Page 15 of 184 results (0.004 seconds)

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 1

Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a sandbox escape vulnerability may lead to post-authentication Remote Code execution. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063. Eclipse Keti es un servicio que fue diseñado para proteger la API RESTfuls usando el Control de Acceso Basado en Atributos (ABAC). • https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti • CWE-693: Protection Mechanism Failure •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 1

Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a user able to create Policy Sets can run arbitrary code by sending malicious Groovy scripts which will escape the configured Groovy sandbox. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063. Eclipse Keti es un servicio que fue diseñado para proteger la API RESTfuls usando el Control de Acceso Basado en Atributos (ABAC). • https://securitylab.github.com/advisories/GHSL-2021-063-eclipse-keti • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default. En Eclipse Theia versiones 0.1.1 hasta 0.2.0, es posible explotar la build predeterminada para obtener una ejecución de código remota (y XXE) por medio de la extensión theia-xml-extension. Esta extensión utiliza lsp4xml (recientemente renombrado a LemMinX) para proporcionar soporte de lenguaje para XML. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=563174 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.. En Eclipse Theia versiones 0.3.9 a 1.8.1, la extensión "mini-browser" permite al usuario previsualizar archivos HTML en un iframe dentro del IDE. Pero con la forma en que está hecha es posible para un archivo HTML previsualizado desencadenar un RCE. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018 • CWE-346: Origin Validation Error CWE-942: Permissive Cross-domain Policy with Untrusted Domains •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 1

In Eclipse Mosquitto versions 2.0 to 2.0.11, when using the dynamic security plugin, if the ability for a client to make subscriptions on a topic is revoked when a durable client is offline, then existing subscriptions for that client are not revoked. En Eclipse Mosquitto versiones 2.0 hasta 2.0.11, cuando se usa el plugin de seguridad dinámica, si se revoca la habilidad de un cliente para realizar suscripciones en un tema cuando un cliente duradero está fuera de línea, las suscripciones existentes para ese cliente no son revocadas. • https://bugs.eclipse.org/bugs/show_bug.cgi?id=575324 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4WWGVF5BUFPYPCFUPPP4KRIYI5OTJN2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLUUM52Y6AEICPXPSRRXC6OBY4H5XKW7 https://www.debian.org/security/2023/dsa-5511 • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •