6 results (0.012 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The Forms WordPress plugin before 1.12.3 did not sanitise its input fields, leading to Stored Cross-Site scripting issues. The plugin was vulnerable to an Authenticated Stored Cross-Site Scripting (XSS) vulnerability within the Forms "Add new" field. El plugin Forms WordPress versiones anteriores a 1.12.3, no saneaba sus campos input, conllevando a problemas de tipo Cross-Site scripting Almacenado. El plugin era susceptible a una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado y Autenticado dentro del campo "Add new" Forms • https://wpscan.com/vulnerability/550e08ac-4c3a-4e22-8e98-bc5bfc020ca9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

The package forms before 1.2.1, from 1.3.0 and before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation. Los formularios de paquetes versiones anteriores a 1.2.1, desde versión 1.3.0 y versiones anteriores a 1.3.2, son vulnerables a una Denegación de Servicio de Expresión Regular (ReDoS) por medio de la comprobación por correo electrónico • https://github.com/caolan/forms/pull/214 https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0 https://snyk.io/vuln/SNYK-JS-FORMS-1296389 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Forms is a library for easily creating HTML forms. Versions before 1.3.0 did not have proper html escaping. This means that if the application did not sanitize html on behalf of forms, use of forms may be vulnerable to cross site scripting Forms es una biblioteca para crear formularios HTML fácilmente. Las versiones anteriores a la 1.3.0 no contaban con un escapado HTML adecuado. Esto significa que, si la aplicación no saneaba código html en representación de los formularios, su uso podría ser vulnerable a Cross-Site Scripting (XSS). • https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d https://nodesecurity.io/advisories/158 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 6.4EPSS: 0%CPEs: 14EXPL: 1

oxf/xml/xerces/XercesSAXParserFactoryImpl.java in the xforms-server component in the XForms service in Orbeon Forms before 3.9 does not properly restrict DTDs in Ajax requests, which allows remote attackers to read arbitrary files or send HTTP requests to intranet servers via an entity declaration in conjunction with an entity reference, related to an "XML injection" issue. oxf/xml/xerces/XercesSAXParserFactoryImpl.java en el componente xforms-server en el servicio XForms en Orbeon Forms before v3.9 no restringe adecuadamente las peticiones Ajax a DTDs, lo que permite a atacantes remotos la lectura de archivos de su elección o el envío de peticiones HTTP a servidores de la intranet a través de una declaración de entidad junto con una referencia a entidad. Relacionado con la cuestión "inyección XML). • http://wiki.orbeon.com/forms/doc/developer-guide/release-notes/39 http://www.securityfocus.com/bid/47362 http://www.stratsec.net/Research/Advisories/Orbeon-Forms-XML-Entity-Dereferencing-%28SS-2011-004 https://github.com/orbeon/orbeon-forms/commit/aba6681660f65af7f1676434da68c10298c30200 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 7%CPEs: 7EXPL: 1

Oracle Forms 4.5 through 10g starts form executables from arbitrary directories and executes them as the Oracle or System user, which allows attackers to execute arbitrary code by uploading a malicious .fmx file and referencing it using an absolute pathname argument in the (1) form or (2) module parameters to f90servlet. Oracle Forms 4.5 hasta la 10g arranca desde ejecutables de directorios arbitrarios y los ejecuta como usuario Oracle o System, lo que permite que atacantes ejecuten código arbitrario usando un fichero .fmx malicioso y referenciándolo a través de un path absoluto en los parámetros "form" o "module" en f90servlet. • http://marc.info/?l=bugtraq&m=112180805413784&w=2 http://www.red-database-security.com/advisory/oracle_forms_run_any_os_command.html •