Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-m973-4vpc-x43c: Graphite Web Cross-site Scripting vulnerability

A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 2f178f490e10efc03cd1d27c72f64ecab224eb23. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216744.

ghsa
#xss#vulnerability#web#git
GHSA-8h43-xg5g-9cj7: Microweber vulnerable to unrestricted malicious uploads

Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber. There has been a fix in commit 0d279ac81052ce7ee97c18c811a9b8e912189da0 that has not been released into main yet. It can be found on the dev branch.

GHSA-f5h9-qx38-2hgp: AWS SDK is vulnerable to server-side request forgery (SSRF)

A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 can address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability.

GHSA-h5wp-jrqc-cwwx: rdiffweb vulnerable to Open Redirect

Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.

GHSA-m8r9-qxx8-mrxp: rdiffweb Improper Access Control vulnerability

Improper Access Control in GitHub repository ikus060/rdiffweb prior to 2.5.5.

GHSA-v92p-phmp-xffr: usememos/memos vulnerable to stored Cross-site Scripting

Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.

GHSA-83pm-7v48-5jp4: rdiffweb vulnerable to Special Element Injection

In rdiffweb prior to 2.5.5, lack of sanitisation of characters in SSH key name could allow attacker to inject a hyperlink injection that could allow attacker to redirect victim to malicious websites.

GHSA-wf33-6x33-wcf9: rdiffweb vulnerable to Authentication Bypass by Primary Weakness

In rdiffweb prior to 2.5.5, the username field is not unique to users. This allows exploitation of primary key logic by creating the same name with different combinations & may allow unauthorized access.

GHSA-2wpw-cm9w-v4xm: rdiffweb vulnerable to Business Logic Errors

Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.5.

GHSA-7q4r-x5qg-mmcp: rdiffweb has no rate limit on resend email feature

rdiffweb prior to 2.5.5 has no rate limit on the "resend email feature" while enable or disable 2FA from `/prefs/mfa` endpoint .