It was discovered that OpenRefine did not properly handle opening tar
files. If a user or application were tricked into opening a crafted tar
file, an attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 22.04 LTS. (CVE-2023-37476)
It was discovered that OpenRefine incorrectly handled file permissions and
user authentication. An unauthenticated attacker could possibly use this
issue to leak sensitive information or execute arbitrary code. This issue
only affected Ubuntu 22.04 LTS. (CVE-2023-41886, CVE-2023-41887)
It was discovered that OpenRefine did not properly disallow database
settings to be modified when queried. An attacker could possibly use this
issue to leak sensitive information. This issue only affected
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-23833)
It was discovered that OpenRefine did not properly sanitize the GET
parameter for authorized commands, leading to a cross site scripting
vulnerability. An attacker could possibly use this issue to execute
arbitrary code. (CVE-2024-47878)
It was discovered that OpenRefine did not properly prevent cross-site
request forgery when running the preview-expression command. If a user or
application were tricked into opening a specially crafted webpage, an
attacker could possibly use this issue to execute arbitrary code.
(CVE-2024-47879)
It was discovered that OpenRefine did not properly handle HTTP headers.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2024-47880)
It was discovered that OpenRefine incorrectly handled database extensions.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2024-47881)
It was discovered that OpenRefine did not properly escape HTML tags in
exception messages, which could enable code injection. If a user or
application were tricked into opening a malicious file, an attacker could
use this issue to execute arbitrary code. (CVE-2024-47882)
It was discovered that OpenRefine did not correctly handle paths when
executing the load-language command. An attacker could possibly use this
issue to leak sensitive information. (CVE-2024-49760)
More Stories
jupyterlab-4.3.6-1.fc41
FEDORA-2025-e50201543b Packages in this update: jupyterlab-4.3.6-1.fc41 Update description: Update to 4.3.6 (rhbz#2352545) Read More
jupyterlab-4.3.6-1.fc40
FEDORA-2025-1d68ba6806 Packages in this update: jupyterlab-4.3.6-1.fc40 Update description: Update to 4.3.6 (rhbz#2352545) Read More
MS-ISAC CYBERSECURITY ADVISORY – Multiple Vulnerabilities in Sante PACS Server Could Allow for Remote Code Execution – PATCH NOW – TLP: CLEAR
Multiple vulnerabilities have been discovered in Sante PACS Server, the most severe of which could allow for remote code execution....
dotnet8.0-8.0.114-1.fc40
FEDORA-2025-83c147615e Packages in this update: dotnet8.0-8.0.114-1.fc40 Update description: This is the monthly update for .NET for March 2025. Release Notes:...
dotnet8.0-8.0.114-1.fc41
FEDORA-2025-adbd75f500 Packages in this update: dotnet8.0-8.0.114-1.fc41 Update description: This is the monthly update for .NET for March 2025. Release Notes:...
dotnet8.0-8.0.114-1.fc42
FEDORA-2025-54ac622cef Packages in this update: dotnet8.0-8.0.114-1.fc42 Update description: This is the monthly update for .NET for March 2025. Release Notes:...