CVE-2021-23265
A logged-in and authenticated user with a Reviewer Role may lock a content item. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku Kaynak: National Vulnerability Database
A logged-in and authenticated user with a Reviewer Role may lock a content item. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku Kaynak: National Vulnerability Database
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes. Devamını Oku
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes. Devamını Oku
Unauthenticated remote attackers can read textual content via FreeMarker including files /scripts/*, /templates/* and some of the files in /.git/* (non-binary). Devamını Oku
Unauthenticated remote attackers can read textual content via FreeMarker including files /scripts/*, /templates/* and some of the files in /.git/* (non-binary). Devamını Oku
Authenticated administrators may modify the main YAML configuration file and load a Java class resulting in RCE. Devamını Oku
Authenticated administrators may modify the main YAML configuration file and load a Java class resulting in RCE. Devamını Oku
Authenticated administrators may override the system configuration file and cause a denial of service. Devamını Oku
Authenticated administrators may override the system configuration file and cause a denial of service. Devamını Oku
Authenticated users with Site roles may inject XSS scripts via file names that will execute in the browser for this and other users of the same site. Devamını Oku
Authenticated users with Site roles may inject XSS scripts via file names that will execute in the browser for this and other users of the same site. Devamını Oku
Authenticated users with Administrator or Developer roles may execute OS commands by Groovy Script which uses Groovy lib to render a webpage. The groovy script does not have security restrictions, which will cause attackers to execute arbitrary commands remotely(RCE). Devamını Oku