20 results (0.002 seconds)

CVSS: 7.8EPSS: 93%CPEs: 2EXPL: 6

16 Feb 2021 — The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any ... • https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 1

01 Dec 2020 — We have resolved a security issue in the camera plugin that could have affected certain Cordova (Android) applications. An attacker who could install (or lead the victim to install) a specially crafted (or malicious) Android application would be able to access pictures taken with the app externally. Hemos resuelto un problema de seguridad en el plugin de la cámara que podría haber afectado a determinadas aplicaciones de Cordova (Android). Un atacante que pudiera instalar (o hacer que la víctima instale... • https://github.com/forse01/CVE-2020-11990-Cordova •

CVSS: 9.8EPSS: 6%CPEs: 8EXPL: 0

14 Jan 2020 — A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. Un sitio web ejecutado en la vista web de InAppBrowser en Android podría ejecutar JavaScript arbitrario en la vista web de la aplicación principal usando un URI gap-iab: especialmente diseñado. • http://www.openwall.com/lists/oss-security/2019/11/28/1 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

09 May 2017 — Product: Apache Cordova Android 5.2.2 and earlier. The application calls methods of the Log class. Messages passed to these methods (Log.v(), Log.d(), Log.i(), Log.w(), and Log.e()) are stored in a series of circular buffers on the device. By default, a maximum of four 16 KB rotated logs are kept in addition to the current log. The logged data can be read using Logcat on the device. • http://www.securityfocus.com/bid/98365 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2017 — After the Android platform is added to Cordova the first time, or after a project is created using the build scripts, the scripts will fetch Gradle on the first build. However, since the default URI is not using https, it is vulnerable to a MiTM and the Gradle executable is not safe. The severity of this issue is high due to the fact that the build scripts immediately start a build after Gradle has been fetched. Developers who are concerned about this issue should install version 6.1.2 or higher of Cordova-... • http://www.securityfocus.com/bid/95838 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

28 Apr 2016 — Apache Cordova iOS before 4.0.0 might allow attackers to bypass a URL whitelist protection mechanism in an app and load arbitrary resources by leveraging unspecified methods. Apache Cordova iOS en versiones anteriores a 4.0.0 podrían permitir a atacantes eludir un mecanismo de protección de lista blanca de URL en una aplicación y cargar recursos arbitrarios aprovechando métodos no especificados. Apache Cordova iOS versions 3.9.1 and below suffer from an access bypass vulnerability. • http://jvn.jp/en/jp/JVN35341085/index.html • CWE-254: 7PK - Security Features CWE-284: Improper Access Control •

CVSS: 4.4EPSS: 2%CPEs: 1EXPL: 0

28 Apr 2016 — Apache Cordova iOS before 4.0.0 allows remote attackers to execute arbitrary plugins via a link. Apache Cordova iOS en versiones anteriores a 4.0.0 permite a atacantes remotos ejecutar plugins arbitrarios a través de un enlace. Apache Cordova iOS versions 3.9.1 and below allow for arbitrary plugin execution. • http://jvn.jp/en/jp/JVN41772178/index.html • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

21 Nov 2015 — Apache Cordova-Android before 3.7.0 improperly generates random values for BridgeSecret data, which makes it easier for attackers to conduct bridge hijacking attacks by predicting a value. Apache Cordova-Android en versiones anteriores a 3.7.0 genera de manera incorrecta valores aleatorios para datos BridgeSecret, lo que facilita a atacantes llevar a cabo ataques de secuestro de puente mediante la predicción de un valor. Apache Cordova Android versions 3.6.4 and below use a bridge that allows the Native App... • http://packetstormsecurity.com/files/134496/Apache-Cordova-Android-3.6.4-BridgeSecret-Weak-Randomization.html •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

21 Nov 2015 — Apache Cordova-Android before 4.1.0, when an application relies on a remote server, improperly implements a JavaScript whitelist protection mechanism, which allows attackers to bypass intended access restrictions via a crafted URI. Apache Cordova-Android en versiones anteriores a 4.1.0, cuando una aplicación confía en un servidor remoto, implementa de manera incorrecta un mecanismo de protección de lista blanca JavaScript, lo que permite a atacantes eludir las restricciones destinadas al acceso a través de ... • http://jvn.jp/en/jp/JVN18889193/index.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

25 Sep 2015 — CRLF injection vulnerability in the Apache Cordova File Transfer Plugin (cordova-plugin-file-transfer) for Android before 1.3.0 allows remote attackers to inject arbitrary headers via CRLF sequences in the filename of an uploaded file. Vulnerabilidad de inyección CRLF en Apache Cordova File Transfer Plugin (cordova-plugin-file-transfer) para Android en versiones anteriores a 1.3.0 permite a atacantes remotos inyectar cabeceras arbitrarias a través de secuencias CRLF en el nombre de archivo de un archivo car... • http://www.securityfocus.com/bid/76832 •