Latest CVE Feed
-
8.8
HIGHCVE-2021-22879
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.... Read more
- EPSS Score: %0.57
- Published: Apr. 14, 2021
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2021-22878
Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`.... Read more
- EPSS Score: %0.42
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22877
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.... Read more
- EPSS Score: %0.37
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-22875
Revive Adserver before 5.1.1 is vulnerable to a reflected XSS vulnerability in stats.php via the `setPerPage` parameter.... Read more
Affected Products : revive_adserver- EPSS Score: %1.09
- Published: Jan. 28, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-22874
Revive Adserver before 5.1.1 is vulnerable to a reflected XSS vulnerability in userlog-index.php via the `period_preset` parameter.... Read more
Affected Products : revive_adserver- EPSS Score: %1.09
- Published: Jan. 28, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-22873
Revive Adserver before 5.1.0 is vulnerable to open redirects via the `dest`, `oadest`, and/or `ct0` parameters of the lg.php and ck.php delivery scripts. Such open redirects had previously been available by design to allow third party ad servers to track ... Read more
Affected Products : revive_adserver- EPSS Score: %68.62
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-22872
Revive Adserver before 5.1.0 is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the publicly accessible afr.php delivery script. While this issue was previously addressed in modern browsers as CVE-2020-8115, some older browsers (e.g... Read more
Affected Products : revive_adserver- EPSS Score: %2.26
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2021-22871
Revive Adserver before 5.1.0 permits any user with a manager account to store possibly malicious content in the URL website property, which is then displayed unsanitized in the affiliate-preview.php tag generation screen, leading to a persistent cross-sit... Read more
Affected Products : revive_adserver- EPSS Score: %1.10
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22870
A path traversal vulnerability was identified in GitHub Pages builds on GitHub Enterprise Server that could allow an attacker to read system files. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on... Read more
Affected Products : enterprise_server- EPSS Score: %0.46
- Published: Nov. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-22869
An improper access control vulnerability in GitHub Enterprise Server allowed a workflow job to execute in a self-hosted runner group it should not have had access to. This affects customers using self-hosted runner groups for access control. A repository ... Read more
Affected Products : enterprise_server- EPSS Score: %0.39
- Published: Sep. 24, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-22868
A path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read f... Read more
Affected Products : enterprise_server- EPSS Score: %0.28
- Published: Sep. 24, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22867
A path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read f... Read more
Affected Products : enterprise_server- EPSS Score: %0.46
- Published: Jul. 14, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-22866
A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an... Read more
Affected Products : enterprise_server- EPSS Score: %0.20
- Published: May. 14, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22865
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appro... Read more
Affected Products : enterprise_server- EPSS Score: %0.23
- Published: Apr. 02, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-22864
A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to... Read more
Affected Products : enterprise_server- EPSS Score: %2.50
- Published: Mar. 23, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-22863
An improper access control vulnerability was identified in the GitHub Enterprise Server GraphQL API that allowed authenticated users of the instance to modify the maintainer collaboration permission of a pull request without proper authorization. By explo... Read more
- EPSS Score: %0.46
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22862
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with the ability to fork a repository to disclose Actions secrets for the parent repository of the fork. This vulnerability existed due ... Read more
- EPSS Score: %0.15
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22861
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to gain write access to unauthorized repositories via specifically crafted pull requests and REST API requests. An attacke... Read more
- EPSS Score: %0.46
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-22860
EIC e-document system does not perform completed identity verification for sorting and filtering personnel data. The vulnerability allows remote attacker to obtain users’ credential information without logging in the system, and further acquire the privil... Read more
Affected Products : e-document_system- EPSS Score: %0.91
- Published: Mar. 17, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-22859
The users’ data querying function of EIC e-document system does not filter the special characters which resulted in remote attackers can inject SQL syntax and execute arbitrary commands without privilege.... Read more
Affected Products : e-document_system- EPSS Score: %1.70
- Published: Mar. 17, 2021
- Modified: Nov. 21, 2024