Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-5j2g-3ph4-rgvm: Fix for authenticated remote code execution through layout update

### Impact A layout block was able to bypass the block blacklist to execute remote code.

ghsa
#git#rce#auth
GHSA-x477-fq37-q5wr: Initial debug-host handler implementation could leak information and facilitate denial of service

### Impact version 1.5.0 and 1.6.0 when using the new `debug-host` feature could expose unnecessary information about the host ### Patches Use 1.6.1 or newer ### Workarounds Downgrade to 1.4.0 or set `debug-host` to empty ### References https://github.com/fortio/proxy/pull/38 Q&A https://github.com/fortio/proxy/discussions

GHSA-3p73-mm7v-4f6m: DoS vulnerability in MaliciousCode filter

### Impact Infinite loop in malicious code filter in certain conditions. ### Workarounds None

GHSA-5vpv-xmcj-9q85: Fix for arbitrary file deletion in customer media allows for remote code execution

### Impact Magento admin users with access to the customer media could execute code on the server.

GHSA-c9q3-r4rv-mjm7: Fix for arbitrary command execution in custom layout update through blocks

### Impact Custom Layout enabled admin users to execute arbitrary commands via block methods.

GHSA-jm3m-wr3p-hjrq: Cross-site Scripting in modoboa

Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.

GHSA-c467-5c2g-jp86: Cross-site Scripting in modoboa

Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.

GHSA-wcm6-wv95-7jw6: Cross-site Scripting in pyload-ng

Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.

GHSA-8v53-23mx-hcf9: Improper Certificate Validation in pyload-ng

Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44.

GHSA-6325-6g32-7p35: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution

flash_tool Gem for Ruby contains a flaw that is triggered during the handling of downloaded files that contain shell characters. With a specially crafted file, a context-dependent attacker can execute arbitrary commands.