Security
Headlines
HeadlinesLatestCVEs

Tag

#git

CVE-2023-34917: Vulnerability Report - Unvalidated open redirection · Issue #3 · fuge/cms

Fuge CMS v1.0 contains an Open Redirect vulnerability in member/RegisterAct.java.

CVE
#vulnerability#js#git#java#auth#ssl
mRemoteNG 1.77.3.1784-NB Sensitive Information Extraction

mRemoteNG version 1.77.3.1784-NB exploit that extracts sensitive information that is stored in memory in the clear but encrypted at rest.

Debian Security Advisory 5461-1

Debian Linux Security Advisory 5461-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

GreenShot 1.2.10 Arbitrary Code Execution

GreenShot version 1.2.10 suffers from an insecure deserialization arbitrary code execution vulnerability.

Copyparty 1.8.2 Directory Traversal

Copyparty version 1.8.2 suffers from a directory traversal vulnerability.

Copyparty 1.8.6 Cross Site Scripting

Copyparty version 1.8.6 suffers from a cross site scripting vulnerability.

CVE-2023-38303: Webmin-2.021/CVE-2023-38303 at main · jaysharma786/Webmin-2.021

An issue was discovered in Webmin 2.021. One can exploit a stored Cross-Site Scripting (XSS) attack to achieve Remote Command Execution (RCE) through the Users and Group's real name parameter.

CVE-2023-38307: Webmin-2.021/CVE-2023-38307 at main · jaysharma786/Webmin-2.021

An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name.

CVE-2023-38308: Webmin-2.021/CVE-2023-38308 at main · jaysharma786/Webmin-2.021

An issue was discovered in Webmin 2.021. A Cross-Site Scripting (XSS) vulnerability was discovered in the HTTP Tunnel functionality when handling third-party domain URLs. By providing a crafted URL from a third-party domain, an attacker can inject malicious code. leading to the execution of arbitrary JavaScript code within the context of the victim's browser.