Skip to content

TechMedia

Header Image
Category

LOW

79 Posts

Featured

Posted byWpmaster
[safeurl-python] Withdrawn: safeurl-python contains Server-Side Request Forgery
Posted byWpmaster
[org.jenkins-ci.plugins:github-pr-coverage-status] Plaintext storage of Access Token in Jenkins GitHub Pull Request Coverage Status Plugin
Posted byWpmaster
[shopware/platform] Shopware’s log module vulnerable to Improper Output Neutralization
Posted byWpmaster
[rack] Denial of Service Vulnerability in Rack Content-Disposition parsing

[mpxj] Temporary File Information Disclosure vulnerability in MPXJ

  • Posted inLOW
  • Posted byWpmaster
  • 11/29/202212/08/2022

Impact
On Unix-like operating systems (not Windows or macos), MPXJ’s use of File.createTempFile(..) results in temporary files being created with the permissions -rw-r–r–. This means that any other user on the system can read the contents of this fil…

[decode-uri-component] decode-uri-component vulnerable to Denial of Service (DoS)

  • Posted inLOW
  • Posted byWpmaster
  • 11/29/202212/02/2022

decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-38900
https://github.com/SamVerschueren/decode-uri-component/issues/5
https://github.com/sindresorhus/query-st…

[tailscale.com/cmd] Tailscale daemon is vulnerable to information disclosure via CSRF

  • Posted inLOW
  • Posted byWpmaster
  • 11/22/202212/02/2022

A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables.
Affected platforms: All
Patched Tailscale client versions: v1.32.3 or later, v1.33.2…

[dalli] Unsanitized input leading to code injection in Dalli

  • Posted inLOW
  • Posted byWpmaster
  • 11/20/202211/27/2022

A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the publi…

[Tauri] Tauri Filesystem Scope can be Partially Bypassed

  • Posted inLOW
  • Posted byWpmaster
  • 11/09/202211/12/2022

Impact
Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it was possible to partially bypass the fs scope definition. It was not possible to traverse into arbitrary paths, as the issu…

[fluentd] fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)

  • Posted inLOW
  • Posted byWpmaster
  • 11/03/202211/08/2022

Impact
A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads.
Fluentd setups are only affected if the environment variable FL…

[actionpack] Cross-site Scripting in actionpack

  • Posted inLOW
  • Posted byWpmaster
  • 10/27/202210/29/2022

actionpack from the Ruby on Rails project is vulnerable to Cross-site Scripting in the Route Error Page. This issue has been patched with this commit. There are no known workarounds for this issue.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-…

[org.jenkins-ci.plugins:cons3rt] API token stored in plain text by Jenkins CONS3RT Plugin

  • Posted inLOW
  • Posted byWpmaster
  • 09/22/202212/15/2022

CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller as part of its configuration.
This API token can be viewed by users with access to the Jenkins controller file system.
References

h…

[org.jenkins-ci.plugins:http_request] Jenkins HTTP Request Plugin stores HTTP Request passwords unencrypted

  • Posted inLOW
  • Posted byWpmaster
  • 07/28/202212/10/2022

HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file jenkins.plugins.http_request.HttpRequest.xml on the Jenkins controller as part of its configuration when using (deprecated) Basic/Digest Aut…

[org.jenkins-ci.plugins:hpe-network-virtualization] Passwords stored in plain text by Jenkins hpe-network-virtualization plugin

  • Posted inLOW
  • Posted byWpmaster
  • 07/01/202212/10/2022

hpe-network-virtualization Plugin 1.0 stores passwords unencrypted in its global configuration file org.jenkinsci.plugins.nvemulation.plugin.NvEmulationBuilder.xml on the Jenkins controller as part of its configuration.
These passwords can be viewed by…

Posts navigation

Previous Posts 1 2 3 4 5 … 8 Next Posts
TechMedia
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close