Page 6 of 138 results (0.006 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Anchor tag hrefs in Lexical prior to v0.10.0 would render javascript: URLs, allowing for cross-site scripting on link clicks in cases where input was being parsed from untrusted sources. • https://github.com/facebook/lexical/releases/tag/v0.10.0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun. Se encontró una vulnerabilidad en zstd v1.4.10, donde un atacante puede proporcionar una cadena vacía como argumento a la herramienta de línea de comando para provocar una saturación del búfer. • https://github.com/facebook/zstd/issues/3200 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN https://security.netapp.com/advisory/ntap-20230725-0005 https://access.redhat.com/security/cve/CVE-2022-4899 https:/ • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file. La función DexLoader get_stringidx_fromdex() en Redex antes del commit 3b44c64 puede cargar una dirección fuera de límite al cargar la tabla de índice de cadenas, lo que potencialmente permite la ejecución remota de código durante el procesamiento de un archivo APK de Android de terceros. • https://github.com/facebook/redex/commit/3b44c640346b77bfb7ef36e2413688dd460288d2 • CWE-125: Out-of-bounds Read CWE-1284: Improper Validation of Specified Quantity in Input •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. Una condición write-what-where en Hermes causada por un desbordamiento de enteros, versiones anteriores al commit 5b6255ae049fa4641791e47fad994e8e8c4da374 permite a atacantes ejecutar potencialmente código arbitrario por medio de JavaScript diseñado. Tenga en cuenta que esto sólo es explotable si la aplicación que usa Hermes permite la evaluación de JavaScript no confiable. • https://github.com/facebook/hermes/commit/5b6255ae049fa4641791e47fad994e8e8c4da374 https://www.facebook.com/security/advisories/CVE-2022-35289 • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An integer conversion error in Hermes bytecode generation, prior to commit 6aa825e480d48127b480b08d13adf70033237097, could have been used to perform Out-Of-Bounds operations and subsequently execute arbitrary code. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. Un error de conversión de enteros en la generación de bytecode de Hermes, anterior al commit 6aa825e480d48127b480b08d13adf70033237097, podría haber sido usado para llevar a cabo operaciones Fuera de Límites y posteriormente ejecutar código arbitrario. Tenga en cuenta que esto sólo es explotable en los casos en que Hermes es usado para ejecutar JavaScript no confiable. • https://github.com/facebook/hermes/commit/6aa825e480d48127b480b08d13adf70033237097 https://www.facebook.com/security/advisories/CVE-2022-40138 • CWE-681: Incorrect Conversion between Numeric Types •