4 results (0.003 seconds)

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions prior to 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. • https://github.com/pay-rails/pay/commit/5d6283a24062bd272a524ec48415f536a67ad57f https://github.com/pay-rails/pay/security/advisories/GHSA-cqf3-vpx7-rxhw • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied `validateTransfer` function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. This issue has been patched as of version `0.2.1`. Users of the Solana Pay SDK should upgrade to it. • https://github.com/solana-labs/solana-pay/blob/master/SPEC.md#reference https://github.com/solana-labs/solana-pay/blob/master/core/src/validateTransfer.ts https://github.com/solana-labs/solana-pay/commit/ac6ce0d0a81137700874a8bf5a7caac3be999fad https://github.com/solana-labs/solana-pay/security/advisories/GHSA-j47c-j42c-mwqq • CWE-670: Always-Incorrect Control Flow Implementation •

CVSS: 3.8EPSS: 0%CPEs: 1EXPL: 0

Improper export of Android application components vulnerability in Samsung Pay (India only) prior to version 4.1.77 allows attacker to access Bill Pay and Recharge menu without authentication. Se presenta una vulnerabilidad de exportación inapropiada de componentes de aplicaciones Android en Samsung Pay (sólo en la India) versiones anteriores a 4.1.77, que permite a un atacante acceder al menú Bill Pay y Recharge sin autenticación • https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=12 • CWE-926: Improper Export of Android Application Components •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Improper check or handling of exception conditions vulnerability in Samsung Pay (US only) prior to version 4.0.65 allows attacker to use NFC without user recognition. Una vulnerabilidad de comprobación o administración inapropiada de las condiciones de excepción en Samsung Pay (US only) versiones anteriores a 4.0.65, permite al atacante usar NFC sin el reconocimiento del usuario • https://security.samsungmobile.com/serviceWeb.smsb?year=2021&month=12 • CWE-703: Improper Check or Handling of Exceptional Conditions CWE-754: Improper Check for Unusual or Exceptional Conditions •