Latest CVE Feed
-
5.4
MEDIUMCVE-2021-25989
In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them.... Read more
Affected Products : ifme- EPSS Score: %0.21
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25988
In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability (notifications section) which can be directly triggered by sending an ally request to the admin.... Read more
Affected Products : ifme- EPSS Score: %0.21
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
5.0
MEDIUMCVE-2021-25987
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.... Read more
Affected Products : hexo- EPSS Score: %0.10
- Published: Nov. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25986
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding t... Read more
Affected Products : django-wiki- EPSS Score: %0.20
- Published: Nov. 23, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25985
In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an exp... Read more
Affected Products : factor- EPSS Score: %0.17
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25984
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session coo... Read more
Affected Products : factor- EPSS Score: %1.39
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25983
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code... Read more
Affected Products : factor- EPSS Score: %1.39
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25982
In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the s... Read more
Affected Products : factor- EPSS Score: %1.39
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-25981
In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, ... Read more
Affected Products : talkyard- EPSS Score: %2.10
- Published: Jan. 03, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-25980
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a vic... Read more
Affected Products : talkyard- EPSS Score: %2.20
- Published: Nov. 11, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25979
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a miti... Read more
Affected Products : apostrophecms- EPSS Score: %0.36
- Published: Nov. 08, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25978
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.... Read more
Affected Products : apostrophecms- EPSS Score: %0.21
- Published: Nov. 07, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25977
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.... Read more
Affected Products : piranha_cms- EPSS Score: %0.32
- Published: Oct. 25, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-25976
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., w... Read more
Affected Products : piranha_cms- EPSS Score: %0.10
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25975
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file.... Read more
Affected Products : publify- EPSS Score: %0.21
- Published: Nov. 10, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25974
In Publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS. A user with a “publisher” role is able to inject and execute arbitrary JavaScript code while creating a page/article.... Read more
Affected Products : publify- EPSS Score: %0.21
- Published: Nov. 10, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-25973
In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only.... Read more
Affected Products : publify- EPSS Score: %0.16
- Published: Nov. 02, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-25972
In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other int... Read more
Affected Products : camaleon_cms- EPSS Score: %0.32
- Published: Oct. 20, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-25971
In Camaleon CMS, versions 2.0.1 to 2.6.0 are vulnerable to an Uncaught Exception. The app's media upload feature crashes permanently when an attacker with a low privileged access uploads a specially crafted .svg file... Read more
Affected Products : camaleon_cms- EPSS Score: %0.39
- Published: Oct. 20, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-25970
Camaleon CMS 0.1.7 to 2.6.0 doesn’t terminate the active session of the users, even after the admin changes the user’s password. A user that was already logged in, will still have access to the application even after the password was changed.... Read more
Affected Products : camaleon_cms- EPSS Score: %0.70
- Published: Oct. 20, 2021
- Modified: Nov. 21, 2024