Filtered by vendor Weseek
Subscribe
Total
42 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-20619 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting vulnerability in GROWI (v4.2 Series) versions prior to v4.2.3 allows remote attackers to inject an arbitrary script via unspecified vectors. | |||||
CVE-2021-20669 | 1 Weseek | 1 Growi | 2024-02-28 | 6.5 MEDIUM | 4.7 MEDIUM |
Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read and/or delete an arbitrary path via a specially crafted URL. | |||||
CVE-2021-20672 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Reflected cross-site scripting vulnerability due to insufficient verification of URL query parameters in GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote attackers to inject an arbitrary script via unspecified vectors. | |||||
CVE-2021-20668 | 1 Weseek | 1 Growi | 2024-02-28 | 4.0 MEDIUM | 2.7 LOW |
Path traversal vulnerability in GROWI versions v4.2.2 and earlier allows an attacker with administrator rights to read an arbitrary path via a specially crafted URL. | |||||
CVE-2020-5678 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Stored cross-site scripting vulnerability in GROWI v3.8.1 and earlier allows remote attackers to inject arbitrary script via unspecified vectors. | |||||
CVE-2021-20667 | 1 Weseek | 1 Growi | 2024-02-28 | 3.5 LOW | 5.4 MEDIUM |
Stored cross-site scripting vulnerability due to inadequate CSP (Content Security Policy) configuration in GROWI versions v4.2.2 and earlier allows remote authenticated attackers to inject an arbitrary script via a specially crafted content. | |||||
CVE-2021-20670 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
Improper access control vulnerability in GROWI versions v4.2.2 and earlier allows a remote unauthenticated attacker to read the user's personal information and/or server's internal information via unspecified vectors. | |||||
CVE-2020-5683 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
Directory traversal vulnerability in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to alter the data by uploading a specially crafted file. | |||||
CVE-2021-20671 | 1 Weseek | 1 Growi | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution. | |||||
CVE-2020-5677 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Reflected cross-site scripting vulnerability in GROWI v4.0.0 and earlier allows remote attackers to inject arbitrary script via unspecified vectors. | |||||
CVE-2020-5676 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
GROWI v4.1.3 and earlier allow remote attackers to obtain information which is not allowed to access via unspecified vectors. | |||||
CVE-2021-20673 | 1 Weseek | 1 Growi | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
Stored cross-site scripting vulnerability in Admin Page of GROWI (v4.2 Series) versions from v4.2.0 to v4.2.7 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors. | |||||
CVE-2019-13337 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). No valid token is required since it is not validated by the backend. The website can then be browsed as if no basic authentication is required. | |||||
CVE-2019-5969 | 1 Weseek | 1 Growi | 2024-02-28 | 5.8 MEDIUM | 6.1 MEDIUM |
Open redirect vulnerability in GROWI v3.4.6 and earlier allows remote attackersto redirect users to arbitrary web sites and conduct phishing attacks via the process of login. | |||||
CVE-2019-13338 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. In other words, the password hash can be retrieved even though it is not a publicly available field. | |||||
CVE-2019-5968 | 1 Weseek | 1 Growi | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
Cross-site request forgery (CSRF) vulnerability in GROWI v3.4.6 and earlier allows remote attackers to hijack the authentication of administrators via updating user's 'Basic Info'. | |||||
CVE-2018-0655 | 1 Weseek | 1 Growi | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via the app settings section of admin page. | |||||
CVE-2018-0653 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote attackers to inject arbitrary web script or HTML via Wiki page view. | |||||
CVE-2018-0652 | 1 Weseek | 1 Growi | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via the UserGroup Management section of admin page. | |||||
CVE-2018-0654 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting vulnerability in GROWI v.3.1.11 and earlier allows remote attackers to inject arbitrary web script or HTML via the modal for creating Wiki page. |