Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-m54v-gv8p-9pqp: FeehiCMS Cross Site Scripting vulnerability

Cross Site Scripting (XSS) vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via the user name field of the login page.

ghsa
#xss#vulnerability#git
GHSA-67mh-hw8v-x8v9: FeehiCMS Unrestricted Upload vulnerability

File Upload vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via crafted image upload.

GHSA-gqgq-784q-v9xp: FeehiCMS Cross Site Scripting vulnerability

Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the title field of the create article page.

GHSA-8vjp-hfgh-68rj: FeehiCMS Cross Site Scripting vulnerability

Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbitrary code via the username field of the admin log in page.

GHSA-6vh6-72g6-xqx2: FeehiCMS Cross Site Scripting vulnerability

Cross Site Scripting (XSS) vulnerability in FeehiCMS-2.1.1 allows remote attackers to run arbirtary code via the callback parameter to /cms/notify.

GHSA-xv8h-43h9-v3jq: FeehiCMS Cross Site Scripting vulnerability

Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.1.1 allows remote attackers to run arbitrary code via upload of crafted XML file.

GHSA-gxq5-79m2-gvvq: Apache Bookkeeper vulnerable to Improper Certificate Validation

The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1.

GHSA-6jj8-mqx2-7fg5: FeehiCMS Cross Site Scripting vulnerability

Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.0.8 allows remote attackers to run arbitrary code via tha lang attribute of an html tag.

GHSA-p495-jxh2-wrfg: npm package rfc6902 vulnerable to Prototype Pollution

A vulnerability classified as problematic has been found in chbrown rfc6902. This affects an unknown part of the file pointer.ts. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The exploit has been disclosed to the public and may be used. The name of the patch is c006ce9faa43d31edb34924f1df7b79c137096cf. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215883.

GHSA-252h-2cmq-pmr6: easywebpack-cli Path Traversal vulnerability

Directory Traversal vulnerability in easywebpack-cli before 4.5.2 allows attackers to obtain sensitive information via crafted GET request.