Vulnerabilities > Weseek > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-01-12 | CVE-2021-3852 | Unspecified vulnerability in Weseek Growi growi is vulnerable to Authorization Bypass Through User-Controlled Key | 7.5 |
2021-03-10 | CVE-2021-20671 | Improper Input Validation vulnerability in Weseek Growi 4.2.2 Invalid file validation on the upload feature in GROWI versions v4.2.2 allows a remote attacker with administrative privilege to overwrite the files on the server, which may lead to arbitrary code execution. | 7.2 |
2021-03-10 | CVE-2021-20670 | Unspecified vulnerability in Weseek Growi Improper access control vulnerability in GROWI versions v4.2.2 and earlier allows a remote unauthenticated attacker to read the user's personal information and/or server's internal information via unspecified vectors. | 7.5 |
2020-12-16 | CVE-2020-5683 | Path Traversal vulnerability in Weseek Growi Directory traversal vulnerability in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to alter the data by uploading a specially crafted file. | 7.5 |
2020-12-16 | CVE-2020-5682 | Resource Exhaustion vulnerability in Weseek Growi Improper input validation in GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier GROWI versions prior to v4.2.3 (v4.2 Series), GROWI versions prior to v4.1.12 (v4.1 Series), and GROWI v3 series and earlier allows remote attackers to cause a denial of service via unspecified vectors. | 7.5 |
2020-12-03 | CVE-2020-5676 | Information Exposure vulnerability in Weseek Growi GROWI v4.1.3 and earlier allow remote attackers to obtain information which is not allowed to access via unspecified vectors. | 7.5 |
2019-07-09 | CVE-2019-13338 | Missing Authentication for Critical Function vulnerability in Weseek Growi In WESEEK GROWI before 3.5.0, a remote attacker can obtain the password hash of the creator of a page by leveraging wiki access to make API calls for page metadata. | 7.5 |
2019-07-09 | CVE-2019-13337 | Incorrect Authorization vulnerability in Weseek Growi In WESEEK GROWI before 3.5.0, the site-wide basic authentication can be bypassed by adding a URL parameter access_token (this is the parameter used by the API). | 7.5 |
2019-07-05 | CVE-2019-5968 | Cross-Site Request Forgery (CSRF) vulnerability in Weseek Growi Cross-site request forgery (CSRF) vulnerability in GROWI v3.4.6 and earlier allows remote attackers to hijack the authentication of administrators via updating user's 'Basic Info'. | 8.8 |