No edit summary |
Added severity for better overview |
||
| Line 5: | Line 5: | ||
! style="" |References | ! style="" |References | ||
! style="" |Summary | ! style="" |Summary | ||
!Severity | |||
|- | |- | ||
|[[Security:Security Advisories/BSSA-2025-06|BSSA-2025-06]] | |[[Security:Security Advisories/BSSA-2025-06|BSSA-2025-06]] | ||
| Line 42: | Line 43: | ||
Use-After-Free, | Use-After-Free, | ||
Arbitrary SQL Execution | Arbitrary SQL Execution | ||
| style="" class="col-red-bg" |High | |||
|- | |- | ||
|[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]] | |[[Security:Security Advisories/BSSA-2025-05|BSSA-2025-05]] | ||
| Line 48: | Line 50: | ||
|[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114] | |[https://www.cve.org/CVERecord?id=CVE-2025-46703 CVE-2025-46703], [https://www.cve.org/CVERecord?id=CVE-2025-48007 CVE-2025-48007], [https://www.cve.org/CVERecord?id=CVE-2025-57880 CVE-2025-57880], [https://www.cve.org/CVERecord?id=CVE-2025-58114 CVE-2025-58114] | ||
| | | | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
|[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]] | |[[Security:Security Advisories/BSSA-2025-04|BSSA-2025-04]] | ||
| Line 54: | Line 57: | ||
|[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796] | |[https://nvd.nist.gov/vuln/detail/CVE-2025-54988 CVE-2025-54988], [https://avd.aquasec.com/nvd/2025/cve-2025-7783 CVE-2025-7783], [https://avd.aquasec.com/nvd/cve-2025-58050 CVE-2025-58050], [https://avd.aquasec.com/nvd/cve-2025-49796 CVE-2025-49796] | ||
|Denial-of-Service, Information Disclosure | |Denial-of-Service, Information Disclosure | ||
| style="" class="col-green-bg" |Low | |||
|- | |- | ||
|[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]] | |[[Security:Security Advisories/BSSA-2025-03|BSSA-2025-03]] | ||
| Line 60: | Line 64: | ||
|[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057] | |[https://www.cve.org/CVERecord?id=CVE-2025-53501 CVE-2025-53501], [https://www.cve.org/CVERecord?id=CVE-2025-53494 CVE-2025-53494], [https://www.cve.org/CVERecord?id=CVE-2025-53093 CVE-2025-53093], [https://www.cve.org/CVERecord?id=CVE-2025-7057 CVE-2025-7057] | ||
|Information Disclosure, | |Information Disclosure, | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]] | | style="" |[[Security:Security Advisories/BSSA-2025-02|BSSA-2025-02]] | ||
| Line 66: | Line 71: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2025-32068 CVE-2025-32068], [https://www.cve.org/CVERecord?id=CVE-2025-32074 CVE-2025-32074] | ||
| style="" |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS) | | style="" |Allows unauthorized access to the wiki, Cross-Site Scripting (XSS) | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]] | | style="" |[[Security:Security Advisories/BSSA-2025-01|BSSA-2025-01]] | ||
| Line 72: | Line 78: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2025-23081 CVE-2025-23081] | ||
| style="" |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS) | | style="" |Allows Cross Site Request Forgery, Cross-Site Scripting (XSS) | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
|[[Security:Security Advisories/BSSA-2023-02|BSSA-2023-02]] | |[[Security:Security Advisories/BSSA-2023-02|BSSA-2023-02]] | ||
| Line 78: | Line 85: | ||
|[https://www.cve.org/cverecord?id=CVE-2023-42431 CVE-2023-42431] | |[https://www.cve.org/cverecord?id=CVE-2023-42431 CVE-2023-42431] | ||
|Allows Cross-Site Scripting (XSS) | |Allows Cross-Site Scripting (XSS) | ||
| style="" class="col-green-bg" |Low | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]] | | style="" |[[Security:Security Advisories/BSSA-2023-01|BSSA-2023-01]] | ||
| Line 84: | Line 92: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2023-36664 CVE-2023-36664] | ||
| style="" |Code can be executed on the server via a manipulated PDF | | style="" |Code can be executed on the server via a manipulated PDF | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]] | | style="" |[[Security:Security Advisories/BSSA-2022-08|BSSA-2022-08]] | ||
| Line 90: | Line 99: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-3895 CVE-2022-3895] | ||
| style="" |Arbitrary HTML injection through use of interface elements | | style="" |Arbitrary HTML injection through use of interface elements | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]] | | style="" |[[Security:Security Advisories/BSSA-2022-07|BSSA-2022-07]] | ||
| Line 96: | Line 106: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-3958 CVE-2022-3958] | ||
| style="" |Arbitrary HTML injection through personal menu items | | style="" |Arbitrary HTML injection through personal menu items | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]] | | style="" |[[Security:Security Advisories/BSSA-2022-06|BSSA-2022-06]] | ||
| Line 102: | Line 113: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-3893 CVE-2022-3893] | ||
| style="" |Arbitrary HTML injection through the custom menu | | style="" |Arbitrary HTML injection through the custom menu | ||
| style="" class="col-green-bg" |Low | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]] | | style="" |[[Security:Security Advisories/BSSA-2022-05|BSSA-2022-05]] | ||
| Line 108: | Line 120: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-42001 CVE-2022-42001] | ||
| style="" |Arbitrary HTML injection through the book navigation | | style="" |Arbitrary HTML injection through the book navigation | ||
