A vulnerability was found in qt-users-jp silk 0.0.1. It has been declared as problematic. This vulnerability affects unknown code of the file contents/root/examples/header.qml. The manipulation of the argument model.key/model.value leads to cross site scripting. The attack can be initiated remotely. The name of the patch is bbc5d6eeea800025ef29edda3fd3c57836239eae. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221488.
More Stories
logiops-0.3.5-1.fc39
FEDORA-2024-69ce052378 Packages in this update: logiops-0.3.5-1.fc39 Update description: Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This...
logiops-0.3.5-1.fc40
FEDORA-2024-326390f033 Packages in this update: logiops-0.3.5-1.fc40 Update description: Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This...
logiops-0.3.5-1.fc41
FEDORA-2024-1a9b10c921 Packages in this update: logiops-0.3.5-1.fc41 Update description: Fixes CVE-2024-45752: A vulnerability that allows users to remap keys arbitrarily. This...
Backdoor.Win32.Benju.a / Unauthenticated Remote Command Execution
Posted by malvuln on Sep 28 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/88922242e8805bfbc5981e55fdfadd71.txt Contact:...
Backdoor.Win32.Prorat.jz / Remote Stack Buffer Overflow (SEH)
Posted by malvuln on Sep 28 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/277f9a4db328476300c4da5f680902ea.txt Contact:...
Backdoor.Win32.Amatu.a / Remote Arbitrary File Write (RCE)
Posted by malvuln on Sep 28 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/1e2d0b90ffc23e00b743c41064bdcc6b.txt Contact:...