Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-88v8-v46g-6c9w: Servst vulnerable to Path Traversal

Versions of the package servst before 2.0.3 are vulnerable to Directory Traversal due to improper sanitization of the filePath variable.

ghsa
#git
GHSA-mf6x-hrgr-658f: Eta vulnerable to Code Injection via templates rendered with user-defined data

Versions of the package eta before 2.0.0 are vulnerable to Remote Code Execution (RCE) by overwriting template engine configuration variables with view options received from The Express render API. **Note:** This is exploitable only for users who are rendering templates with user-defined data.

GHSA-w7w4-qjgg-372x: Froxlor contains Static Code Injection

Static Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.

GHSA-vqqm-c9gx-773q: Froxlor contains Business Logic Errors

Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.

GHSA-3chw-8jq2-w769: Froxlor contains Unchecked Error Condition

Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10.

GHSA-g7gf-2rqw-5rwx: Publify contains Weak Password Requirements

Weak Password Requirements in GitHub repository publify/publify prior to 9.2.10.

GHSA-36fh-84j7-cv5h: JSZip contains Path Traversal via loadAsync

loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.

GHSA-pm72-27mg-fc28: Froxlor contains Weak Password Requirements

Weak Password Requirements in GitHub repository froxlor/froxlor prior to 2.0.10.

GHSA-9mq4-9556-6qxq: NYUCCL psiTurk vulnerable to Improper Neutralization of Special Elements

A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676.

GHSA-fw3g-2h3j-qmm7: Improper neutralization of `noscript` element content may allow XSS in Sanitize

### Impact Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize `>= 5.0.0, < 6.0.1` when Sanitize is configured with a custom allowlist that allows `noscript` elements. This could result in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. Sanitize's default configs don't allow `noscript` elements and are not vulnerable. This issue only affects users who are using a custom config that adds `noscript` to the element allowlist. ### Patches Sanitize `>= 6.0.1` always removes `noscript` elements and their contents, even when `noscript` is in the allowlist. ### Workarounds Users who are unable to upgrade can prevent this issue by using one of Sanitize's default configs or by ensuring that their custom config does not include `noscript` in the element allowlist. ### Details The root cause of this issue is that HTML parsing rules treat the contents of a `noscript` element differently depending on ...