Show filters
21 Total Results
Displaying 1-10 of 21
Sort by:
Attacker Value
Low

CVE-2019-11358

Disclosure Date: April 20, 2019 (last updated February 17, 2024)
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Attacker Value
Unknown

CVE-2020-11022

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Attacker Value
Unknown

CVE-2023-37538

Disclosure Date: October 11, 2023 (last updated October 19, 2023)
HCL Digital Experience is susceptible to cross site scripting (XSS). One subcomponent is vulnerable to reflected XSS. In reflected XSS, an attacker must induce a victim to click on a crafted URL from some delivery mechanism (email, other web site).
Attacker Value
Unknown

CVE-2022-38662

Disclosure Date: December 19, 2022 (last updated November 08, 2023)
 In HCL Digital Experience, URLs can be constructed to redirect users to untrusted sites.
Attacker Value
Unknown

CVE-2022-38653

Disclosure Date: December 19, 2022 (last updated November 08, 2023)
In HCL Digital Experience, customized XSS payload can be constructed such that it is served in the application unencoded.
Attacker Value
Unknown

CVE-2021-27774

Disclosure Date: September 13, 2022 (last updated October 08, 2023)
User input included in error response, which could be used in a phishing attack.
Attacker Value
Unknown

CVE-2021-41165

Disclosure Date: November 17, 2021 (last updated February 23, 2025)
CKEditor4 is an open source WYSIWYG HTML editor. In affected version a vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.
Attacker Value
Unknown

CVE-2021-41164

Disclosure Date: November 17, 2021 (last updated February 23, 2025)
CKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.
Attacker Value
Unknown

CVE-2021-37137

Disclosure Date: October 19, 2021 (last updated February 23, 2025)
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
Attacker Value
Unknown

CVE-2021-37136

Disclosure Date: October 19, 2021 (last updated February 23, 2025)
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack