Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-vmxg-wx6c-4f3r: Admidio Improper Access Control vulnerability

Admidio prior to 4.2.9 is vulnerable to Improper Access Control.

ghsa
#vulnerability#git
GHSA-hm75-8w6h-4f8f: Admidio Improper Neutralization of Formula Elements in a CSV File vulnerability

Admidio prior to 4.2.9 is vulnerable toImproper Neutralization of Formula Elements in a CSV File.

GHSA-hhqm-f4m4-pq39: RaspAP raspap-webgui Command Injection vulnerability

Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.

GHSA-pm73-x2h5-cmj3: Apache StreamPipes Improper Privilege Management vulnerability

A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles. The issue is resolved by upgrading to StreamPipes 0.92.0.

GHSA-49mv-vfcp-8gg9: Moodle vulnerable to SQL Injection

A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.

GHSA-w65q-jcmv-28gj: Dynamic Linq vulnerable to remote code execution

Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.

GHSA-xxp4-mf4h-6cwm: Moodle vulnerable to Server Side Request Forgery

An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.

GHSA-fwfj-8p36-rc64: Moodle vulnerable to Cross-site Scripting

Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.

GHSA-mpv3-g8m3-3fjc: Grafana vulnerable to Authentication Bypass by Spoofing

Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.

GHSA-g753-ghr7-q33w: cyfs-base vulnerable to misaligned pointer dereference in `ChunkId::new`

The function `ChunkId::new` creates a misaligned pointer by casting mutable pointer of `u8` slice which has alignment 1 to the mutable pointer of `u32` which has alignment 4, and dereference the misaligned pointer leading UB, which should not be allowed in safe function.