A vulnerability, which was classified as problematic, has been found in Sylius paypal-plugin 1.2.4/1.3.1. This issue affects the function sylius_paypal_plugin_pay_with_paypal_form
of the file /pay-with-paypal/{id} of the component Payment Page. Applying the patch 2adc46be2764ccee22b4247139b8056fb8d1afff is able to eliminate this problem. The bugfix is ready for download at github.com.
Sylius paypal-plugin 1.2.4/1.3.1 Payment Page /pay-with-paypal/{id} sylius_paypal_plugin_pay_with_paypal_form information disclosure
- Virtual Patching
- October 7, 2021
- 3:05 am
CVE-2024-22144 : ELI SCHEETZ ANTI-MALWARE SECURITY AND BRUTE-FORCE FIREWALL PLUGIN CODE INJECTION
Description Improper Control of Generation of Code (‘Code Injection’) vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows
CVE-2024-26922 : LINUX KERNEL UP TO 6.9-RC4 AMDGPU PRIVILEGE ESCALATION
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more
CVE-2024-21511 : MYSQL2 UP TO 3.9.6 READCODEFOR TIMEZONE CODE INJECTION
Description Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the