Page 2 of 8 results (0.010 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

Unrestricted Upload of File with Dangerous Type vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Pixel Flood Attack by uploading large pixel files will cause server out of memory. A logged-in user can cause such an attack by uploading an image when posting content. Users are recommended to upgrade to version [1.2.5], which fixes the issue. Carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. El ataque de inundación de píxeles mediante la carga de archivos de píxeles de gran tamaño provocará que el servidor se quede sin memoria. • https://github.com/omranisecurity/CVE-2024-22393 http://www.openwall.com/lists/oss-security/2024/02/22/1 https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: -EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. XSS attack when user enters summary. A logged-in user, when modifying their own submitted question, can input malicious code in the summary to create such an attack. Users are recommended to upgrade to version [1.2.5], which fixes the issue. Neutralización inadecuada de la entrada durante la vulnerabilidad de generación de páginas web ('cross-site Scripting') en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. Ataque XSS cuando el usuario ingresa un resumen. • http://www.openwall.com/lists/oss-security/2024/02/22/2 https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: -EPSS: 0%CPEs: 1EXPL: 0

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1. Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registrations using scripts, it can result in the creation of multiple user accounts simultaneously with the same name. Users are recommended to upgrade to version [1.2.5], which fixes the issue. Ejecución simultánea mediante recurso compartido con vulnerabilidad de sincronización incorrecta ('Condición de Ejecución') en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. El envío repetido durante el registro resultó en el registro del mismo usuario. • http://www.openwall.com/lists/oss-security/2024/02/22/3 https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •