Show filters
1,081 Total Results
Displaying 281-290 of 1,081
Sort by:
Attacker Value
Unknown

CVE-2018-19186

Disclosure Date: November 14, 2018 (last updated November 27, 2024)
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the route.php paymentMethod parameter.
0
Attacker Value
Unknown

CVE-2018-19188

Disclosure Date: November 14, 2018 (last updated November 27, 2024)
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the success.php fort_id parameter.
0
Attacker Value
Unknown

CVE-2018-18224

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
A vulnerability exists in the file reading procedure in Open Design Alliance Drawings SDK 2019Update1 on non-Windows platforms in which attackers could perform read operations past the end, or before the beginning, of the intended buffer. This can allow attackers to obtain sensitive information from process memory or cause a crash.
0
Attacker Value
Unknown

CVE-2018-18223

Disclosure Date: October 19, 2018 (last updated November 27, 2024)
Open Design Alliance Drawings SDK 2019Update1 has a vulnerability during the reading of malformed files, allowing attackers to obtain sensitive information from process memory or cause a crash.
0
Attacker Value
Unknown

CVE-2018-1656

Disclosure Date: August 20, 2018 (last updated November 27, 2024)
The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
0
Attacker Value
Unknown

CVE-2017-6215

Disclosure Date: August 02, 2018 (last updated November 27, 2024)
paypal/permissions-sdk-php is vulnerable to reflected XSS in the samples/GetAccessToken.php verification_code parameter, resulting in code execution.
0
Attacker Value
Unknown

CVE-2017-6213

Disclosure Date: August 02, 2018 (last updated November 27, 2024)
paypal/invoice-sdk-php is vulnerable to reflected XSS in samples/permissions.php via the permToken parameter, resulting in code execution.
0
Attacker Value
Unknown

On the iOS platform, the ThreatMetrix SDK versions prior to 3.2 fail to validat…

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
On the iOS platform, the ThreatMetrix SDK versions prior to 3.2 fail to validate SSL certificates provided by HTTPS connections, which may allow an attacker to perform a man-in-the-middle (MITM) attack. ThreatMetrix is a security library for mobile applications, which aims to provide fraud prevention and device identity capabilities. The ThreatMetrix SDK versions prior to 3.2 do not validate SSL certificates on the iOS platform. An affected application will communicate with https://h-sdk.online-metrix.net, regardless of whether the connection is secure or not. An attacker on the same network as or upstream from the iOS device may be able to view or modify ThreatMetrix network traffic that should have been protected by HTTPS.
0
Attacker Value
Unknown

Applications developed using the Portrait Display SDK, versions 2.30 through 2.…

Disclosure Date: July 24, 2018 (last updated November 27, 2024)
Applications developed using the Portrait Display SDK, versions 2.30 through 2.34, default to insecure configurations which allow arbitrary code execution. A number of applications developed using the Portrait Displays SDK do not use secure permissions when running. These applications run the component pdiservice.exe with NT AUTHORITY/SYSTEM permissions. This component is also read/writable by all Authenticated Users. This allows local authenticated attackers to run arbitrary code with SYSTEM privileges. The following applications have been identified by Portrait Displays as affected: Fujitsu DisplayView Click: Version 6.0 and 6.01. The issue was fixed in Version 6.3. Fujitsu DisplayView Click Suite: Version 5. The issue is addressed by patch in Version 5.9. HP Display Assistant: Version 2.1. The issue was fixed in Version 2.11. HP My Display: Version 2.0. The issue was fixed in Version 2.1. Philips Smart Control Premium: Versions 2.23, 2.25. The issue was fixed in Version 2.26.
0
Attacker Value
Unknown

CVE-2016-10647

Disclosure Date: June 04, 2018 (last updated November 26, 2024)
node-air-sdk is an AIR SDK for nodejs. node-air-sdk downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
0