- CVE-2022-21404: Applications using Oracle Helidon versions 0.9.x, 0.10.x, 0.11.x, 1.0.x, 1.1.x, 1.2.x, 1.3.x, 1.4.x, 2.0.0-M1, 2.0.0-M2, 2.0.0-M3, 2.0.0-M4 and 2.0.0-RC1 are affected by a remote code execution vulnerability caused by insecure YAML deserialization when using the class UrlConfigSource for loading configuration files remotely.
- CVE-2022-23848: Alluxio 1.6, 1.7, 1.8, 2.0.x, 2.1.x, 2.2.x, 2.3.x and 2.4.x with remote logging enabled using Alluxio Logserver, are affected by a remote code execution vulnerability.
- CVE-2022-1415: A flaw was found where some utility classes in Drools core did not use proper safeguards when deserializing data. This flaw allows an authenticated attacker to construct malicious serialized objects (usually called gadgets) and achieve code execution on the server.
- PWN-2023-01: A vulnerability was discovered in Microsoft's DICOM implementation. No CVE was issued by Microsoft.
- PWN-2023-02: Path traversal & Code Execution in dlopen via environment variable discovered in several open source projects. See why a comparison between real user id and effective used if is not enough to prevent privilege escalation
-
Notifications
You must be signed in to change notification settings - Fork 0
cldrn/security-advisories
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
My security advisories
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published