updated 4 days, 4 hours ago
by @fricklerhandwerkActivity log
Created automatic suggestion
4 days, 21 hours ago
@fricklerhandwerk
removed
2 packages
terraform-providers.icinga_icinga2
terraform-providers.icinga2
4 days, 13 hours ago
@fricklerhandwerkdismissed
4 days, 4 hours ago
Icinga has insecure permission of %ProgramData%\icinga2\var on Windows
Icinga 2 is an open source monitoring system. Starting in version 2.3.0 and prior to versions 2.13.14, 2.14.8, and 2.15.2, the Icinga 2 MSI did not set appropriate permissions for the `%ProgramData%\icinga2\var` folder on Windows. This resulted in the its contents - including the private key of the user and synced configuration - being readable by all local users. All installations on Windows are affected. Versions 2.13.14, 2.14.8, and 2.15.2 contains a fix. There are two possibilities to work around the issue without upgrading Icinga 2. Upgrade Icinga for Windows to at least version v1.13.4, v1.12.4, or v1.11.2. These version will automatically fix the ACLs for the Icinga 2 agent as well. Alternatively, manually update the ACL for the given folder `C:\ProgramData\icinga2\var` (and `C:\Program Files\WindowsPowerShell\modules\icinga-powershell-framework\certificate` to fix the issue for the Icinga for Windows as well) including every sub-folder and item to restrict access for general users, only allowing the Icinga service user and administrators access.
updated 1 week, 4 days ago
by @fricklerhandwerkActivity log
Created automatic suggestion
1 week, 4 days ago
@fricklerhandwerk
removed
3 packages
python313Packages.moonraker-api
python312Packages.moonraker-api
home-assistant-custom-components.moonraker
1 week, 4 days ago
@fricklerhandwerkdismissed
1 week, 4 days ago
Moonraker with LDAP Enabled Allows Malicious Search Filter Injection
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
updated 1 month, 2 weeks ago
by @fricklerhandwerkActivity log
Created automatic suggestion
1 month, 2 weeks ago
@fricklerhandwerkdismissed
1 month, 2 weeks ago
Command execution in python-utcp allows attackers to achieve remote code execution when fetching a remote Manual from a malicious endpoint
The vulnerability arises when a client fetches a tools’ JSON specification, known as a Manual, from a remote Manual Endpoint. While a provider may initially serve a benign manual (e.g., one defining an HTTP tool call), earning the clients’ trust, a malicious provider can later change the manual to exploit the client.
updated 1 month, 3 weeks ago
by @ErethonActivity log
Created automatic suggestion
2 months ago
@Erethondismissed
1 month, 3 weeks ago
@Erethonaccepted
1 month, 3 weeks ago
@Erethondismissed
1 month, 3 weeks ago
Limited HTML injection in emails
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. If the name of the attendee contained HTML or Markdown formatting, this was rendered as HTML in the resulting email. This way, a user could inject links or other formatted text through a maliciously formatted name. Since pretix applies a strict allow list approach to allowed HTML tags, this could not be abused for XSS or similarly dangerous attack chains. However, it can be used to manipulate emails in a way that makes user-provided content appear in a trustworthy and credible way, which can be abused for phishing.
Affected products
pretix
<2025.10.0
<2025.9.0
<2025.7.0
<2025.8.0
Matching in nixpkgs
pkgs.pretix
Ticketing software that cares about your event—all the way
updated 1 month, 3 weeks ago
by @ErethonActivity log
Created automatic suggestion
2 months ago
@Erethondismissed
1 month, 3 weeks ago
@Erethonaccepted
1 month, 3 weeks ago
@Erethondismissed
1 month, 3 weeks ago
@Erethonaccepted
1 month, 3 weeks ago
@Erethondismissed
1 month, 3 weeks ago
@Erethonaccepted
1 month, 3 weeks ago
@Erethondismissed
1 month, 3 weeks ago
@Erethonaccepted
1 month, 3 weeks ago
@Erethondismissed
1 month, 3 weeks ago
@Erethonaccepted
1 month, 3 weeks ago
@Erethondismissed
1 month, 3 weeks ago
Improper Handling of Exceptional Conditions in Newtonsoft.Json
Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.
updated 7 months, 1 week ago
by @fricklerhandwerkActivity log
Created automatic suggestion
7 months, 1 week ago
@fricklerhandwerkdismissed
7 months, 1 week ago
WordPress UpStream: a Project Management Plugin for WordPress plugin <= 2.1.0 - Broken Access Control Vulnerability
Missing Authorization vulnerability in upstreamplugin UpStream: a Project Management Plugin for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects UpStream: a Project Management Plugin for WordPress: from n/a through 2.1.0.
Cross-Site Request Forgery (CSRF) vulnerability in indgeek ClipLink allows Cross Site Request Forgery. This issue affects ClipLink: from n/a through 1.1.
updated 8 months, 2 weeks ago
by @LeSuisseActivity log
Created automatic suggestion
8 months, 2 weeks ago
@LeSuissedismissed
8 months, 2 weeks ago
Yggdrasil: local privilege escalation in yggdrasil
A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children's "worker" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages.
This flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.
Affected products
yggdrasil
<0.4.7
*
rhc-worker-playbook
Matching in nixpkgs
pkgs.yggdrasil
An experiment in scalable routing as an encrypted IPv6 overlay network
updated 9 months, 4 weeks ago
by @LeSuisseActivity log
Created automatic suggestion
10 months ago
@LeSuissedismissed
9 months, 4 weeks ago
WordPress Theater for WordPress plugin <= 0.18.7 - Broken Access Control vulnerability
Missing Authorization vulnerability in Jeroen Schmit Theater for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Theater for WordPress: from n/a through 0.18.7.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Agency Dominion Inc. Fusion allows DOM-Based XSS. This issue affects Fusion: from n/a through 1.6.3.