Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2023-44258

Disclosure Date: January 02, 2025 (last updated January 03, 2025)
Missing Authorization vulnerability in Schema App Schema App Structured Data allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Schema App Structured Data: from n/a through 1.23.1.
0
Attacker Value
Unknown

CVE-2024-53848

Disclosure Date: November 29, 2024 (last updated December 21, 2024)
check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `https://example.org/schema.json` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., `https://example.evil.org/schema.json`, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of …
0
Attacker Value
Unknown

CVE-2024-49683

Disclosure Date: October 24, 2024 (last updated October 25, 2024)
Missing Authorization vulnerability in Schema & Structured Data for WP & AMP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Schema & Structured Data for WP & AMP: from n/a through 1.3.5.
0
Attacker Value
Unknown

CVE-2023-36683

Disclosure Date: June 19, 2024 (last updated June 20, 2024)
Missing Authorization vulnerability in WP SCHEMA PRO Schema Pro.This issue affects Schema Pro: from n/a through 2.7.8.
0
Attacker Value
Unknown

CVE-2022-33154

Disclosure Date: July 12, 2022 (last updated February 24, 2025)
The schema (aka Embedding schema.org vocabulary) extension before 1.13.1 and 2.x before 2.5.1 for TYPO3 allows XSS.
Attacker Value
Unknown

CVE-2021-3918

Disclosure Date: November 13, 2021 (last updated February 23, 2025)
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-21267

Disclosure Date: March 19, 2021 (last updated February 22, 2025)
Schema-Inspector is an open-source tool to sanitize and validate JS objects (npm package schema-inspector). In before version 2.0.0, email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected. Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS.
Attacker Value
Unknown

CVE-2020-7742

Disclosure Date: October 07, 2020 (last updated November 28, 2024)
This affects the package simpl-schema before 1.10.2.
0
Attacker Value
Unknown

CVE-2019-10781

Disclosure Date: August 14, 2019 (last updated February 21, 2025)
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.