In JetBrains TeamCity before 2023.11 stored XSS during restore from backup was possible
Source: JetBrains s.r.o.
Max CVSS
5.4
EPSS Score
0.04%
Published
2024-05-16
Updated
2024-05-16
In JetBrains TeamCity before 2024.03.1 commit status publisher didn't check project scope of the GitHub App token
Source: JetBrains s.r.o.
Max CVSS
5.5
EPSS Score
0.04%
Published
2024-05-16
Updated
2024-05-16
In JetBrains TeamCity between 2024.03 and 2024.03.1 several stored XSS in the available updates page were possible
Source: JetBrains s.r.o.
Max CVSS
3.5
EPSS Score
0.04%
Published
2024-05-16
Updated
2024-05-16
In JetBrains YouTrack before 2024.1.29548 the SMTPS protocol communication lacked proper certificate hostname validation
Source: JetBrains s.r.o.
Max CVSS
5.9
EPSS Score
0.04%
Published
2024-05-16
Updated
2024-05-16
Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, attackers who achieved Arbitrary Code Execution as the stalwart-mail user (including web interface admins) can gain complete root access to the system. Usually, system services are run as a separate user (not as root) to isolate an attacker with Arbitrary Code Execution to the current service. Therefore, other system services and the system itself remains protected in case of a successful attack. stalwart-mail runs as a separate user, but it can give itself full privileges again in a simple way, so this protection is practically ineffective. Server admins who handed out the admin credentials to the mail server, but didn't want to hand out complete root access to the system, as well as any attacked user when the attackers gained Arbitrary Code Execution using another vulnerability, may be vulnerable. Version 0.8.0 contains a patch for the issue.
Source: GitHub, Inc.
Max CVSS
9.1
EPSS Score
0.04%
Published
2024-05-16
Updated
2024-05-17
Minder is a software supply chain security platform. Prior to version 0.0.49, the Minder REST ingester is vulnerable to a denial of service attack via an attacker-controlled REST endpoint that can crash the Minder server. The REST ingester allows users to interact with REST endpoints to fetch data for rule evaluation. When fetching data with the REST ingester, Minder sends a request to an endpoint and will use the data from the body of the response as the data to evaluate against a certain rule. If the response is sufficiently large, it can drain memory on the machine and crash the Minder server. The attacker can control the remote REST endpoints that Minder sends requests to, and they can configure the remote REST endpoints to return responses with large bodies. They would then instruct Minder to send a request to their configured endpoint that would return the large response which would crash the Minder server. Version 0.0.49 fixes this issue.
Source: GitHub, Inc.
Max CVSS
5.3
EPSS Score
0.04%
Published
2024-05-16
Updated
2024-05-17
Paperless-ngx is a document management system that transforms physical documents into a searchable online archive. Starting in version 2.5.0 and prior to version 2.8.6, remote user authentication allows API access even if API access is explicitly disabled. Version 2.8.6 contains a patchc for the issue.
Source: GitHub, Inc.
Max CVSS
5.5
EPSS Score
0.05%
Published
2024-05-15
Updated
2024-05-16
wolfictl is a command line tool for working with Wolfi. A git authentication issue in versions prior to 0.16.10 allows a local user’s GitHub token to be sent to remote servers other than `github.com`. Most git-dependent functionality in wolfictl relies on its own `git` package, which contains centralized logic for implementing interactions with git repositories. Some of this functionality requires authentication in order to access private repositories. A central function `GetGitAuth` looks for a GitHub token in the environment variable `GITHUB_TOKEN` and returns it as an HTTP basic auth object to be used with the `github.com/go-git/go-git/v5` library. Most callers (direct or indirect) of `GetGitAuth` use the token to authenticate to github.com only; however, in some cases callers were passing this authentication without checking that the remote git repository was hosted on github.com. This behavior has existed in one form or another since commit 0d06e1578300327c212dda26a5ab31d09352b9d0 - committed January 25, 2023. This impacts anyone who ran the `wolfictl check update` commands with a Melange configuration that included a `git-checkout` directive step that referenced a git repository not hosted on github.com. This also impacts anyone who ran `wolfictl update <url>` with a remote URL outside of github.com. Additionally, these subcommands must have run with the `GITHUB_TOKEN` environment variable set to a valid GitHub token. Users should upgrade to version 0.16.10 to receive a patch.
Source: GitHub, Inc.
Max CVSS
4.4
EPSS Score
0.04%
Published
2024-05-15
Updated
2024-05-16
Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, when using `RUN_AS_USER`, the specified user (and therefore, web interface admins) can read arbitrary files as root. This issue affects admins who have set up to run stalwart with `RUN_AS_USER` who handed out admin credentials to the mail server but expect these to only grant access according to the `RUN_AS_USER` and are attacked where the attackers managed to achieve Arbitrary Code Execution using another vulnerability. Version 0.8.0 contains a patch for the issue.
Source: GitHub, Inc.
Max CVSS
6.8
EPSS Score
0.04%
Published
2024-05-15
Updated
2024-05-15
REXML is an XML toolkit for Ruby. The REXML gem before 3.2.6 has a denial of service vulnerability when it parses an XML that has many `<`s in an attribute value. Those who need to parse untrusted XMLs may be impacted to this vulnerability. The REXML gem 3.2.7 or later include the patch to fix this vulnerability. As a workaround, don't parse untrusted XMLs.
Source: GitHub, Inc.
Max CVSS
5.3
EPSS Score
0.05%
Published
2024-05-16
Updated
2024-05-17
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /homePro_deal.php?mudi=add&nohrefStr=close.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-15
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/homePro_deal.php?mudi=del&dataType=&dataTypeCN.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-15
Insecure Permissions vulnerability in VITEC AvediaServer (Model avsrv-m8105) 8.6.2-1 allows a remote attacker to escalate privileges via a crafted script.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-16
idccms V1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/tplSys_deal.php?mudi=area.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-16
Updated
2024-05-16
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/banner_deal.php?mudi=add
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-16
Updated
2024-05-16
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/sysImages_deal.php?mudi=infoSet.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-16
Updated
2024-05-16
Code-projects Budget Management 1.0 is vulnerable to SQL Injection via the delete parameter.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-15
Code-projects Budget Management 1.0 is vulnerable to Cross Site Scripting (XSS) via the budget parameter.
Source: MITRE
Max CVSS
N/A
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-15
An arbitrary file upload vulnerability in r-pan-scaffolding v5.0 and below allows attackers to execute arbitrary code via uploading a crafted PDF file.
Source: MITRE
Max CVSS
5.4
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-23
An arbitrary file upload vulnerability in KYKMS v1.0.1 and below allows attackers to execute arbitrary code via uploading a crafted PDF file.
Source: MITRE
Max CVSS
5.4
EPSS Score
N/A
Published
2024-05-15
Updated
2024-05-23
Toggle Search Form
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!