Filtered by vendor Weseek
Subscribe
Total
42 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-47215 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability which is exploiting a behavior of the XSS Filter exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-45740 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-50339 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-49119 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-45737 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page of GROWI versions prior to v3.5.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-49807 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-50175 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-46699 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 4.3 MEDIUM |
Cross-site request forgery (CSRF) vulnerability exists in the User settings (/me) page of GROWI versions prior to v6.0.0. If a user views a malicious page while logging in, settings may be changed without the user's intention. | |||||
CVE-2023-49779 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-42436 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability exists in the presentation feature of GROWI versions prior to v3.4.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-50332 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 6.5 MEDIUM |
Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention. | |||||
CVE-2023-49598 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 5.4 MEDIUM |
Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product. | |||||
CVE-2023-50294 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 6.5 MEDIUM |
The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page. | |||||
CVE-2022-41799 | 1 Weseek | 1 Growi | 2024-02-28 | N/A | 6.5 MEDIUM |
Improper access control vulnerability in GROWI prior to v5.1.4 (v5 series) and versions prior to v4.5.25 (v4 series) allows a remote authenticated attacker to bypass access restriction and download the markdown data from the pages set to private by the other users. | |||||
CVE-2022-1236 | 1 Weseek | 1 Growi | 2024-02-28 | 6.4 MEDIUM | 6.5 MEDIUM |
Weak Password Requirements in GitHub repository weseek/growi prior to v5.0.0. | |||||
CVE-2021-20829 | 1 Weseek | 1 Growi | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting vulnerability due to the inadequate tag sanitization in GROWI versions v4.2.19 and earlier allows remote attackers to execute an arbitrary script on the web browser of the user who accesses a specially crafted page. | |||||
CVE-2021-3852 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
growi is vulnerable to Authorization Bypass Through User-Controlled Key | |||||
CVE-2021-20737 | 1 Weseek | 1 Growi | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Improper authentication vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to view the unauthorized pages without access privileges via unspecified vectors. | |||||
CVE-2021-20736 | 1 Weseek | 1 Growi | 2024-02-28 | 6.4 MEDIUM | 9.1 CRITICAL |
NoSQL injection vulnerability in GROWI versions prior to v4.2.20 allows a remote attacker to obtain and/or alter the information stored in the database via unspecified vectors. | |||||
CVE-2020-5682 | 1 Weseek | 1 Growi | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
Improper input validation in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to cause a denial of service via unspecified vectors. |