Security Advisories (3)
CVE-2016-4566 (2016-05-22)

Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack.

CVE-2010-5312 (2014-11-24)

Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

CVE-2021-23562 (2021-12-03)

This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.

NAME

Yukki::Model::User - lookup users

VERSION

version 0.140290

SYNOPSIS

my $users = $app->model('User');
my $user  = $users->find('bob');

my $login_name = $user->{login_name};
my $password   = $user->{password};
my $name       = $user->{name};
my $email      = $user->{email};
my @groups     = @{ $user->{groups} };

DESCRIPTION

Read access to the current list of authorized users.

METHODS

find

my $user = $users->find($login_name);

Returns a hash containing the information related to a specific user named by login name.

AUTHOR

Andrew Sterling Hanenkamp <hanenkamp@cpan.org>

COPYRIGHT AND LICENSE

This software is copyright (c) 2014 by Qubling Software LLC.

This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.