Page 9 of 141 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details. parlai es un marco de trabajo para entrenar y evaluar modelos de IA en una variedad de conjuntos de datos de diálogo disponibles abiertamente. • https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725 https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 14%CPEs: 1EXPL: 2

Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0. Debido al uso de una lógica de deserialización de YAML no segura, un atacante con la capacidad de modificar los archivos de configuración YAML locales podría proporcionar una entrada maliciosa, resultando en una ejecución de código remota o riesgos similares. Este problema afecta a ParlAI versiones anteriores a v1.1.0 Facebook ParlAI version 1.0.0 suffers from a deserialization vulnerability that can allow for code execution. • https://www.exploit-db.com/exploits/50289 http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0 https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 1%CPEs: 10EXPL: 0

Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1. Pasar un tamaño controlado por un atacante al crear un IOBuf podría causar un desbordamiento de enteros, lo que llevaría a una escritura fuera de límites en la pila con la posibilidad de ejecución de código remoto. Este problema afecta a las versiones de folly anteriores a la v2021.07.22.00. • https://github.com/facebook/folly/commit/4f304af1411e68851bdd00ef6140e9de4616f7d3 https://hhvm.com/blog/2021/07/20/security-update.html https://www.facebook.com/security/advisories/cve-2021-24036 • CWE-122: Heap-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. Un uso de la memoria previamente liberada en hermes, mientras se emiten determinados mensajes de error, antes del commit d86e185e485b6330216dee8e854455c694e3a36e permite a atacantes ejecutar potencialmente código arbitrario por medio de JavaScript diseñado. Tome en cuenta que esto sólo es explotable si la aplicación que usa Hermes permite la evaluación de JavaScript no confiable. • https://github.com/facebook/hermes/commit/d86e185e485b6330216dee8e854455c694e3a36e https://www.facebook.com/security/advisories/CVE-2021-24037 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1. Una vulnerabilidad de Denegación de Servicio de expresión regular (ReDoS) en la función validateBaseUrl puede hacer que la aplicación utilice recursos excesivos, deje de responder o se bloquee. Esto se introdujo en versión 0.59.0 de react-native y se corrigió en versión 0.64.1 • https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7 https://github.com/facebook/react-native/releases/tag/v0.64.1 • CWE-697: Incorrect Comparison CWE-1333: Inefficient Regular Expression Complexity •