Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cldrn/security-advisories
My security advisories
https://github.com/cldrn/security-advisories
Last synced: about 1 month ago
JSON representation
My security advisories
- Host: GitHub
- URL: https://github.com/cldrn/security-advisories
- Owner: cldrn
- Created: 2022-01-29T23:34:46.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2024-01-29T03:46:29.000Z (10 months ago)
- Last Synced: 2024-01-30T03:51:21.690Z (10 months ago)
- Language: CodeQL
- Size: 779 KB
- Stars: 9
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# My latest public security advisories
- **CVE-2022-21404**: Applications using Oracle Helidon versions 0.9.x, 0.10.x, 0.11.x, 1.0.x, 1.1.x, 1.2.x, 1.3.x, 1.4.x, 2.0.0-M1, 2.0.0-M2, 2.0.0-M3, 2.0.0-M4 and 2.0.0-RC1 are affected by a remote code execution vulnerability caused by insecure YAML deserialization when using the class UrlConfigSource for loading configuration files remotely.
- **CVE-2022-23848**: Alluxio 1.6, 1.7, 1.8, 2.0.x, 2.1.x, 2.2.x, 2.3.x and 2.4.x with remote logging enabled using Alluxio Logserver, are affected by a remote code execution vulnerability.
- **CVE-2022-1415**: A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
- **PWN-2023-01**: A vulnerability was discovered in Microsoft's DICOM implementation. No CVE was issued by Microsoft.
- **PWN-2023-02**: Path traversal & Code Execution in dlopen via environment variable discovered in several open source projects. See [why a comparison between real user id and effective used if is not enough to prevent privilege escalation](https://websec.ca/publication/Blog/comparison-between-real-user-id-and-effective-user-id-is-not-enough-to-prevent-privilege-escalation)