Skip to content

Underground News

Header Image
Category

HIGH

16 Posts

Featured

Posted byGitHub
[github.com/sigstore/cosign] cosign’s `cosign verify-attestaton –type` can report a false positive if any attestation exists
Posted byGitHub
[github.com/sigstore/policy-controller] PolicyController before 0.2.1 may bypass attestation verification
Posted byGitHub
[nbconvert] nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths
Posted byGitHub
[github.com/graphql-go/graphql] graphql-go through 0.8.0 has infinite recursion in the type definition parser

[com.compuware.jenkins:compuware-zadviser-api] Jenkins Compuware zAdviser API Plugin before 1.0.4 vulnerable to protection mechanism failure

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

Jenkins Compuware zAdviser API Plugin 1.0.3 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
References

https://nvd.nist.gov/vuln/de…

[org.jenkins-ci.plugins:coverity] Jenkins Coverity Plugin is missing authorization, leading to Credential Capture

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentia…

[org.jenkins-ci.plugins:coverity] Jenkins Coverity Plugin vulnerable to cross-site request forgery (CSRF)

  • Posted inHIGH
  • Posted byGitHub
  • 07/28/202208/11/2022

A cross-site request forgery (CSRF) vulnerability in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials sto…

[tzinfo] TZInfo relative path traversal vulnerability allows loading of arbitrary files

  • Posted inHIGH
  • Posted byGitHub
  • 07/22/202208/11/2022

Impact
Affected versions

0.3.60 and earlier.
1.0.0 to 1.2.9 when used with the Ruby data source (tzinfo-data).

Vulnerability
With the Ruby data source (the tzinfo-data gem for tzinfo version 1.0.0 and later and built-in to earlier versions), time zon…

[pyspark] Apache Spark UI code path in HttpSecurityFilter can allow impersonation if ACLs enabled

  • Posted inHIGH
  • Posted byGitHub
  • 07/19/202208/11/2022

The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code pa…

[System.ServiceModel.Security] Improper Certificate Validation in Microsoft .NET Framework components

  • Posted inHIGH
  • Posted byGitHub
  • 10/17/201808/11/2022

Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka “.NET Security Fe…

Posts navigation

Previous Posts 1 2
Underground News
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close