A vulnerability, which was classified as problematic, has been found in Sylius paypal-plugin 1.2.4/1.3.1. This issue affects the function sylius_paypal_plugin_pay_with_paypal_form
of the file /pay-with-paypal/{id} of the component Payment Page. Applying the patch 2adc46be2764ccee22b4247139b8056fb8d1afff is able to eliminate this problem. The bugfix is ready for download at github.com.
Sylius paypal-plugin 1.2.4/1.3.1 Payment Page /pay-with-paypal/{id} sylius_paypal_plugin_pay_with_paypal_form information disclosure
- Virtual Patching
- October 7, 2021
- 3:05 am
CVE-2024-52587 : STEP-SECURITY HARDEN-RUNNER UP TO 2.10.1 ENVIRONMENT VARIABLE OS COMMAND INJECTION
Description StepSecurity’s Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to
CVE-2024-50282 : LINUX KERNEL UP TO 6.11.7 AMD GPU AMDGPU_DEBUGFS_GPRWAVE_READ BUFFER OVERFLOW
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a
CVE-2024-50919 : JPRESS 5.1.1 ON WINDOWS JSP FILE UNRESTRICTED UPLOAD
Description Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such