| style="" class="col-green-bg" |Low | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]] | | style="" |[[Security:Security Advisories/BSSA-2022-04|BSSA-2022-04]] | ||
| Line 114: | Line 127: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-41789 CVE-2022-41789], [https://www.cve.org/CVERecord?id=CVE-2022-41814 CVE-2022-41814], [https://www.cve.org/CVERecord?id=CVE-2022-42000 CVE-2022-42000] | ||
| style="" |Arbitrary HTML injection through user preferences | | style="" |Arbitrary HTML injection through user preferences | ||
| style="" class="col-green-bg" |Low | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]] | | style="" |[[Security:Security Advisories/BSSA-2022-03|BSSA-2022-03]] | ||
| Line 120: | Line 134: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-41611 CVE-2022-41611] | ||
| style="" |Arbitrary HTML injection through main navigation | | style="" |Arbitrary HTML injection through main navigation | ||
| style="" class="col-green-bg" |Low | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]] | | style="" |[[Security:Security Advisories/BSSA-2022-02|BSSA-2022-02]] | ||
| Line 126: | Line 141: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-2511 CVE-2022-2511] | ||
| style="" |Arbitrary HTML injection through the 'title' parameter | | style="" |Arbitrary HTML injection through the 'title' parameter | ||
| style="" class="col-orange-bg" |Medium | |||
|- | |- | ||
| style="" |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]] | | style="" |[[Security:Security Advisories/BSSA-2022-01|BSSA-2022-01]] | ||
| Line 132: | Line 148: | ||
| style="" |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510] | | style="" |[https://www.cve.org/CVERecord?id=CVE-2022-2510 CVE-2022-2510] | ||
| style="" |JavaScript in search field is reflected back to the browser. | | style="" |JavaScript in search field is reflected back to the browser. | ||
| style="" class="col-orange-bg" |Medium | |||
|} | |} | ||
Latest revision as of 10:19, 28 October 2025
| Release name | Release date | Title | References | Summary | Severity |
|---|---|---|---|---|---|
| BSSA-2025-06 | 2025-10-28 | Security vulnerabilities in various MediaWiki extensions that are actually part of the BlueSpice distribution | CVE-2024-56171, CVE-2025-3277, CVE-2025-6965, CVE-2025-11173, CVE-2025-11175,
CVE-2025-53625, CVE-2025-54370, CVE-2025-54874, CVE-2025-59839, CVE-2025-61634, CVE-2025-61635, CVE-2025-61636, CVE-2025-61637, CVE-2025-61638, CVE-2025-61639, CVE-2025-61640, CVE-2025-61641, CVE-2025-61642, CVE-2025-61643, CVE-2025-61646, CVE-2025-61652, CVE-2025-61653, CVE-2025-61655, CVE-2025-61655, CVE-2025-61656, CVE-2025-61656, CVE-2025-61657, CVE-2025-7458 |
Denial Of Service,
Cross-Site Scripting (XSS), Information Disclosure, Bypass authn at content check, Server-side Request Forgery, Arbitrary Code Execution, Memory Corruption, Use-After-Free, Arbitrary SQL Execution |
High |
| BSSA-2025-05 | 2025-09-19 | XSS in Extension:AtMentions, Extension:BlueSpiceAvatars, Extension:BlueSpiceWhoIsOnline and Extension:CognitiveProcessDesigner | CVE-2025-46703, CVE-2025-48007, CVE-2025-57880, CVE-2025-58114 | Medium | |
| BSSA-2025-04 | 2025-09-18 | Security vulnerabilities in services bluespice/search, bluespice/formular and bluespice/wiki
|
CVE-2025-54988, CVE-2025-7783, CVE-2025-58050, CVE-2025-49796 | Denial-of-Service, Information Disclosure | Low |
| BSSA-2025-03 | 2025-07-28 | Security vulnerabilities in Extension:Scribunto, Extension:TabberNeue, Extension:TwoColConflict and Extension:Quiz | CVE-2025-53501, CVE-2025-53494, CVE-2025-53093, CVE-2025-7057 | Information Disclosure, | Medium |
| BSSA-2025-02 | 2025-04-17 | Security vulnerabilities in Extension:OAuth | CVE-2025-32068, CVE-2025-32074 | Allows unauthorized access to the wiki, Cross-Site Scripting (XSS) | Medium |
| BSSA-2025-01 | 2025-01-20 | Security vulnerabilities in Extension:DataTransfer | CVE-2025-23081 | Allows Cross Site Request Forgery, Cross-Site Scripting (XSS) | Medium |
| BSSA-2023-02 | 2023-10-30 | Security vulnerabilities in Extension:BlueSpiceAvatars | CVE-2023-42431 | Allows Cross-Site Scripting (XSS) | Low |
| BSSA-2023-01 | 2023-07-25 | Ghostscript vulnerability | CVE-2023-36664 | Code can be executed on the server via a manipulated PDF | Medium |
| BSSA-2022-08 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-3895 | Arbitrary HTML injection through use of interface elements | Medium |
| BSSA-2022-07 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-3958 | Arbitrary HTML injection through personal menu items | Medium |
| BSSA-2022-06 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-3893 | Arbitrary HTML injection through the custom menu | Low |
| BSSA-2022-05 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-42001 | Arbitrary HTML injection through the book navigation | Low |
| BSSA-2022-04 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-41789, CVE-2022-41814, CVE-2022-42000 | Arbitrary HTML injection through user preferences | Low |
| BSSA-2022-03 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-41611 | Arbitrary HTML injection through main navigation | Low |
| BSSA-2022-02 | 2022-11-15 | XSS attack vector on regular pages | CVE-2022-2511 | Arbitrary HTML injection through the 'title' parameter | Medium |
| BSSA-2022-01 | 2022-01-31 | XSS attack vector in Search Center | CVE-2022-2510 | JavaScript in search field is reflected back to the browser. | Medium |