Security Vulnerabilities
- CVEs Published In August 2022
Mealie1.0.0beta3 does not terminate download tokens after a user logs out, allowing attackers to perform a man-in-the-middle attack via a crafted GET request.
Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0.
A Java Deserialization vulnerability in the Fishbowl Server in Fishbowl Inventory before 2022.4.1 allows remote attackers to execute arbitrary code via a crafted XML payload.
Use After Free in GitHub repository vim/vim prior to 9.0.0225.
In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality.
In Jellyfin before 10.8, stored XSS allows theft of an admin access token.
Kiosk breakout (without quit password) in Safe Exam Browser (Windows) <3.4.0, which allows an attacker to achieve code execution via the browsers' print dialog.
A vulnerability, which was classified as critical, was found in Laravel 5.1. Affected is an unknown function. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-206688.
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service via the package upload function.
In affected versions of Octopus Deploy it is possible to perform a Regex Denial of Service using the Variable Project Template.