Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: xmind

Found 2 matching suggestions

View:
Compact
Detailed
Published
updated 3 weeks, 3 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    31 packages
    • libmaxminddb
    • phpExtensions.maxminddb
    • python312Packages.xmind
    • python313Packages.xmind
    • python314Packages.xmind
    • dotnetPackages.MaxMindDb
    • php81Extensions.maxminddb
    • php82Extensions.maxminddb
    • php83Extensions.maxminddb
    • php84Extensions.maxminddb
    • php85Extensions.maxminddb
    • python312Packages.maxminddb
    • python313Packages.maxminddb
    • python314Packages.maxminddb
    • dotnetPackages.MaxMindGeoIP2
    • perlPackages.MaxMindDBCommon
    • perlPackages.MaxMindDBReader
    • perlPackages.MaxMindDBWriter
    • perl5Packages.MaxMindDBCommon
    • perl5Packages.MaxMindDBReader
    • perl5Packages.MaxMindDBWriter
    • perlPackages.MaxMindDBReaderXS
    • perl538Packages.MaxMindDBCommon
    • perl538Packages.MaxMindDBReader
    • perl538Packages.MaxMindDBWriter
    • perl540Packages.MaxMindDBCommon
    • perl540Packages.MaxMindDBReader
    • perl540Packages.MaxMindDBWriter
    • perl5Packages.MaxMindDBReaderXS
    • perl538Packages.MaxMindDBReaderXS
    • perl540Packages.MaxMindDBReaderXS
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of attachments. When opening an attachment, the user interface fails to warn the user of unsafe actions. An attacker can leverage this vulnerability to execute code in the context of current user. Was ZDI-CAN-26034.

References

Affected products

Xmind
  • ==24.10.01101-202410202317

Matching in nixpkgs

Ignored packages (31)

Package maintainers

ZDI advisory: https://www.zerodayinitiative.com/advisories/ZDI-26-069/

Apparently mitigated in 26.02
Dismissed
Permalink CVE-2021-47844
6.1 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): REQUIRED
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    24 packages
    • libmaxminddb
    • phpExtensions.maxminddb
    • python312Packages.xmind
    • python313Packages.xmind
    • dotnetPackages.MaxMindDb
    • php81Extensions.maxminddb
    • php82Extensions.maxminddb
    • php83Extensions.maxminddb
    • php84Extensions.maxminddb
    • python312Packages.maxminddb
    • python313Packages.maxminddb
    • dotnetPackages.MaxMindGeoIP2
    • perlPackages.MaxMindDBCommon
    • perl540Packages.MaxMindDBReaderXS
    • perl538Packages.MaxMindDBReaderXS
    • perl540Packages.MaxMindDBWriter
    • perl540Packages.MaxMindDBReader
    • perl540Packages.MaxMindDBCommon
    • perl538Packages.MaxMindDBWriter
    • perl538Packages.MaxMindDBReader
    • perl538Packages.MaxMindDBCommon
    • perlPackages.MaxMindDBWriter
    • perlPackages.MaxMindDBReader
    • perlPackages.MaxMindDBReaderXS
  • @LeSuisse dismissed
Xmind 2020 - Persistent Cross-Site Scripting

Xmind 2020 contains a cross-site scripting vulnerability that allows attackers to inject malicious payloads into mind mapping files or custom headers. Attackers can craft malicious files with embedded JavaScript that execute system commands when opened, enabling remote code execution through mouse interactions or file opening.

Affected products

Xmind
  • ==2020

Matching in nixpkgs

Package maintainers

Impact an old versions not present in supported nixpkgs branches.