Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-chw4-88xc-79w6: Froxlor vulnerable to Improper Restriction of Excessive Authentication Attempts

Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20.

ghsa
#git#auth
GHSA-ghqq-jfx7-f6m9: Froxlor vulnerable to Path Traversal

Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20.

GHSA-5h3x-9wvq-w4m2: OpenZeppelin Contracts's governor proposal creation may be blocked by frontrunning

### Impact By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. ### Patches The problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. ### Workarounds Submit the proposal creation transaction to an endpoint with frontrunning protection. ### Credit Reported by Lior Abadi and Joaquin Pereyra from Coinspect. ### References https://www.coinspect.com/openzeppelin-governor-dos/

GHSA-g3hh-q55f-9g3w: RuoYi Uncontrolled Resource Consumption vulnerability

A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability.

GHSA-c29g-q3h3-mwcf: xxl-rpc deserialization vulnerability

xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component `com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode`.

GHSA-v3v9-3jf4-5pxx: Jeecg P3 Biz Chat allows remote attackers to read arbitrary files

Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.

GHSA-fqcv-rfp6-wv92: Microweber Cross-site Scripting vulnerability

Microweber 1.3.4 and prior is vulnerable to stored cross-site scripting via an alert on the `Editing` page. This issue is fixed in commit 42efa981a2239d042d910069952d6276497bdcf1.

GHSA-hh54-53m7-7ffj: alist Incorrect Access Control vulnerability

alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.

GHSA-x2w4-c67p-g44j: Grafana Missing Synchronization vulnerability

Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.

GHSA-wm7r-3qxj-5xgq: Grafana Improper Access Control vulnerability

Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.