Show filters
488 Total Results
Displaying 91-100 of 488
Sort by:
Attacker Value
Unknown
CVE-2022-24775
Disclosure Date: March 21, 2022 (last updated February 23, 2025)
guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-24729
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-24728
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-25270
Disclosure Date: February 17, 2022 (last updated February 23, 2025)
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
0
Attacker Value
Unknown
CVE-2022-25271
Disclosure Date: February 16, 2022 (last updated February 23, 2025)
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
0
Attacker Value
Unknown
CVE-2020-13677
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Under some circumstances, the Drupal core JSON:API module does not properly restrict access to certain content, which may result in unintended access bypass. Sites that do not have the JSON:API module enabled are not affected.
0
Attacker Value
Unknown
CVE-2020-13676
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
0
Attacker Value
Unknown
CVE-2020-13675
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
0
Attacker Value
Unknown
CVE-2020-13674
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
0
Attacker Value
Unknown
CVE-2020-13673
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
The Entity Embed module provides a filter to allow embedding entities in content fields. In certain circumstances, the filter could allow an unprivileged user to inject HTML into a page when it is accessed by a trusted user with permission to embed entities. In some cases, this could lead to cross-site scripting.
0