Filtered by vendor Modx
Subscribe
Total
43 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-8115 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information. | |||||
CVE-2017-7324 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter. | |||||
CVE-2017-7323 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism. | |||||
CVE-2017-7322 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 6.8 MEDIUM | 8.1 HIGH |
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate. | |||||
CVE-2017-7321 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI. | |||||
CVE-2017-7320 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a denial of service (cookie quota exhaustion), or conduct HTTP Response Splitting attacks with resultant XSS, via an invalid parameter value. | |||||
CVE-2017-11744 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module. | |||||
CVE-2017-1000223 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS. | |||||
CVE-2017-1000067 | 1 Modx | 1 Revolution | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges. | |||||
CVE-2016-10039 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/getfiles. | |||||
CVE-2016-10038 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove. | |||||
CVE-2016-10037 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist. | |||||
CVE-2015-6588 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) vulnerability in login-fsp.html in MODX Revolution before 1.9.1 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING. | |||||
CVE-2014-8992 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in manager/assets/fileapi/FileAPI.flash.image.swf in MODX Revolution 2.3.2-pl allows remote attackers to inject arbitrary web script or HTML via the callback parameter. | |||||
CVE-2014-8775 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 5.0 MEDIUM | N/A |
MODX Revolution 2.x before 2.2.15 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | |||||
CVE-2014-8774 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in manager/index.php in MODX Revolution 2.x before 2.2.15 allows remote attackers to inject arbitrary web script or HTML via the context_key parameter. | |||||
CVE-2014-8773 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 6.8 MEDIUM | N/A |
MODX Revolution 2.x before 2.2.15 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism by (1) omitting the CSRF token or via a (2) long string in the CSRF token parameter. | |||||
CVE-2014-5451 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in MODX Revolution 2.3.1-pl and earlier allows remote attackers to inject arbitrary web script or HTML via the "a" parameter to manager/. NOTE: this issue exists because of a CVE-2014-2080 regression. | |||||
CVE-2014-2736 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in MODX Revolution before 2.2.14 allow remote attackers to execute arbitrary SQL commands via the (1) session ID (PHPSESSID) to index.php or remote authenticated users to execute arbitrary SQL commands via the (2) user parameter to connectors/security/message.php or (3) id parameter to manager/index.php. | |||||
CVE-2014-2311 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in modx.class.php in MODX Revolution 2.0.0 before 2.2.13 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. |