12 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php Un problema en Pagekit v1.0.18 permite a un atacante remoto ejecutar código arbitrario a través de las funciones "thedownloadAction" y "updateAction" en "UpdateController.php". • https://github.com/pagekit/pagekit/issues/977 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files Se presenta una vulnerabilidad de carga de archivos en la funcionalidad storage de pagekit versión 1.0.18, que permite a un atacante descargar archivos maliciosos • https://github.com/pagekit/pagekit/issues/970 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit. Una vulnerabilidad de tipo cross-site scripting (XSS) en Pagekit CMS versión v1.0.18, permite a atacantes ejecutar scripts web o HTML arbitrarios por medio de una carga útil diseñada inyectada en el cuadro de texto Markdown bajo /blog/post/edit • https://github.com/pagekit/pagekit/issues/968 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

pagekit all versions, as of 15-10-2021, is vulnerable to SQL Injection via Comment listing. pagekit todas las versiones, a partir del 15-10-2021, es vulnerable a una Inyección SQL por medio del listado de comentarios • https://huntr.dev/bounties/82f09b08-ceeb-4249-8855-b8bc718c4868 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack. • https://github.com/pagekit/pagekit/issues/963 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •