cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-26296,https://securityvulnerability.io/vulnerability/CVE-2021-26296,Cross-Site Request Forgery (CSRF) vulnerability in Apache MyFaces,"In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.",Apache,Apache Myfaces Core,7.5,HIGH,0.0049299998208880424,false,,false,false,false,,,false,false,,2021-02-19T08:30:14.000Z,0 CVE-2011-4343,https://securityvulnerability.io/vulnerability/CVE-2011-4343,,Information disclosure vulnerability in Apache MyFaces Core 2.0.1 through 2.0.10 and 2.1.0 through 2.1.4 allows remote attackers to inject EL expressions via crafted parameters.,Apache,Myfaces,7.5,HIGH,0.0021100000012665987,false,,false,false,false,,,false,false,,2017-08-08T21:00:00.000Z,0 CVE-2016-5019,https://securityvulnerability.io/vulnerability/CVE-2016-5019,,"CoreResponseStateManager in Apache MyFaces Trinidad 1.0.0 through 1.0.13, 1.2.x before 1.2.15, 2.0.x before 2.0.2, and 2.1.x before 2.1.2 might allow attackers to conduct deserialization attacks via a crafted serialized view state string.",Apache,Myfaces Trinidad,9.8,CRITICAL,0.010809999890625477,false,,false,false,false,,,false,false,,2016-10-03T18:00:00.000Z,0 CVE-2011-4367,https://securityvulnerability.io/vulnerability/CVE-2011-4367,,Multiple directory traversal vulnerabilities in MyFaces JavaServer Faces (JSF) in Apache MyFaces Core 2.0.x before 2.0.12 and 2.1.x before 2.1.6 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) ln parameter to faces/javax.faces.resource/web.xml or (2) the PATH_INFO to faces/javax.faces.resource/.,Apache,Myfaces,,,0.11131999641656876,false,,false,false,false,,,false,false,,2014-06-19T14:00:00.000Z,0 CVE-2010-2057,https://securityvulnerability.io/vulnerability/CVE-2010-2057,,"shared/util/StateUtils.java in Apache MyFaces 1.1.x before 1.1.8, 1.2.x before 1.2.9, and 2.0.x before 2.0.1 uses an encrypted View State without a Message Authentication Code (MAC), which makes it easier for remote attackers to perform successful modifications of the View State via a padding oracle attack.",Apache,Myfaces,,,0.0027199999894946814,false,,false,false,false,,,false,false,,2010-10-20T17:00:00.000Z,0 CVE-2010-2086,https://securityvulnerability.io/vulnerability/CVE-2010-2086,,"Apache MyFaces 1.1.7 and 1.2.8, as used in IBM WebSphere Application Server and other applications, does not properly handle an unencrypted view state, which allows remote attackers to conduct cross-site scripting (XSS) attacks or execute arbitrary Expression Language (EL) statements via vectors that involve modifying the serialized view object.",Apache,Myfaces,,,0.018160000443458557,false,,false,false,false,,,false,false,,2010-05-27T19:00:00.000Z,0 CVE-2007-3101,https://securityvulnerability.io/vulnerability/CVE-2007-3101,,"Multiple cross-site scripting (XSS) vulnerabilities in certain JSF applications in Apache MyFaces Tomahawk before 1.1.6 allow remote attackers to inject arbitrary web script via the autoscroll parameter, which is injected into Javascript that is sent to the client.",Apache,Myfaces Tomahawk,,,0.26954999566078186,false,,false,false,false,,,false,false,,2007-06-18T10:00:00.000Z,0