Page 2 of 13 results (0.002 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator yii2 es vulnerable al Uso de un Algoritmo Predecible en el Generador de Números Aleatorios • https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46 https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f • CWE-330: Use of Insufficiently Random Values CWE-1241: Use of Predictable Algorithm in Random Number Generator •

CVSS: 10.0EPSS: 3%CPEs: 1EXPL: 1

Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory. Yii 2 (yiisoft/yii2) versiones anteriores a 2.0.38 es vulnerable a una Ejecución de Código Remota si la aplicación llama a "unserialize()" en una entrada arbitraria de usuario. Esto es corregido en la versión 2.0.38. • https://github.com/Maskhe/CVE-2020-15148-bypasses https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99 https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj • CWE-502: Deserialization of Untrusted Data •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

Yii 2.x through 2.0.15.1 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems. Yii, en versiones 2.x anteriores a la 2.0.15.1, convierte una política comodín de CORS para que refleje un valor arbitrario de la cabecera Origin, que no es compatible con el diseño de seguridad de CORS y podría conducir a problemas de mala configuración de seguridad de CORS. • https://github.com/yiisoft/yii2/issues/16193 https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen.pdf • CWE-346: Origin Validation Error •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The findByCondition function in framework/db/ActiveRecord.php in Yii 2.x before 2.0.15 allows remote attackers to conduct SQL injection attacks via a findOne() or findAll() call, unless a developer recognizes an undocumented need to sanitize array input. La función findByCondition en framework/db/ActiveRecord.php en Yii, en versiones 2.x anteriores a la 2.0.15, permite que atacantes remotos lleven a cabo ataques de inyección SQL mediante una llamada findOne() o findAll(), a no ser que un desarrollador reconozca la necesidad no documentada de sanear entradas del array. • http://www.yiiframework.com/news/168/releasing-yii-2-0-15-and-database-extensions-with-security-fixes • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Yii 2.x before 2.0.15 allows remote attackers to execute arbitrary LUA code via a variant of the CVE-2018-7269 attack in conjunction with the Redis extension. Yii, en versiones 2.x anteriores a la 2.0.15, permite que atacantes remotos ejecuten código LUA arbitrario mediante una variante del ataque de CVE-2018-7269 junto con la extensión Redis. • http://www.yiiframework.com/news/168/releasing-yii-2-0-15-and-database-extensions-with-security-fixes • CWE-94: Improper Control of Generation of Code ('Code Injection') •