Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-34w4-wrqp-j47g: Sensitive cookie in HTTPS session without 'Secure' attribute in thorsten/phpmyfaq

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1.

ghsa
#git#php
GHSA-prrv-r843-4p75: Cross-site Scripting (XSS) in thorsten/phpmyfaq

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

GHSA-f728-prhw-2g68: Insufficient Session Expiration in thorsten/phpmyfaq

Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

GHSA-4gpm-r23h-gprw: generator-jhipster allows a timing attack against validateToken due to a string comparison that stops at the first character

JHipster generator-jhipster before 2.23.0 allows a timing attack against validateToken due to a string comparison that stops at the first character that is different. Attackers can guess tokens by brute forcing one character at a time and observing the timing. This of course drastically reduces the search space to a linear amount of guesses based on the token length times the possible characters.

GHSA-g5hp-328h-jj98: phpMyFAQ Cross-site Scripting vulnerability

Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1.

GHSA-7q5f-29gx-57ff: Cross-site Scripting (XSS) in microweber/microweber

Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 2.0.

GHSA-j4vj-w5rj-8grw: phpMyFAQ Cross-site Scripting vulnerability

Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.

GHSA-q74f-rf27-8hxc: OpenCRX allows a remote attacker to execute arbitrary code via a crafted request

An issue in OpenCRX v.5.2.2 allows a remote attacker to execute arbitrary code via a crafted request.

GHSA-frgf-8jr5-j2jv: memory leak flaw was found in ruby-magick

A memory leak flaw was found in ruby-magick, an interface between Ruby and ImageMagick. This issue can lead to a denial of service (DOS) by memory exhaustion.

GHSA-4frv-5fj6-4p25: Duplicate Advisory: NATS.io: Adding accounts for just the system account adds auth bypass

## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-fr2g-9hjm-wr23. This link is maintained to preserve external references. ## Original Description NATS nats-server before 2.9.23 and 2.10.x before 2.10.2 has an authentication bypass. An implicit $G user in an authorization block can sometimes be used for unauthenticated access, even when the intention of the configuration was for each user to have an account. The earliest affected version is 2.2.0.