Filtered by vendor Modx
Subscribe
Total
43 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-14518 | 1 Modx | 1 Evolution Cms | 2019-08-21 | 3.5 LOW | 5.4 MEDIUM |
** DISPUTED ** Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel." | |||||
CVE-2018-16638 | 1 Modx | 1 Evolution Cms | 2019-02-26 | 3.5 LOW | 5.4 MEDIUM |
Evolution CMS 1.4.x allows XSS via the manager/ search parameter. | |||||
CVE-2018-16637 | 1 Modx | 1 Evolution Cms | 2019-02-26 | 3.5 LOW | 5.4 MEDIUM |
Evolution CMS 1.4.x allows XSS via the page weblink title parameter to the manager/ URI. | |||||
CVE-2018-20756 | 1 Modx | 1 Modx Revolution | 2019-02-06 | 4.3 MEDIUM | 6.1 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs. | |||||
CVE-2018-20757 | 1 Modx | 1 Modx Revolution | 2019-02-06 | 4.3 MEDIUM | 6.1 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name. | |||||
CVE-2018-20755 | 1 Modx | 1 Modx Revolution | 2019-02-06 | 4.3 MEDIUM | 6.1 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via the User Photo field. | |||||
CVE-2018-17556 | 1 Modx | 1 Modx Revolution | 2018-11-15 | 3.5 LOW | 5.4 MEDIUM |
MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action. | |||||
CVE-2014-5451 | 1 Modx | 1 Modx Revolution | 2018-10-09 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in MODX Revolution 2.3.1-pl and earlier allows remote attackers to inject arbitrary web script or HTML via the "a" parameter to manager/. NOTE: this issue exists because of a CVE-2014-2080 regression. | |||||
CVE-2018-1000208 | 1 Modx | 1 Modx Revolution | 2018-09-07 | 6.4 MEDIUM | 7.5 HIGH |
MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13980. | |||||
CVE-2018-10382 | 1 Modx | 1 Modx Revolution | 2018-06-27 | 3.5 LOW | 5.4 MEDIUM |
MODX Revolution 2.6.3 has XSS. | |||||
CVE-2017-1000223 | 1 Modx | 1 Modx Revolution | 2017-12-01 | 3.5 LOW | 5.4 MEDIUM |
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS. | |||||
CVE-2015-6588 | 1 Modx | 1 Modx Revolution | 2017-09-02 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) vulnerability in login-fsp.html in MODX Revolution before 1.9.1 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING. | |||||
CVE-2010-4883 | 1 Modx | 1 Revolution | 2017-08-28 | 2.6 LOW | N/A |
Cross-site scripting (XSS) vulnerability in manager/index.php in MODx Revolution 2.0.2-pl allows remote attackers to inject arbitrary web script or HTML via the modhash parameter. | |||||
CVE-2017-11744 | 1 Modx | 1 Modx Revolution | 2017-08-02 | 4.3 MEDIUM | 6.1 MEDIUM |
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module. | |||||
CVE-2017-1000067 | 1 Modx | 1 Revolution | 2017-07-21 | 6.5 MEDIUM | 8.8 HIGH |
MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges. | |||||
CVE-2017-9067 | 2 Modx, Php | 2 Modx Revolution, Php | 2017-05-31 | 4.4 MEDIUM | 7.0 HIGH |
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal. | |||||
CVE-2017-9071 | 1 Modx | 1 Modx Revolution | 2017-05-30 | 2.6 LOW | 4.7 MEDIUM |
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning. | |||||
CVE-2017-9068 | 1 Modx | 1 Modx Revolution | 2017-05-30 | 4.3 MEDIUM | 6.1 MEDIUM |
In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter. | |||||
CVE-2017-9069 | 1 Modx | 1 Modx Revolution | 2017-05-30 | 6.5 MEDIUM | 8.8 HIGH |
In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess. | |||||
CVE-2017-9070 | 1 Modx | 1 Modx Revolution | 2017-05-30 | 3.5 LOW | 5.4 MEDIUM |
In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php. |