Skip to content

Underground News

Header Image
Category

severity

65 Posts

Featured

Posted byGitHub
[@ckeditor/ckeditor5-markdown-gfm] CKEditor5 Cross-site scripting caused by the editor instance destroying process
Posted byGitHub
[drupal/core] Drupal core arbitrary PHP code execution
Posted byGitHub
[streamlit] Streamlit directory traversal vulnerability
Posted byGitHub
[org.postgresql:postgresql] PostgreSQL JDBC Driver SQL Injection in ResultSet.refreshRow() with malicious column names

[grapesjs] grapesjs before 0.19.5 vulnerable to Cross-site Scripting

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

The package grapesjs before 0.19.5 is vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-21802
https://github.com/artf/grapesjs/issues/44…

[fava] Fava time and filter parameters vulnerable to reflected XSS before v1.22

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected cross-site scripting due to the lack of escaping of error messages which contained the parameters in verbatim.
References

https://nvd.nist.gov/vuln/detail/CVE-2022-2514
…

[fava] Fava vulnerable to Reflected Cross-site Scripting before v1.22.2

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

Cross-site Scripting (XSS) – Reflected in GitHub repository beancount/fava prior to 1.22.2.
The query_string parameter of Fava is vulnerable to reflected cross-site scripting, for which a attacker can modify any information that the user is able to mod…

[ffmpeg-sdk] ffmpeg-sdk vulnerable to OS Command Injection

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

A command injection vulnerability affects all versions of package ffmpeg-sdk. The injection point is located in line 9 in index.js.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-28435
https://security.snyk.io/vuln/SNYK-JS-FFMPEGSDK-1050429
http…

[conf-cfg-ini] conf-cfg-ini Prototype Pollution via malicious INI file before v1.2.2

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/05/2022

This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.
Re…

[deferred-exec] deferred-exec Command Injection vulnerability

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

A command injection vulnerability affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js
References

https://nvd.nist.gov/vuln/detail/CVE-2020-28438
https://security.snyk.io/vuln/SNYK-JS-DEFERRE…

[git-archive] git-archive vulnerable to Command Injection via exports function

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

All versions of package git-archive are vulnerable to Command Injection via the exports function.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-28422
https://security.snyk.io/vuln/SNYK-JS-GITARCHIVE-1050391
https://github.com/advisories/GHSA-vq…

[google-cloudstorage-commands] google-cloudstorage-commands Command Injection vulnerability

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

A command injection vulnerability affects all versions of the deprecated package google-cloudstorage-commands.
References

https://nvd.nist.gov/vuln/detail/CVE-2020-28436
https://github.com/samradical/google-cloudstorage-commands/blob/master/index.js%2…

[node-import] node-import `params` argument can be controlled by users without any sanitization

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

This affects all versions of package node-import. The params argument of module function can be controlled by users without any sanitization. This is then provided to the “eval” function located in line 79 in the index file index.js.
References

https:…

[xopen] xopen is vulnerable to OS Command Injection in Exported Function xopen(filepath)

  • Posted inseverity
  • Posted byGitHub
  • 07/26/202208/06/2022

A command injection vulnerability affects all versions of package xopen. The injection point is located in line 14 in index.js in the exported function xopen(filepath).
References

https://nvd.nist.gov/vuln/detail/CVE-2020-28447
https://security.snyk.i…

Posts navigation

Previous Posts 1 2 3 4 5 6 7 Next Posts
Underground News
WordPress theme by componentz

Archives

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Hit enter to search or ESC to close