Skip to content

TechMedia

Header Image
Author

wpmaster

811184 Posts

Featured

Posted byWpmaster
大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
Posted byWpmaster
サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
Posted byWpmaster
吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
Posted byWpmaster
【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)

[invenio-records] Cross-site scripting invenio-records

  • Posted inMODERATE
  • Posted byWpmaster
  • 07/16/201902/01/2023

Cross-Site Scripting (XSS) vulnerability in administration interface
Impact
A Cross-Site Scripting (XSS) vulnerability was discovered when rendering JSON for a record in the administration interface. The vulnerability could be exploited by e.g. a user …

【画像】iPhone XR2、ラベンダーとグリーン色を追加か

  • Posted inUncategorized
  • Posted byWpmaster
  • 05/20/2019

最近の報告によると、Appleは今年後半にiPhone XR 2に新しいカラーオプションを導入すると…

[Bootstrap.Less] Cross-Site Scripting in bootstrap

  • Posted inMODERATE
  • Posted byWpmaster
  • 02/23/201902/23/2023

Versions of bootstrap prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The data-template attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript…

新型iPad miniには「Face ID」が搭載されないかも…

  • Posted inUncategorized
  • Posted byWpmaster
  • 01/28/2019

昨年発売された新型iPad Proには、iPhoneで先行していたFace ID技術が搭載されました…

[activemodel] Duplicate Advisory: Moderate severity vulnerability that affects activemodel

  • Posted inMODERATE
  • Posted byWpmaster
  • 09/18/201802/01/2023

Duplicate advisory
This advisory has been withdrawn because it is a duplicate of GHSA-543v-gj2c-r3ch. This link is maintained to preserve external references.
Original Description
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5….

[ember-source] ember-source Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 08/29/201801/26/2023

Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title …

[rest-client] rest-client vulnerable to Session Fixation

  • Posted inCRITICAL
  • Posted byWpmaster
  • 08/14/201810/14/2022

REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
References

https://…

[tough-cookie] Regular Expression Denial of Service in tough-cookie

  • Posted inHIGH
  • Posted byWpmaster
  • 07/25/201804/04/2023

Affected versions of tough-cookie are susceptible to a regular expression denial of service.
The amplification on this vulnerability is relatively low – it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters…

[sanitize] Sanitize vulnerable to Improper Input Validation and Cross-site Scripting

  • Posted inHIGH
  • Posted byWpmaster
  • 03/21/201810/20/2022

When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements.
This can allow…

[rack-protection] rack-protection Observable Discrepancy vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 03/08/201801/26/2023

Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby a…

Posts navigation

Previous Posts 1 … 81,116 81,117 81,118 81,119 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close