Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-273w-7fxj-pcp6: Moodle vulnerable to Uncontrolled Resource Consumption

In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service.

ghsa
#dos#git
GHSA-2563-fp9c-mgm8: Moodle Session Fixation vulnerability

In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.

GHSA-4rmj-w58m-fvch: Moodle vulnerable to Server-Side Request Forgery

In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk.

GHSA-hfxp-j95j-cwrp: uvdesk/community-skeleton vulnerable to Stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository uvdesk/community-skeleton prior to 1.1.0.

GHSA-qxpm-5ghc-6gc2: jeecg-boot contains SQL Injection vulnerability

jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.

GHSA-4jpv-8r57-pv7j: @nestjs/core vulnerable to Information Exposure via StreamableFile pipe

Versions of the package @nestjs/core before 9.0.5 are vulnerable to Information Exposure via the StreamableFile pipe. Exploiting this vulnerability is possible when the client cancels a request while it is streaming a StreamableFile, the stream wrapped by the StreamableFile will be kept open.

GHSA-6722-xvq8-3254: SketchSVG Arbitrary Code Injection vulnerability

All versions of the package sketchsvg are vulnerable to Arbitrary Code Injection when invoking `shell.exec` without sanitization nor parametrization while concatenating the current directory as part of the command string.

GHSA-5g97-whc9-8g7j: node-static and @nubosoftware/node-static vulnerable to Directory Traversal

node-static and the fork @nubosoftware/node-static are vulnerable to Directory Traversal due to improper file path sanitization in the startsWith() method in the servePath function.

GHSA-rmhg-2cvv-q7vx: dot-lens vulnerable to Prototype Pollution

All versions of the package dot-lens are vulnerable to Prototype Pollution via the `set()` function in `index.js` file.

GHSA-67j4-2mh6-8627: json-logic-js Command Injection vulnerability

A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability.