3 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 2

An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states "we dispute the report's accuracy ... the configuration does not enable remote code execution.." Un problema en Postman versión 10.22 y anteriores en macOS permite a un atacante remoto ejecutar código arbitrario a través de la configuración RunAsNode y enableNodeClilnspectArguments. • https://github.com/giovannipajeu1/CVE-2024-23738 https://github.com/V3x0r/CVE-2024-23738 https://www.electronjs.org/blog/statement-run-as-node-cves •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 2

An information-disclosure issue was discovered in Postman through 6.3.0. It validates a server's X.509 certificate and presents an error if the certificate is not valid. Unfortunately, the associated HTTPS request data is sent anyway. Only the response is not displayed. Thus, all contained information of the HTTPS request is disclosed to a man-in-the-middle attacker (for example, user credentials). • https://seclists.org/bugtraq/2018/Sep/56 https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2018-016.txt • CWE-295: Improper Certificate Validation •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The postman-smtp plugin through 2017-10-04 for WordPress has XSS via the wp-admin/tools.php?page=postman_email_log page parameter. El plugin postman-smtp hasta el 04-10-2017 para WordPress, presenta una vulnerabilidad de tipo XSS por medio del parámetro page de wp-admin/tools.php?page=postman_email_log. The postman-smtp plugin through 1.7.2 for WordPress has XSS via the wp-admin/tools.php? • https://wordpress.org/plugins/postman-smtp/#developers https://www.pluginvulnerabilities.com/2017/06/29/reflected-cross-site-scripting-xss-vulnerability-in-postman-smtp • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •