Latest CVE Feed
-
8.8
HIGHCVE-2021-25994
In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Host Header Injection. By luring a victim application user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successf... Read more
Affected Products : userfrosting- EPSS Score: %1.76
- Published: Jan. 03, 2022
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25993
In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT toke... Read more
Affected Products : wiki.js- EPSS Score: %0.21
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25992
In Ifme, versions 1.0.0 to v.7.33.2 don’t properly invalidate a user’s session even after the user initiated logout. It makes it possible for an attacker to reuse the admin cookies either via local/network access or by other hypothetical attacks.... Read more
Affected Products : ifme- EPSS Score: %0.38
- Published: Feb. 10, 2022
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-25991
In Ifme, versions v5.0.0 to v7.32 are vulnerable against an improper access control, which makes it possible for admins to ban themselves leading to their deactivation from Ifme account and complete loss of admin access to Ifme.... Read more
Affected Products : ifme- EPSS Score: %0.19
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25990
In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe.... Read more
Affected Products : ifme- EPSS Score: %0.21
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25989
In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them.... Read more
Affected Products : ifme- EPSS Score: %0.21
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25988
In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability (notifications section) which can be directly triggered by sending an ally request to the admin.... Read more
Affected Products : ifme- EPSS Score: %0.21
- Published: Dec. 29, 2021
- Modified: Nov. 21, 2024
-
5.0
MEDIUMCVE-2021-25987
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.... Read more
Affected Products : hexo- EPSS Score: %0.10
- Published: Nov. 30, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25986
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding t... Read more
Affected Products : django-wiki- EPSS Score: %0.20
- Published: Nov. 23, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25985
In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an exp... Read more
Affected Products : factor- EPSS Score: %0.17
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25984
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session coo... Read more
Affected Products : factor- EPSS Score: %1.39
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25983
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code... Read more
Affected Products : factor- EPSS Score: %1.39
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25982
In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the s... Read more
Affected Products : factor- EPSS Score: %1.39
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-25981
In Talkyard, regular versions v0.2021.20 through v0.2021.33 and dev versions v0.2021.20 through v0.2021.34, are vulnerable to Insufficient Session Expiration. This may allow an attacker to reuse the admin’s still-valid session token even when logged-out, ... Read more
Affected Products : talkyard- EPSS Score: %2.10
- Published: Jan. 03, 2022
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-25980
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a vic... Read more
Affected Products : talkyard- EPSS Score: %2.20
- Published: Nov. 11, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25979
Apostrophe CMS versions prior to 3.3.1 did not invalidate existing login sessions when disabling a user account or changing the password, creating a situation in which a device compromised by a third party could not be locked out by those means. As a miti... Read more
Affected Products : apostrophecms- EPSS Score: %0.36
- Published: Nov. 08, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25978
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.... Read more
Affected Products : apostrophecms- EPSS Score: %0.21
- Published: Nov. 07, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25977
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.... Read more
Affected Products : piranha_cms- EPSS Score: %0.32
- Published: Oct. 25, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-25976
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., w... Read more
Affected Products : piranha_cms- EPSS Score: %0.10
- Published: Nov. 16, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-25975
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file.... Read more
Affected Products : publify- EPSS Score: %0.21
- Published: Nov. 10, 2021
- Modified: Nov. 21, 2024