Security
Headlines
HeadlinesLatestCVEs

Tag

#redis

CVE-2020-26877: ApiFest :: Documentation

ApiFest OAuth 2.0 Server 0.3.1 does not validate the redirect URI in accordance with RFC 6749 and is susceptible to an open redirector attack. Specifically, it directly sends an authorization code to the redirect URI submitted with the authorization request, without checking whether the redirect URI is registered by the client who initiated the request. This allows an attacker to craft a request with a manipulated redirect URI (redirect_uri parameter), which is under the attacker's control, and consequently obtain the leaked authorization code when the server redirects the client to the manipulated redirect URI with an authorization code. NOTE: this is similar to CVE-2019-3778.

CVE
#apache#redis#java#oauth#auth#mongo
Red Hat Security Advisory 2022-5201-01

Red Hat Security Advisory 2022-5201-01 - Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which apply security fixes and fix several bugs. Issues addressed include a traversal vulnerability.

RHSA-2022:5201: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.4.5 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-43565: golang.org/x/crypto: empty plaintext packet causes panic * CVE-2022-21803: nconf: Prototype pollution in memory store * CVE-2022-23806: golang: crypto/elliptic IsOnCurve returns true for invalid field elements * CVE-2022-24450: nats-server: misusing the "dynamically provisioned sand...

CVE-2017-20101: Full Disclosure: ProjectSend r754 - IDOR & Authentication Bypass Vulnerability

A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.

CVE-2022-31016

Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and later are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the repo-server service, resulting in a Denial of Service. The attacker must be an authenticated Argo CD user authorized to deploy Applications from a repository which contains (or can be made to contain) a large file. The fix for this vulnerability is available in versions 2.3.5, 2.2.10, 2.1.16, and later. There are no known workarounds. Users are recommended to upgrade.

Backdoor.Win32.InfecDoor.17.c MVID-2022-0614 Insecure Permissions

Backdoor.Win32.InfecDoor.17.c malware suffers from an insecure permissions vulnerability.

Trojan-Mailfinder.Win32.VB.p MVID-2022-0616 Insecure Permissions

Trojan-Mailfinder.Win32.VB.p malware suffers from an insecure permissions vulnerability.

Backdoor.Win32.Shark.btu MVID-2022-0615 Insecure Permissions

Backdoor.Win32.Shark.btu malware suffers from an insecure permissions vulnerability.

Yashma Ransomware Builder 1.2 MVID-2022-0613 Insecure Permissions

Yashma Ransomware Builder version 1.2 malware suffers from an insecure permissions vulnerability.

CVE-2022-33105: Release 7.0.1 by oranagra · Pull Request #10829 · redis/redis

Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.