Skip to content

TechMedia

Header Image

[VladTheEnterprising] VladTheEnterprising allows local users to obtain sensitive information by reading MySQL root password from temporary file

  • Posted inHIGH
  • Posted byWpmaster
  • 05/14/202201/27/2023

Race condition in lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to obtain sensitive information by reading the MySQL root password from a temporary file before it is removed.
References

https://nvd.nist.gov/vuln/…

[backup_checksum] backup-agoddard and backup_checksum have Information Exposure vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 05/14/202201/23/2023

(1) lib/backup/cli/utility.rb in the backup-agoddard gem 3.0.28 and (2) lib/backup/cli/utility.rb in the backup_checksum gem 3.0.23 for Ruby place credentials on the openssl command line, which allows local users to obtain sensitive information by list…

[point-cli] point-cli allows local users to obtain sensitive information by listing the process

  • Posted inHIGH
  • Posted byWpmaster
  • 05/14/202201/27/2023

lib/commands/setup.rb in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.
References

https://nvd.nist.gov/vuln/detail/CVE-2014-4997
http://ww…

[kajam] kajam allows local users to obtain sensitive information by listing the process

  • Posted inHIGH
  • Posted byWpmaster
  • 05/14/202201/27/2023

vendor/plugins/dataset/lib/dataset/database/mysql.rb in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local use…

[lean-ruport] lean-ruport allows local users to obtain sensitive information by listing the process

  • Posted inHIGH
  • Posted byWpmaster
  • 05/14/202201/27/2023

test/tc_database.rb in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.
References

https://nvd.nist.gov/vuln/detail/CVE-20…

[se.diabol.jenkins.pipeline:delivery-pipeline-plugin] Jenkins Delivery Pipeline Plugin Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/14/202212/13/2022

The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used the unescaped content of the query parameter ‘fullscreen’ in its JavaScript, resulting in a cross-site scripting vulnerability through specially crafted URLs. Version 1.0.8 of the plug…

[ldap_fluff] ldap_fluff authentication bypass

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/14/202201/27/2023

The ldap_fluff gem for Ruby, as used in Red Hat CloudForms 1.1, when using Active Directory for authentication, allows remote attackers to bypass authentication via unspecified vectors.
References

https://nvd.nist.gov/vuln/detail/CVE-2012-5604
https:/…

[org.jenkins-ci.plugins:cucumber-living-documentation] Jenkins Cucumber Living Documentation Plugin Cross-site Scripting vulnerability

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/14/202212/13/2022

A cross site scripting vulnerability exists in Jenkins Cucumber Living Documentation Plugin 1.0.12 and older in CukedoctorBaseAction#doDynamic that disables the Content-Security-Policy protection for archived artifacts and workspace files, allowing att…

[org.jenkins-ci.plugins:reverse-proxy-auth-plugin] Jenkins Reverse Proxy Auth Plugin allows attackers with local file system access to obtain a list of authorities for logged in users

  • Posted inLOW
  • Posted byWpmaster
  • 05/14/202212/20/2022

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in user…

[org.jenkins-ci.plugins:vsphere-cloud] Jenkins vSphere Plugin disables SSL/TLS certificate validation by default

  • Posted inMODERATE
  • Posted byWpmaster
  • 05/14/202212/13/2022

A man in the middle vulnerability exists in Jenkins vSphere Plugin 2.16 and older in VSphere.java that disables SSL/TLS certificate validation by default. vSphere Plugin 2.17 now has SSL/TLS certificate validation enabled by default.
References

https:…

Posts navigation

Previous Posts 1 … 81,986 81,987 81,988 81,989 81,990 … 82,021 Next Posts

Recent Posts

  • 大規模対戦ACT『Warlander』PS5/XSX版最新情報を公開―新コンテンツ追加やゲーム改善をリリースに向けて開発中
  • サウナブームが到来!!「ととのう」を提供するべく新サウナ施設や様々なサウナグッズが登場 (マイライフニュース)
  • 吉野家HDの24年2月期、営業益34%増 12年ぶり水準 (日本経済新聞)
  • 【フォト】大規模反攻、夏にずれ込む可能性 ウクライナ首相 (産経新聞)
  • 驚き!地球!グレートネイチャー「探検!未知なる海へ~北極海・ポリネシア~」[解][字]
An error has occurred, which probably means the feed is down. Try again later.
RSS Error: A feed could not be found at `https://nordot.app/-/feed/posts/rss?source_id=646357622673671265&curation_url=true`; the status code is `404` and content-type is `text/html; charset=UTF-8`
  • News
  • Twitter
  • Twilog
  • Scrapbox
  • Twitter log
  • Apple News
  • Mastodon log
  • coron news&archives
  • SNSNews
  • TechnoPlanet
  • iTech
  • ComputerJournal
  • Underground News
  • Last.fm
  • はてなブックマーク
  • Tumblr
  • ツイフィール
  • ウェブサイト利用規約
  • Google提供広告の広告設定
  • 他の広告のオプトアウト
  • Valuecommerce配信広告のオプトアウト
  • Zuck配信広告のオプトアウト
  • i-mobile配信広告のオプトアウト
  • Amazon.co.jpパーソナライズド広告の設定

What’s TechMedia

TechMediaはオープンRSS情報サイトです。世界中のウェブサイトから情報を収集し、検索のヒントになる情報を掲載しています。登録RSSの追加依頼はこちらから

TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close