Show filters
488 Total Results
Displaying 91-100 of 488
Sort by:
Attacker Value
Unknown

CVE-2022-24775

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-24729

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-24728

Disclosure Date: March 16, 2022 (last updated February 23, 2025)
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2022-25270

Disclosure Date: February 17, 2022 (last updated February 23, 2025)
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
Attacker Value
Unknown

CVE-2022-25271

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
Attacker Value
Unknown

CVE-2020-13677

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Under some circumstances, the Drupal core JSON:API module does not properly restrict access to certain content, which may result in unintended access bypass. Sites that do not have the JSON:API module enabled are not affected.
Attacker Value
Unknown

CVE-2020-13676

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
Attacker Value
Unknown

CVE-2020-13675

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
Attacker Value
Unknown

CVE-2020-13674

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
Attacker Value
Unknown

CVE-2020-13673

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The Entity Embed module provides a filter to allow embedding entities in content fields. In certain circumstances, the filter could allow an unprivileged user to inject HTML into a page when it is accessed by a trusted user with permission to embed entities. In some cases, this could lead to cross-site scripting.