Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-rmj9-q58g-9qgg: go-unzip vulnerable to Path Traversal

Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.

ghsa
#git
GHSA-6q6q-88xp-6f2r: yaml package for Go can consume excessive amounts of CPU or memory

Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.

GHSA-6vm3-jj99-7229: Gin's default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines

Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.

GHSA-q99p-78hp-xg5c: Graphite Web Cross-site Scripting vulnerability

A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216743.

GHSA-3c5x-4hvx-qrrr: Graphite Web Cross-site Scripting vulnerability

A vulnerability has been found in Graphite Web and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. VDB-216742 is the identifier assigned to this vulnerability.

GHSA-m973-4vpc-x43c: Graphite Web Cross-site Scripting vulnerability

A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744.

GHSA-8h43-xg5g-9cj7: Microweber vulnerable to unrestricted malicious uploads

Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber. There has been a fix in commit 0d279ac81052ce7ee97c18c811a9b8e912189da0 that has not been released into main yet. It can be found on the dev branch.

GHSA-f5h9-qx38-2hgp: AWS SDK is vulnerable to server-side request forgery (SSRF)

A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 can address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability.

GHSA-h5wp-jrqc-cwwx: rdiffweb vulnerable to Open Redirect

Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.

GHSA-m8r9-qxx8-mrxp: rdiffweb Improper Access Control vulnerability

Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5.