Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Low
CVE-2020-13386
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
In SmartDraw 2020 27.0.0.0, the installer gives inherited write permissions to the Authenticated Users group on the SmartDraw 2020 installation folder. Additionally, when the product is installed, two scheduled tasks are created on the machine, SDMsgUpdate (Local) and SDMsgUpdate (TE). The scheduled tasks run in the context of the user who installed the product. Both scheduled tasks attempt to run the same binary, C:\SmartDraw 2020\Messages\SDNotify.exe. The folder Messages doesn't exist by default and (by extension) neither does SDNotify.exe. Due to the weak folder permissions, these can be created by any user. A malicious actor can therefore create a malicious SDNotify.exe binary, and have it automatically run, whenever the user who installed the product logs on to the machine. The malicious SDNotify.exe could, for example, create a new local administrator account on the machine.
0
Attacker Value
Unknown
CVE-2024-32472
Disclosure Date: April 17, 2024 (last updated February 26, 2025)
excalidraw is an open source virtual hand-drawn style whiteboard. A stored XSS vulnerability in Excalidraw's web embeddable component. This allows arbitrary JavaScript to be run in the context of the domain where the editor is hosted. There were two vectors. One rendering untrusted string as iframe's `srcdoc` without properly sanitizing against HTML injection. Second by improperly sanitizing against attribute HTML injection. This in conjunction with allowing `allow-same-origin` sandbox flag (necessary for several embeds) resulted in the XSS. This vulnerability is fixed in 0.17.6 and 0.16.4.
0
Attacker Value
Unknown
CVE-2023-26140
Disclosure Date: August 16, 2023 (last updated February 25, 2025)
Versions of the package @excalidraw/excalidraw from 0.0.0 are vulnerable to Cross-site Scripting (XSS) via embedded links in whiteboard objects due to improper input sanitization.
0
Attacker Value
Unknown
CVE-2022-23435
Disclosure Date: January 19, 2022 (last updated October 07, 2023)
decoding.c in android-gif-drawable before 1.2.24 does not limit the maximum length of a comment, leading to denial of service.
0
Attacker Value
Unknown
CVE-2021-24479
Disclosure Date: August 02, 2021 (last updated February 23, 2025)
The DrawBlog WordPress plugin through 0.90 does not sanitise or validate some of its settings before outputting them back in the page, leading to an authenticated stored Cross-Site Scripting issue
0
Attacker Value
Unknown
CVE-2019-18604
Disclosure Date: October 29, 2019 (last updated November 27, 2024)
In axohelp.c before 1.3 in axohelp in axodraw2 before 2.1.1b, as distributed in TeXLive and other collections, sprintf is mishandled.
0
Attacker Value
Unknown
CVE-2019-11932
Disclosure Date: October 03, 2019 (last updated November 27, 2024)
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
0
Attacker Value
Unknown
CVE-2019-13127
Disclosure Date: July 01, 2019 (last updated November 27, 2024)
An issue was discovered in mxGraph through 4.0.0, related to the "draw.io Diagrams" plugin before 8.3.14 for Confluence and other products. Improper input validation/sanitization of a color field leads to XSS. This is associated with javascript/examples/grapheditor/www/js/Dialogs.js.
0
Attacker Value
Unknown
CVE-2019-12896
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Edraw Max 7.9.3 has Heap Corruption starting at ntdll!RtlpNtMakeTemporaryKey+0x0000000000001a77.
0
Attacker Value
Unknown
CVE-2019-12897
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Edraw Max 7.9.3 has a Read Access Violation at the Instruction Pointer after a call from ObjectModule!Paint::Clear+0x0000000000000074.
0