Security Vulnerabilities
- CVEs Published In December 2022
There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets).
A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987.
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
Improper Privilege Management in GitHub repository usememos/memos prior to 0.9.1.
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
Improper Access Control in GitHub repository usememos/memos prior to 0.9.1.
Authorization Bypass Through User-Controlled Key vulnerability in usememos usememos/memos.This issue affects usememos/memos before 0.9.1.
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
Insufficient Granularity of Access Control in GitHub repository usememos/memos prior to 0.9.1.