Lucene search

K
WireWire-webapp2020-10-14

4 matches found

CVE
CVE
added 2022/04/20 6:15 p.m.74 views

CVE-2022-24799

wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious me...

9.6CVSS6.7AI score0.00557EPSS
CVE
CVE
added 2022/06/25 7:15 a.m.65 views

CVE-2022-29168

Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascript execution via insufficient escaping when rendering @mentions in the wire-webapp. If a user receives and views a malicious message, arbitrary code is injected and executed in the context of the victim allowin...

9.6CVSS6.8AI score0.00611EPSS
CVE
CVE
added 2022/02/04 11:15 p.m.45 views

CVE-2022-23605

Wire webapp is a web client for the wire messaging protocol. In versions prior to 2022-01-27-production.0 expired ephemeral messages were not reliably removed from local chat history of Wire Webapp. In versions before 2022-01-27-production.0 ephemeral messages and assets might still be accessible t...

4.4CVSS3.7AI score0.00063EPSS
CVE
CVE
added 2021/04/02 3:15 p.m.27 views

CVE-2021-21400

wire-webapp is an open-source front end for Wire, a secure collaboration platform. In wire-webapp before version 2021-03-15-production.0, when being prompted to enter the app-lock passphrase, the typed passphrase will be sent into the most recently used chat when the user does not actively give foc...

7.1CVSS6.5AI score0.0042EPSS