Page 2 of 44 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Auth. Stored Cross-Site Scripting (XSS) in Oi Yandex.Maps for WordPress <= 3.2.7 versions. Cross-Site Scripting (XSS) autenticada almacenada en el complemento Oi Yandex.Maps de WordPress &lt;= versiones 3.2.7. The Oi Yandex.Maps for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page • https://patchstack.com/database/vulnerability/oi-yamaps/wordpress-oi-yandex-maps-for-wordpress-plugin-3-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.684 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process. Una vulnerabilidad de privilegio local en Yandex Browser para Windows versiones anteriores 22.3.3.684, permite a un atacante local, con pocos privilegios, ejecutar código arbitrario con los privilegios SYSTEM a mediante la manipulación de enlaces simbólicos al archivo de instalación durante el proceso de actualización de Yandex Browser • https://yandex.com/bugbounty/i/hall-of-fame-browser • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Local privilege vulnerability in Yandex Browser for Windows prior to 22.3.3.801 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating temporary files in directory with insecure permissions during Yandex Browser update process. Una vulnerabilidad de privilegio local en Yandex Browser para Windows versiones anteriores a 22.3.3.801, permite a un atacante local, con pocos privilegios, ejecutar código arbitrario con los privilegios SYSTEM mediante la manipulación de archivos temporales en el directorio con permisos no seguros durante el proceso de actualización de Yandex Browser • https://yandex.com/bugbounty/i/hall-of-fame-browser • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Local privilege vulnerability in Yandex Browser for Windows prior to 22.5.0.862 allows a local, low privileged, attacker to execute arbitary code with the SYSTEM privileges through manipulating symlinks to installation file during Yandex Browser update process. Una vulnerabilidad de privilegios locales en Yandex Browser para Windows versiones anteriores a 22.5.0.862 permite a un atacante local, con pocos privilegios, ejecutar código arbitrario con los privilegios del SISTEMA a través de la manipulación de enlaces simbólicos al archivo de instalación durante el proceso de actualización de Yandex Browser • https://yandex.com/bugbounty/i/hall-of-fame-browser • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Divide-by-zero in Clickhouse's Gorilla compression codec when parsing a malicious query. The first byte of the compressed buffer is used in a modulo operation without being checked for 0. Una división por cero en el códec de compresión Gorilla de Clickhouse cuando es analizada una consulta maliciosa. El primer byte del búfer comprimido es usado en una operación de módulo sin que sea comprobado el 0 • https://jfrog.com/blog/7-rce-and-dos-vulnerabilities-found-in-clickhouse-dbms • CWE-369: Divide By Zero •