Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sitefinity
(Progress)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 16 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-07-03 | CVE-2017-9248 | Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise. | Sitefinity, Ui_for_asp\.net_ajax | 9.8 | ||
2023-04-10 | CVE-2023-29375 | An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potentially dangerous file upload through the SharePoint connector. | Sitefinity | 9.8 | ||
2023-04-10 | CVE-2023-29376 | An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potential XSS by privileged users in Sitefinity to media libraries. | Sitefinity | 5.4 | ||
2024-02-28 | CVE-2024-1632 | Low-privileged users with access to the Sitefinity backend may obtain sensitive information from the site's administrative area. | Sitefinity | 6.5 | ||
2024-02-28 | CVE-2024-1636 | Potential Cross-Site Scripting (XSS) in the page editing area. | Sitefinity | 5.4 | ||
2023-12-20 | CVE-2023-6784 | A malicious user could potentially use the Sitefinity system for the distribution of phishing emails. | Sitefinity | 4.3 | ||
2024-06-16 | CVE-2023-27636 | Progress Sitefinity before 15.0.0 allows XSS by authenticated users via the content form in the SF Editor. | Sitefinity | 5.4 | ||
2019-06-06 | CVE-2019-7215 | Progress Sitefinity 10.1.6536 does not invalidate session cookies upon logouts. It instead tries to overwrite the cookie in the browser, but it remains valid on the server side. This means the cookie can be reused to maintain access to the account, even if the account credentials and permissions are changed. | Sitefinity | 6.5 | ||
2019-11-26 | CVE-2019-17392 | Progress Sitefinity 12.1 has a Weak Password Recovery Mechanism for a Forgotten Password because the HTTP Host header is mishandled. | Sitefinity | N/A | ||
2018-09-27 | CVE-2018-17055 | An arbitrary file upload vulnerability in Progress Sitefinity CMS versions 4.0 through 11.0 related to image uploads. | Sitefinity | 7.5 |