Skip to content

TechMedia

Header Image
Category

HIGH

385 Posts

Featured

Posted byWpmaster
[Microsoft.NetCore.App.Runtime.win-arm] .NET Remote Code Execution Vulnerability
Posted byWpmaster
[github.com/traefik/traefik/v2] Traefik HTTP header parsing could cause a denial of service
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Exposure of Sensitive Information Through Metadata
Posted byWpmaster
[github.com/answerdev/answer] Answer vulnerable to Insertion of Sensitive Information Into Sent Data

[kubevirt.io/kubevirt] KubeVirt vulnerable to arbitrary file read on host

  • Posted inHIGH
  • Posted byWpmaster
  • 09/15/202204/11/2023

Impact
Users with the permission to create VMIs can construct VMI specs which allow them to read arbitrary files on the host. There are three main attack vectors:

Some path fields on the VMI spec were not properly validated and allowed passing in rela…

[golang.org/x/net/http2] golang.org/x/net/http2 Denial of Service vulnerability

  • Posted inHIGH
  • Posted byWpmaster
  • 09/07/202201/18/2023

In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-27…

[mongoose] automattic/mongoose vulnerable to Prototype pollution via Schema.path

  • Posted inHIGH
  • Posted byWpmaster
  • 07/29/202202/01/2023

Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment.\n\nAffected versions of this package are vulnerable to Prototype Pollution. The Schema.path() function is vulnerable to prototype pollution when setting the sch…

[eu.markov.jenkins.plugin.mvnmeta:maven-metadata-plugin] Stored XSS vulnerability in Jenkins Maven Metadata Plugin for Jenkins CI server plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 07/28/202212/13/2022

Maven Metadata Plugin for Jenkins CI server Plugin 2.2 and earlier does not perform URL validation for the Repository Base URL of List maven artifact versions parameters. This results in a stored cross-site scripting (XSS) vulnerability exploitable by …

[com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter] Stored XSS vulnerability in Jenkins Dynamic Extended Choice Parameter plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 07/28/202212/10/2022

Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permissio…

[org.jenkins-ci.plugins:plot] Cross-site Scripting in Jenkins Plot Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 07/01/202212/09/2022

Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-3478…

[hudson.plugins:project-inheritance] Jenkins Project Inheritance Plugin vulnerable to cross site scripting

  • Posted inHIGH
  • Posted byWpmaster
  • 07/01/202212/09/2022

Jenkins Project Inheritance Plugin 21.04.03 and earlier does not escape the reason a build is blocked in tooltips, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control the reason a queue item is blocked.
Refe…

[net.praqma:matrix-reloaded] Jenkins Matrix Reloaded Plugin vulnerable to Stored XSS

  • Posted inHIGH
  • Posted byWpmaster
  • 07/01/202212/09/2022

Jenkins Matrix Reloaded Plugin 1.1.3 and earlier does not escape the agent name in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
References

https://nvd.nist.gov/vuln/…

[org.jenkins-ci.main:jenkins-core] Cross-site Scripting vulnerability in Jenkins

  • Posted inHIGH
  • Posted byWpmaster
  • 06/24/202212/06/2022

Since Jenkins 2.321 and LTS 2.332.1, the HTML output generated for new symbol-based SVG icons includes the title attribute of l:ionicon until Jenkins 2.334 and alt attribute of l:icon since Jenkins 2.335 without further escaping.
This vulnerability is …

[org.jenkins-ci.plugins:junit] Cross-site Scripting in Jenkins JUnit Plugin

  • Posted inHIGH
  • Posted byWpmaster
  • 06/24/202212/15/2022

JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
JUnit Plugin 1119.1121.vc43d0fc45561 app…

Posts navigation

Previous Posts 1 … 23 24 25 26 27 … 39 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close