Security
Headlines
HeadlinesLatestCVEs

Tag

#java

CVE-2021-4326: GitHub - zowe/imperative: Imperative CLI Framework

A vulnerability in Imperative framework which allows already-privileged local actors to execute arbitrary shell commands via plugin install/update commands, or maliciously formed environment variables. Impacts Zowe CLI.

CVE
#vulnerability#web#windows#nodejs#js#git#java#auth
CVE-2022-37936

Unauthenticated Java deserialization vulnerability in Serviceguard Manager

CVE-2022-41727

An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.

CVE-2022-41723

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

WordPress Real Estate 7 Theme 3.3.4 Cross Site Scripting

WordPress Real Estate 7 Theme versions 3.3.4 and below suffer from a cross site scripting vulnerability.

CVE-2023-0511: Downloads - BackStage

Relative Path Traversal vulnerability in ForgeRock Access Management Java Policy Agent allows Authentication Bypass.This issue affects Access Management Java Policy Agent: from 1.0.0 through 5.10.1.

CVE-2022-20455: Android Security Bulletin—February 2023

In addAutomaticZenRule of ZenModeHelper.java, there is a possible persistent denial of service due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242537431

Red Hat Security Advisory 2023-0958-01

Red Hat Security Advisory 2023-0958-01 - Vim is an updated and improved version of the vi editor.

CVE-2023-25266: Using 0days to Protect the United Nations

An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).