Skip to content

TechMedia

Header Image
Category

HIGH

385 Posts

Featured

Posted byWpmaster
[Microsoft.NetCore.App.Runtime.win-arm] .NET Remote Code Execution Vulnerability
Posted byWpmaster
[github.com/traefik/traefik/v2] Traefik HTTP header parsing could cause a denial of service
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Exposure of Sensitive Information Through Metadata
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Insertion of Sensitive Information Into Sent Data

[easy-static-server] easy-static-server vulnerable to Directory Traversal

  • Posted inHIGH
  • Posted byWpmaster
  • 12/20/202212/28/2022

All versions of package easy-static-server are vulnerable to Directory Traversal due to missing input sanitization and sandboxes being employed to the req.url user input that is passed to the server code.
References

https://nvd.nist.gov/vuln/detail/CV…

[safe-eval] safe-eval vulnerable to Prototype Pollution

  • Posted inHIGH
  • Posted byWpmaster
  • 12/20/202212/21/2022

All versions of package safe-eval are vulnerable to Prototype Pollution which allows an attacker to add or modify properties of the Object.prototype.Consolidate when using the function safeEval. This is because the function uses vm variable, leading an…

[io.apiman:apiman-manager-api-rest-impl] Apiman has insufficient checks for read permissions

  • Posted inHIGH
  • Posted byWpmaster
  • 12/20/202212/21/2022

Apiman 1.5.7 through 2.2.3.Final has insufficient checks for read permissions within the Apiman Manager REST API. A malicious user may be able to find and subscribe to private APIs they do not have permission for, thus accessing API Management-protecte…

[knex] Knex.js has a limited SQL injection vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/19/202201/11/2023

Knex Knex.js through 2.3.0 has a limited SQL injection vulnerability that can be exploited to ignore the WHERE clause of a SQL query. This vulnerability has been fixed in version 2.4.0.
References

https://nvd.nist.gov/vuln/detail/CVE-2016-20018
https:…

[active_attr] active_attr Improper Resource Shutdown or Release vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/19/202201/11/2023

A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.3. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument …

[ubi-reader] UBI Reader vulnerable to Path Traversal

  • Posted inHIGH
  • Posted byWpmaster
  • 12/17/202212/23/2022

A vulnerability, which was classified as problematic, has been found in UBI Reader up to 0.8.0. Affected by this issue is the function ubireader_extract_files of the file ubireader/ubifs/output.py of the component UBIFS File Handler. The manipulation l…

[org.apache.bookkeeper:bookkeeper-common] Apache Bookkeeper vulnerable to Improper Certificate Validation

  • Posted inHIGH
  • Posted byWpmaster
  • 12/16/202212/16/2022

The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affec…

[cycle-import-check] cycle-import-check vulnerable to Command Injection

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202212/15/2022

The package cycle-import-check before version 1.3.2 is vulnerable to Command Injection via the writeFileToTmpDirAndOpenIt function due to improper user-input sanitization.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-24377
https://github.com/S…

[Microsoft.WindowsDesktop.App.Runtime.win-x64] .NET Framework Remote Code Execution Vulnerability.

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202201/07/2023

.NET Framework Remote Code Execution Vulnerability.
Dupe of GHSA-2c7v-qcjp-4mg2
References

https://nvd.nist.gov/vuln/detail/CVE-2022-41089
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41089
https://github.com/advisories…

[org.keycloak:keycloak-parent] Keycloak vulnerable to path traversal via double URL encoding

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202212/14/2022

Keycloak does not properly validate URLs included in a redirect. An attacker could construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain, or possibly conduct further attacks.
Re…

Posts navigation

Previous Posts 1 … 14 15 16 17 18 … 39 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close