Security
Headlines
HeadlinesLatestCVEs

Tag

#google

CVE-2021-45744: GitHub - plsanu/Bludit-3.13.1-TAGS-Field-Stored-Cross-Site-Scripting-XSS: Bludit 3.13.1 - TAGS Field Stored Cross Site Scripting (XSS)

A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel.

CVE
#xss#vulnerability#web#windows#google#git#java
CVE-2022-0121: Exposure of Sensitive Information to an Unauthorized Actor in hoppscotch

hoppscotch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor

CVE-2021-39143: Build software better, together

Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.

CVE-2021-45980: Security Bulletins | Foxit Software

Foxit PDF Reader and PDF Editor before 11.1 on macOS allow remote attackers to execute arbitrary code via getURL in the JavaScript API.

CVE-2021-46109: ASUS – Google Drive

Invalid input sanitizing leads to reflected Cross Site Scripting (XSS) in ASUS RT-AC52U_B1 3.0.0.4.380.10931 can lead to a user session hijack.

CVE-2021-25022: Changeset 2635585 for updraftplus – WordPress Plugin Repository

The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.16.66 does not sanitise and escape the backup_timestamp and job_id parameter before outputting then back in admin pages, leading to Reflected Cross-Site Scripting issues

CVE-2021-25021

The OMGF | Host Google Fonts Locally WordPress plugin before 4.5.12 does not validate the cache directory setting, allowing high privilege users to use a path traversal vector and delete arbitrary folders when uninstalling the plugin