FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-28 14:09:37 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
5b0ae405-cdc7-11ed-bb39-901b0e9408dcMatrix clients -- Prototype pollution in matrix-js-sdk

Matrix developers report:

Today we are issuing security releases of matrix-js-sdk and matrix-react-sdk to patch a pair of High severity vulnerabilities (CVE-2023-28427 / GHSA-mwq8-fjpf-c2gr for matrix-js-sdk and CVE-2023-28103 / GHSA-6g43-88cp-w5gv for matrix-react-sdk).

The issues involve prototype pollution via events containing special strings in key locations, which can temporarily disrupt normal functioning of matrix-js-sdk and matrix-react-sdk, potentially impacting the consumer's ability to process data safely.


Discovery 2023-03-28
Entry 2023-03-29
element-web
< 1.11.26

cinny
le 2.2.4

CVE-2023-28103
CVE-2023-28427
https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0
c70c3dc3-258c-11ee-b37b-901b0e9408dcelement-web -- Cross site scripting in Export Chat feature

Matrix Developers reports:

The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored XSS.


Discovery 2023-07-18
Entry 2023-07-18
element-web
< 1.11.36

CVE-2023-37259
https://nvd.nist.gov/vuln/detail/CVE-2023-37259
c676bb1b-e3f8-11ed-b37b-901b0e9408dcelement-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting

Matrix developers report:

matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection.


Discovery 2023-04-25
Entry 2023-04-26
element-web
< 1.11.30

CVE-2023-30609
https://github.com/advisories/GHSA-xv83-x443-7rmw