.gov/vuln/detail/CVE-2021-4178
https:/…

[ember-source] Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data

  • Posted inMODERATE
  • Posted byGitHub
  • 07/01/202207/13/2022

In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the tagName property of an Ember.View was inserted into such a string without being sanitized. This means that if a…

[array-macro] `array!` macro is unsound when its length is impure constant

  • Posted inMODERATE
  • Posted byGitHub
  • 06/17/202208/15/2022

Affected versions of this crate did substitute the array length provided by an user at compile-time multiple times.
When an impure constant expression is passed as an array length (such as a result of an impure procedural macro), this can result in the…

[neos/neos] Neos CMS vulnerable to XSS in various backend modules

  • Posted inMODERATE
  • Posted byGitHub
  • 06/03/202208/31/2022

Multiple cross-site scripting (XSS) vulnerabilities in Neos CMS allow attackers with the editor role or higher to inject arbitrary script or HTML code using the editor function, the deletion of assets, or a workspace title. The vulnerabilities were fou…

[org.codehaus.mevenide:netbeans] Improper Certificate Validation in Apache Netbeans

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202211/15/2022

The “Apache NetBeans” autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. “Apache Net…

[Microsoft.AspNetCore.SpaServices] Elevation of privilege in ASP.NET Core

  • Posted inMODERATE
  • Posted byGitHub
  • 05/25/202209/03/2022

An elevation of privilege vulnerability exists when a ASP.NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests, aka ‘ASP.NET Core Elevation Of Privilege Vulnerability’.
References

https://nvd.ni…

Posts navigation

Previous Posts 1 … 34 35 36 37 38 … 51 Next Posts
トピトピニュース
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close