6 results (0.025 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

pagekit all versions, as of 15-10-2021, is vulnerable to SQL Injection via Comment listing. pagekit todas las versiones, a partir del 15-10-2021, es vulnerable a una Inyección SQL por medio del listado de comentarios • https://huntr.dev/bounties/82f09b08-ceeb-4249-8855-b8bc718c4868 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Pagekit before 1.0.14 has a /user/login?redirect= open redirect vulnerability. Pagekit, en versiones anteriores a la 1.0.14, tiene una vulnerabilidad de redirección abierta en /user/login?redirect=. • https://github.com/pagekit/pagekit/issues/905 https://github.com/pagekit/pagekit/releases/tag/1.0.14 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 4

Stored XSS in YOOtheme Pagekit 1.0.13 and earlier allows a user to upload malicious code via the picture upload feature. A user with elevated privileges could upload a photo to the system in an SVG format. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/poc.svg" that will point to http://localhost/pagekit/storage/poc.svg. When a user comes along to click that link, it will trigger a XSS attack. • https://www.exploit-db.com/exploits/44837 https://github.com/GeunSam2/CVE-2018-11564 http://ruffsecurity.blogspot.com/2018/05/my-first-cve-found.html https://packetstormsecurity.com/files/148001/PageKit-CMS-1.0.13-Cross-Site-Scripting.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01. Se descubrió un problema en Pagekit CMS en versiones anteriores a 1.0.11. • https://www.exploit-db.com/exploits/41143 http://www.securityfocus.com/bid/95806 https://github.com/pagekit/pagekit/commit/e0454f9c037c427a5ff76a57e78dbf8cc00c268b https://securelayer7.net/download/pdf/SecureLayer7-Pentest-report-Pagekit-CMS.pdf https://securelayer7.net/download/poc/password-reset-vulnerability-exploit-ruby-pagekit-cms.rb.txt • CWE-640: Weak Password Recovery Mechanism for Forgotten Password •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Open redirect vulnerability in YOOtheme Pagekit CMS 0.8.7 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect parameter to index.php/user/logout. Vulnerabilidad de la liberación abierta en YOOtheme Pagekit CMS 0.8.7 permite a atacantes remotos redirigir usuarios hacia sitios web arbitrarios y realizar ataques de phishing a través de una URL en el parámetro redirect en index.php/user/logout. Pagekit version 0.8.7 suffers from cross site scripting and open redirect vulnerabilities. • http://packetstormsecurity.com/files/128641/Pagekit-0.8.7-Cross-Site-Scripting-Open-Redirect.html •