Security
Headlines
HeadlinesLatestCVEs

Tag

#js

CVE-2023-3208: vulhub/RoadFlow.md at master · yangxixx/vulhub

A vulnerability, which was classified as critical, has been found in RoadFlow Visual Process Engine .NET Core Mvc 2.13.3. Affected by this issue is some unknown functionality of the file /Log/Query?appid=0B736354-9473-4D66-B9C0-15CAC149EB05&tabid=tab_0B73635494734D66B9C015CAC149EB05 of the component Login. The manipulation of the argument sidx/sord leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231230 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE
#sql#vulnerability#windows#js#java#firefox
CVE-2023-35042: WPS Operations — GeoServer 2.23-SNAPSHOT User Manual

GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023.

GHSA-89qm-hm2x-mxm3: progressbar.js vulnerable to Prototype Pollution

All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js.

Oracle Weblogic PreAuth Remote Command Execution

Oracle Weblogic versions 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0 prior to the Jan 2023 security update are vulnerable to an unauthenticated remote code execution vulnerability due to a post deserialization vulnerability. This Metasploit module exploits this vulnerability to trigger the JNDI connection to a LDAP server you control. The LDAP server will then respond with a remote reference response that points to a HTTP server that you control, where the malicious Java class file will be hosted. Oracle Weblogic will then make an HTTP request to retrieve the malicious Java class file, at which point our HTTP server will serve up the malicious class file and Oracle Weblogic will instantiate an instance of that class, granting us remote code execution as the oracle user.

TerraMaster TOS 4.2.15 Remote Code Execution

This Metasploit module is a Terramaster chained exploit that performs session crafting to achieve escalated privileges that allows an attacker to access vulnerable code execution flaws. TOS versions 4.2.15 and below are affected.

Anevia Flamingo XL 3.2.9 Remote Root Jailbreak

Anevia Flamingo XL version 3.2.9 suffers from an SSH sandbox escape via the use of traceroute. A remote attacker can breakout of the restricted environment and have full root access to the device.

CVE-2023-26133: Snyk Vulnerability Database | Snyk

All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js.

KesionCMS X 9.5 Add Administrator

KesionCMS X version 9.5 suffers from an unauthenticated add administrator vulnerability.

GHSA-3w3w-pxmm-2w2j: crypto-js uses insecure random numbers

The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.

CVE-2020-36732: Security issue · Issue #254 · brix/crypto-js

The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.