Skip to content
  • coron
  • coron

Gadget Gate

Header Image
Author

GitHub

589 Posts

Featured

Posted byGitHub
[semantic-release] Exposure of Sensitive Information to an Unauthorized Actor in semantic-release
Posted byGitHub
[cookiecutter] OS Command Injection in cookiecutter
Posted byGitHub
[mechanize] Authorization header leak on port redirect in mechanize
Posted byGitHub
[guzzlehttp/guzzle] Failure to strip the Cookie header on change in host or HTTP downgrade

[matrix-org-irc] Improper handling of multiline messages in node-irc

  • Posted inUncategorized
  • Posted byGitHub
  • 05/06/202205/11/2022

node-irc is a socket wrapper for the IRC protocol that extends Node.js’ EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling…

[keylime] Tenant and Verifier might not use the same registrar data

  • Posted inUncategorized
  • Posted byGitHub
  • 05/06/202205/06/2022

Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM t…

[facturascripts/facturascripts] Cross-site Scripting in FacturaScripts

  • Posted inUncategorized
  • Posted byGitHub
  • 05/05/202205/25/2022

FacturaScripts versions 2022.06 and prior are vulnerable to reflected cross-site scripting attacks. This vulnerability can use arbitrarily executed javascript code to steal users’ cookies, perform HTTP request, get content of same origin page, etc. A f…

[microweber/microweber] Microweber vulnerable to cross-site scripting (XSS)

  • Posted inUncategorized
  • Posted byGitHub
  • 05/05/202205/06/2022

Microweber is a drag and drop website builder and a powerful next generation CMS. Microweber versions 1.2.15 and prior are vulnerable to cross-site scripting. This could lead to injection of arbitrary JaveScript code, defacement of a page, or stealing …

[microweber/microweber] Cross-site Scripting in Microweber

  • Posted inUncategorized
  • Posted byGitHub
  • 05/05/202205/25/2022

Microweber prior to version 1.2.16 is vulnerable to cross-site scripting. This vulnerability allows an attacker to execute JavaScript as the victim.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-1584
https://github.com/microweber/microweber/com…

[jquery.json-viewer] Cross-site Scripting in jquery.json-viewer

  • Posted inUncategorized
  • Posted byGitHub
  • 05/05/202205/24/2022

The jquery.json-viewer library before version 1.5.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-30241
https://github.com/abode…

[parse-server] Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter

  • Posted inUncategorized
  • Posted byGitHub
  • 05/05/202205/14/2022

Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding add…

[github.com/fluxcd/flux2] Improper path handling in kustomization files allows path traversal

  • Posted inUncategorized
  • Posted byGitHub
  • 05/05/202205/06/2022

The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted kustomization.yaml to expose sensitive data from the con…

[scout-browser] Path Traversal in scout-browser

  • Posted inUncategorized
  • Posted byGitHub
  • 05/04/202205/19/2022

Scout is a Variant Call Format (VCF) visualization interface. The Pypi package scout-browser is vulnerable to path traversal due to send_file call in versions prior to 4.52.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-1554
https://github.com/…

[strapi] Insecure password handling vulnerability in Strapi

  • Posted inUncategorized
  • Posted byGitHub
  • 05/04/202205/19/2022

Storing passwords in a recoverable format in the DOCUMENTATION plugin component of Strapi before 3.6.9 and 4.x before 4.1.5 allows an attacker to access a victim’s HTTP request. From this, the attacker can get the victim’s cookie, base64 decode it, and…

Posts navigation

Previous Posts 1 … 24 25 26 27 28 … 59 Next Posts
Gadget Gate
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close