Cross-site Request Forgery (CSRF) The advisory has been revoked - it doesn't affect any version of package dotnet-targeting-pack-5.0  (opens in a new tab)


Threat Intelligence

EPSS
0.42% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS8-DOTNETTARGETINGPACK50-2767305
  • published19 Apr 2022
  • disclosed15 Apr 2022

Introduced: 15 Apr 2022

CVE-2022-28109  (opens in a new tab)
CWE-352  (opens in a new tab)

Amendment

The Centos security team deemed this advisory irrelevant for Centos:8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream dotnet-targeting-pack-5.0 package and not the dotnet-targeting-pack-5.0 package as distributed by Centos.

Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.