Security
Headlines
HeadlinesLatestCVEs

Tag

#java

CVE-2021-23702: Prototype Pollution in object-extend | CVE-2021-23702 | Snyk

The package object-extend from 0.0.0 are vulnerable to Prototype Pollution via object-extend.

CVE
#vulnerability#dos#java
CVE-2021-46062: SSTI、Delete any file · Issue #59 · ming-soft/MCMS

MCMS v5.2.5 was discovered to contain an arbitrary file deletion vulnerability via the component oldFileName.

CVE-2021-46037: MCMS vulnerabilities

MCMS v5.2.4 was discovered to contain an arbitrary file deletion vulnerability via the component /template/unzip.do.

CVE-2022-0673: lemminx/CHANGELOG.md at master · eclipse/lemminx

A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files due to directory traversal.

CVE-2022-0671: vscode-xml/CHANGELOG.md at master · redhat-developer/vscode-xml

A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file.

CVE-2022-0451

Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.

CVE-2021-46372: Cross-site Scripting (XSS) - Stored in scoold

Scoold 1.47.2 is a Q&A/knowledge base platform written in Java. When writing a Q&A, the markdown editor is vulnerable to a XSS attack when using uppercase letters.

CVE-2022-22916: O2OA-POC/POC.md at main · wendell1224/O2OA-POC

O2OA v6.4.7 was discovered to contain a remote code execution (RCE) vulnerability via /x_program_center/jaxrs/invoke.

RHSA-2022:0580: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update for openshift-gitops-applicationset-container, openshift-gitops-container, openshift-gitops-kam-delivery-container, and openshift-gitops-operator-container is now available for Red Hat OpenShift GitOps 1.2. (GitOps v1.2.2) Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24348: gitops: Path traversal and dereference of symlinks when passing Helm value files

CVE-2022-22912: Prototype Pollution using .parse() · Issue #114 · TooTallNate/plist.js

Prototype pollution vulnerability via .parse() in Plist before v3.0.4 allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.