13 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Yii is an open source PHP web framework. yiisoft/yii before version 1.1.29 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. An attacker may leverage this vulnerability to compromise the host system. A fix has been developed for the 1.1.29 release. Users are advised to upgrade. There are no known workarounds for this vulnerability. • https://github.com/yiisoft/yii/commit/37142be4dc5831114a375392e86d6450d4951c06 https://github.com/yiisoft/yii/security/advisories/GHSA-mw2w-2hj2-fg8q https://owasp.org/www-community/vulnerabilities/PHP_Object_Injection • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

web\ViewAction in Yii (aka Yii2) 2.x before 2.0.5 allows attackers to execute any local .php file via a relative path in the view parameeter. web\ViewAction en Yii (también conocido como Yii2) 2.x anterior a 2.0.5 permite a los atacantes ejecutar cualquier archivo .php local a través de una ruta relativa en el parámetro de vista. • https://github.com/FriendsOfPHP/security-advisories/blob/master/yiisoft/yii2-dev/CVE-2015-5467.yaml https://www.yiiframework.com/news/87/yii-2-0-5-is-released-security-fix • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability found in Yii Framework Yii 2 Framework before v.2.0.47 allows the a remote attacker to execute arbitrary code via the runAction function. NOTE: the software maintainer's position is that the vulnerability is in third-party code, not in the framework. • https://github.com/yiisoft/yii2/issues/19755 https://github.com/yiisoft/yii2/issues/19755#issuecomment-1426155955 https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505390813 https://github.com/yiisoft/yii2/issues/19755#issuecomment-1505560351 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

`yiisoft/yii` before version 1.1.27 are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. This has been patched in 1.1.27. `yiisoft/yii` antes de la versión 1.1.27 son vulnerables a la ejecución remota de código (RCE) si la aplicación llama a `unserialize()` ante una entrada arbitraria del usuario. Esto ha sido parcheado en la versión 1.1.27. • https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52 https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcf • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator yii2 es vulnerable a un Uso de Algoritmo Predecible en el Generador de Números Aleatorios • https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46 https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba • CWE-330: Use of Insufficiently Random Values CWE-1241: Use of Predictable Algorithm in Random Number Generator •