Skip to content

TechMedia

Header Image
Category

HIGH

385 Posts

Featured

Posted byWpmaster
[Microsoft.NetCore.App.Runtime.win-arm] .NET Remote Code Execution Vulnerability
Posted byWpmaster
[github.com/traefik/traefik/v2] Traefik HTTP header parsing could cause a denial of service
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Exposure of Sensitive Information Through Metadata
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Insertion of Sensitive Information Into Sent Data

[pgadmin4] pgadmin4 vulnerable to Code Injection

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202212/20/2022

The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is fr…

[org.apache.cxf:cxf-core] Apache CXF Server-Side Request Forgery vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202212/14/2022

A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
Reference…

[rails-html-sanitizer] Inefficient Regular Expression Complexity in rails-html-sanitizer

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202201/07/2023

Summary
Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU r…

[loofah] Uncontrolled Recursion in Loofah

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202201/07/2023

Summary
Loofah >= 2.2.0, < 2.19.1 uses recursion for sanitizing CDATA sections, making it susceptible to stack exhaustion and raising a SystemStackError exception. This may lead to a denial of service through CPU resource consumption.
Mitigation…

[loofah] Inefficient Regular Expression Complexity in Loofah

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202201/07/2023

Summary
Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.
Mitigation
Up…

[typo3/cms] TYPO3 CMS vulnerable to Arbitrary Code Execution via Form Framework

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202212/15/2022

Problem
Due to the lack of separating user-submitted data from the internal configuration in the Form Designer backend module, it was possible to inject code instructions to be processed and executed via TypoScript as PHP code.
The existence of individ…

[org.codehaus.jettison:jettison] Jettison Out-of-bounds Write vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202201/04/2023

Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-45693
https://gi…

[org.codehaus.jettison:jettison] Jettison Out-of-bounds Write vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 12/14/202201/04/2023

A stack overflow in Jettison before v1.5.2 allows attackers to cause a Denial of Service (DoS) via crafted JSON data.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-45685
https://github.com/jettison-json/jettison/issues/54
https://lists.debian.o…

[mpl-bubblegum] Creator Verification Error when Bubblegum Activate

  • Posted inHIGH
  • Posted byWpmaster
  • 12/13/202212/13/2022

This was an error found by @metamania01 of the Audit Company Solshield.
It allowed one to verify a creator that did not sign by making use of a provision in Token Metadata that allows Creators who have signed compressed nfts to allow them to decompress…

[@cubejs-backend/api-gateway] @cubejs-backend/api-gateway row level security bypass

  • Posted inHIGH
  • Posted byWpmaster
  • 12/13/202212/13/2022

Impact
All authenticated Cube clients could bypass row-level security and run arbitrary SQL via the newly introduced /v1/sql-runner endpoint.
Patches
The change has been reverted in 0.31.24
Workarounds
Upgrade to >=0.31.24 or downgrade to <=0.31….

Posts navigation

Previous Posts 1 … 15 16 17 18 19 … 39 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close