5 results (0.008 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27. `yiisoft/yii` antes de la versión 1.1.27 son vulnerables a la ejecución remota de código (RCE) si la aplicación llama a `unserialize()` ante una entrada arbitraria del usuario. Esto ha sido parcheado en la versión 1.1.27. • https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52 https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcf • CWE-502: Deserialization of Untrusted Data •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 1

Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory. Yii 2 (yiisoft/yii2) versiones anteriores a 2.0.38 es vulnerable a una Ejecución de Código Remota si la aplicación llama a "unserialize()" en una entrada arbitraria de usuario. Esto es corregido en la versión 2.0.38. • https://github.com/Maskhe/CVE-2020-15148-bypasses https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99 https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Yii 2.x before 2.0.15 allows remote attackers to execute arbitrary LUA code via a variant of the CVE-2018-7269 attack in conjunction with the Redis extension. Yii, en versiones 2.x anteriores a la 2.0.15, permite que atacantes remotos ejecuten código LUA arbitrario mediante una variante del ataque de CVE-2018-7269 junto con la extensión Redis. • http://www.yiiframework.com/news/168/releasing-yii-2-0-15-and-database-extensions-with-security-fixes • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Reflected Cross-site scripting (XSS) vulnerability in Yii Framework before 2.0.11, when development mode is used, allows remote attackers to inject arbitrary web script or HTML via crafted request data that is mishandled on the debug-mode exception screen. Vulnerabilidad de XSS en Yii Framework en versiones anteriores a 2.0.11, cuando se utiliza el modo de desarrollo, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de datos de solicitud manipulados que no se manejan adecuadamente en la pantalla de excepción del modo de depuración. • http://www.securityfocus.com/bid/97167 http://www.yiiframework.com/news/123/yii-2-0-11-is-released https://github.com/yiisoft/yii2/commit/97171a0db7cda0a49931ee0c3b998ef50bd06756 https://github.com/yiisoft/yii2/pull/13401 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •