Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-c467-5c2g-jp86: Cross-site Scripting in modoboa

Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.

ghsa
#xss#git
GHSA-wcm6-wv95-7jw6: Cross-site Scripting in pyload-ng

Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.

GHSA-6325-6g32-7p35: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution

flash_tool Gem for Ruby contains a flaw that is triggered during the handling of downloaded files that contain shell characters. With a specially crafted file, a context-dependent attacker can execute arbitrary commands.

GHSA-746g-3gfp-hfhw: Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie

Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

GHSA-88p8-4vv5-82j7: xaviershay-dm-rails Gem for Ruby exposes sensitive information via the process table

xaviershay-dm-rails Gem for Ruby contains a flaw in the `execute()` function in `/datamapper/dm-rails/blob/master/lib/dm-rails/storage.rb`. The issue is due to the function exposing sensitive information via the process table. This may allow a local attack to gain access to MySQL credential information.

GHSA-4jqw-vfmj-9rmh: Cross-site Scripting in yapi-vendor

Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.

GHSA-5qq4-m6c3-xxmf: Directory Traversal vulnerability in serve-lite

All versions of the package serve-lite are vulnerable to Directory Traversal due to missing input sanitization or other checks and protections employed to the req.url passed as-is to path.join().

GHSA-69f2-4375-qv9h: Command injection in smartctl

All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.

GHSA-9w5j-4mwv-2wj8: Remote code execution in simple-git

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of CVE-2022-25912.

GHSA-8m9f-c5p9-wqch: Remote Code Execution in com.bstek.uflo:uflo-core

All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation.