Filtered by vendor Liferay
Subscriptions
Total
165 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-15841 | 1 Liferay | 2 Dxp, Liferay Portal | 2024-11-21 | 8.3 High |
Liferay Portal before 7.3.0, and Liferay DXP 7.0 before fix pack 89, 7.1 before fix pack 17, and 7.2 before fix pack 4, does not safely test a connection to a LDAP server, which allows remote attackers to obtain the LDAP server's password via the Test LDAP Connection feature. | ||||
CVE-2020-15840 | 1 Liferay | 2 Dxp, Liferay Portal | 2024-11-21 | 5.3 Medium |
In Liferay Portal before 7.3.1, Liferay Portal 6.2 EE, and Liferay DXP 7.2, DXP 7.1 and DXP 7.0, the property 'portlet.resource.id.banned.paths.regexp' can be bypassed with doubled encoded URLs. | ||||
CVE-2020-15839 | 1 Liferay | 2 Digital Experience Platform, Liferay Portal | 2024-11-21 | 6.5 Medium |
Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files. | ||||
CVE-2020-13445 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | 8.8 High |
In Liferay Portal before 7.3.2 and Liferay DXP 7.0 before fix pack 92, 7.1 before fix pack 18, and 7.2 before fix pack 6, the template API does not restrict user access to sensitive objects, which allows remote authenticated users to execute arbitrary code via crafted FreeMarker and Velocity templates. | ||||
CVE-2020-13444 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | 6.5 Medium |
Liferay Portal 7.x before 7.3.2, and Liferay DXP 7.0 before fix pack 92, 7.1 before fix pack 18, and 7.2 before fix pack 5 does not sanitize the information returned by the DDMDataProvider API, which allows remote authenticated users to obtain the password to REST Data Providers. | ||||
CVE-2019-6588 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
In Liferay Portal before 7.1 CE GA4, an XSS vulnerability exists in the SimpleCaptcha API when custom code passes unsanitized input into the "url" parameter of the JSP taglib call <liferay-ui:captcha url="<%= url %>" /> or <liferay-captcha:captcha url="<%= url %>" />. Liferay Portal out-of-the-box behavior with no customizations is not vulnerable. | ||||
CVE-2019-16891 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | 9.8 Critical |
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload. | ||||
CVE-2019-16147 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | 6.1 Medium |
Liferay Portal through 7.2.0 GA1 allows XSS via a journal article title to journal_article/page.jsp in journal/journal-taglib. | ||||
CVE-2019-11444 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
An issue was discovered in Liferay Portal CE 7.1.2 GA3. An attacker can use Liferay's Groovy script console to execute OS commands. Commands can be executed via a [command].execute() call, as demonstrated by "def cmd =" in the ServerAdminPortlet_script value to group/control_panel/manage. Valid credentials for an application administrator user account are required. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scripts and therefore not a design flaw | ||||
CVE-2018-10795 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
Liferay 6.2.x and before has an FCKeditor configuration that allows an attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment via a browser/liferay/browser.html?Type= or html/js/editor/fckeditor/editor/filemanager/browser/liferay/browser.html URI. NOTE: the vendor disputes this issue because file upload is an expected feature, subject to Role Based Access Control checks where only authenticated users with proper permissions can upload files | ||||
CVE-2017-17868 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
In Liferay Portal 6.1.0, the tags section has XSS via a Public Render Parameter (p_r_p) value, as demonstrated by p_r_p_564233524_tag. | ||||
CVE-2017-12649 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
XSS exists in Liferay Portal before 7.0 CE GA4 via a crafted title or summary that is mishandled in the Web Content Display. | ||||
CVE-2017-12648 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
XSS exists in Liferay Portal before 7.0 CE GA4 via a bookmark URL. | ||||
CVE-2017-12647 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
XSS exists in Liferay Portal before 7.0 CE GA4 via a Knowledge Base article title. | ||||
CVE-2017-12646 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
XSS exists in Liferay Portal before 7.0 CE GA4 via a login name, password, or e-mail address. | ||||
CVE-2017-12645 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
XSS exists in Liferay Portal before 7.0 CE GA4 via an invalid portletId. | ||||
CVE-2017-1000425 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in the /html/portal/flash.jsp page in Liferay Portal CE 7.0 GA4 and older allows remote attackers to inject arbitrary web script or HTML via a javascript: URI in the "movie" parameter. | ||||
CVE-2016-6517 | 1 Liferay | 1 Liferay | 2024-11-21 | N/A |
Directory traversal vulnerability in Liferay 5.1.0 allows remote attackers to have unspecified impact via a %2E%2E (encoded dot dot) in the minifierBundleDir parameter to barebone.jsp. | ||||
CVE-2016-3670 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in users.jsp in the Profile Search functionality in Liferay before 7.0.0 CE RC1 allows remote attackers to inject arbitrary web script or HTML via the FirstName field. | ||||
CVE-2016-10404 | 1 Liferay | 1 Liferay Portal | 2024-11-21 | N/A |
XSS exists in Liferay Portal before 7.0 CE GA4 via a crafted redirect field to modules/apps/foundation/frontend-js/frontend-js-spa-web/src/main/resources/META-INF/resources/init.jsp. |