Filtered by vendor W3
Subscribe
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-30300 | 1 W3 | 1 Webassembly | 2024-11-21 | N/A | 5.5 MEDIUM |
An issue in the component hang.wasm of WebAssembly 1.0 causes an infinite loop. | |||||
CVE-2021-4296 | 1 W3 | 1 Unicorn | 2024-11-21 | N/A | 3.5 LOW |
A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019. | |||||
CVE-2017-5928 | 1 W3 | 1 High Resolution Time Api | 2024-11-21 | 4.3 MEDIUM | 3.7 LOW |
The W3C High Resolution Time API, as implemented in various web browsers, does not consider that memory-reference times can be measured by a performance.now "Time to Tick" approach even with the https://bugzilla.mozilla.org/show_bug.cgi?id=1167489#c9 protection mechanism in place, which makes it easier for remote attackers to conduct AnC attacks via crafted JavaScript code. | |||||
CVE-2016-9487 | 1 W3 | 1 Epubcheck | 2024-11-21 | 6.8 MEDIUM | 7.8 HIGH |
EpubCheck 4.0.1 does not properly restrict resolving external entities when parsing XML in EPUB files during validation. An attacker who supplies a specially crafted EPUB file may be able to exploit this behavior to read arbitrary files, or have the victim execute arbitrary requests on his behalf, abusing the victim's trust relationship with other entities. | |||||
CVE-2014-125108 | 1 W3 | 1 Spell Checker | 2024-11-21 | 2.6 LOW | 3.1 LOW |
A vulnerability was found in w3c online-spellchecker-py up to 20140130. It has been rated as problematic. This issue affects some unknown processing of the file spellchecker. The manipulation leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of the patch is d6c21fd8187c5db2a50425ff80694149e75d722e. It is recommended to apply a patch to fix this issue. The identifier VDB-248849 was assigned to this vulnerability. | |||||
CVE-2009-1209 | 1 W3 | 1 Amaya | 2024-11-21 | 9.3 HIGH | N/A |
Stack-based buffer overflow in W3C Amaya Web Browser 11.1 allows remote attackers to execute arbitrary code via a script tag with a long defer attribute. | |||||
CVE-2009-0323 | 1 W3 | 1 Amaya | 2024-11-21 | 10.0 HIGH | N/A |
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005. |