Sylius paypal-plugin 1.2.4/1.3.1 Payment Page /pay-with-paypal/{id} sylius_paypal_plugin_pay_with_paypal_form information disclosure

A vulnerability, which was classified as problematic, has been found in Sylius paypal-plugin 1.2.4/1.3.1. This issue affects the function sylius_paypal_plugin_pay_with_paypal_form of the file /pay-with-paypal/{id} of the component Payment Page. Applying the patch 2adc46be2764ccee22b4247139b8056fb8d1afff is able to eliminate this problem. The bugfix is ready for download at github.com.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-52587 : STEP-SECURITY HARDEN-RUNNER UP TO 2.10.1 ENVIRONMENT VARIABLE OS COMMAND INJECTION

CVE-2024-52587 : STEP-SECURITY HARDEN-RUNNER UP TO 2.10.1 ENVIRONMENT VARIABLE OS COMMAND INJECTION

Description StepSecurity’s Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to

CVE-2024-50282 : LINUX KERNEL UP TO 6.11.7 AMD GPU AMDGPU_DEBUGFS_GPRWAVE_READ BUFFER OVERFLOW

CVE-2024-50282 : LINUX KERNEL UP TO 6.11.7 AMD GPU AMDGPU_DEBUGFS_GPRWAVE_READ BUFFER OVERFLOW

Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a

CVE-2024-50919 : JPRESS 5.1.1 ON WINDOWS JSP FILE UNRESTRICTED UPLOAD

CVE-2024-50919 : JPRESS 5.1.1 ON WINDOWS JSP FILE UNRESTRICTED UPLOAD

Description Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such