Количество 12
Количество 12

CVE-2023-28427
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-28427
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2023-28427
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-28427
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for Jav ...
GHSA-mwq8-fjpf-c2gr
Prototype pollution in matrix-js-sdk (part 2)

BDU:2023-01835
Уязвимость набора средств разработки для JavaScript и TypeScript matrix-js-sdk, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2023:1736-1
Security update for MozillaThunderbird

RLSA-2023:1809
Important: thunderbird security update

RLSA-2023:1802
Important: thunderbird security update
ELSA-2023-1809
ELSA-2023-1809: thunderbird security update (IMPORTANT)
ELSA-2023-1806
ELSA-2023-1806: thunderbird security update (IMPORTANT)
ELSA-2023-1802
ELSA-2023-1802: thunderbird security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-28427 matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-28427 matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 7.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-28427 matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 8.2 | 0% Низкий | около 2 лет назад |
CVE-2023-28427 matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for Jav ... | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
GHSA-mwq8-fjpf-c2gr Prototype pollution in matrix-js-sdk (part 2) | CVSS3: 8.2 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-01835 Уязвимость набора средств разработки для JavaScript и TypeScript matrix-js-sdk, связанная с неконтролируемым изменением атрибутов прототипа объекта, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8.2 | 0% Низкий | около 2 лет назад |
![]() | SUSE-SU-2023:1736-1 Security update for MozillaThunderbird | около 2 лет назад | ||
![]() | RLSA-2023:1809 Important: thunderbird security update | около 2 лет назад | ||
![]() | RLSA-2023:1802 Important: thunderbird security update | около 2 лет назад | ||
ELSA-2023-1809 ELSA-2023-1809: thunderbird security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-1806 ELSA-2023-1806: thunderbird security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-1802 ELSA-2023-1802: thunderbird security update (IMPORTANT) | около 2 лет назад |
Уязвимостей на страницу