Page 14 of 80 results (0.012 seconds)

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 3

The Express Entries Dashboard in Concrete5 8.5.4 allows stored XSS via the name field of a new data object at an index.php/dashboard/express/entries/view/ URI. El Express Entries Dashboard en Concrete versión 5 8.5.4, permite almacenar una vulnerabilidad de tipo XSS por medio del campo name de un nuevo objeto de datos en un URI index.php/dashboard/express/entries/view/ Concrete5 version 8.5.4 suffers from a persistent cross site scripting vulnerability. Original discovery of persistent cross site scripting in this version is attributed to nu11secur1ty in March of 2021. • https://www.exploit-db.com/exploits/49721 http://packetstormsecurity.com/files/161600/Concrete5-8.5.4-Cross-Site-Scripting.html http://packetstormsecurity.com/files/161997/Concrete5-8.5.4-Cross-Site-Scripting.html https://documentation.concrete5.org/developers/introduction/version-history https://documentation.concrete5.org/developers/introduction/version-history/855-release-notes https://github.com/Quadron-Research-Lab/CVE/blob/main/CVE-2021-3111.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

Concrete5 up to and including 8.5.2 allows Unrestricted Upload of File with Dangerous Type such as a .php file via File Manager. It is possible to modify site configuration to upload the PHP file and execute arbitrary commands. Concrete5 versiones hasta 8.5.2 incluyéndola, permite la Carga Sin Restricciones de Archivos con un Tipo Peligroso, tales como un archivo .php por medio del File Manager. Es posible modificar la configuración del sitio para cargar el archivo PHP y ejecutar comandos arbitrarios • https://hackerone.com/reports/768322 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file. Concrete5 versiones anteriores a 8.5.3, permite una Carga Sin Restricciones de Archivos con Tipos Peligrosos, como un archivo .phar • https://github.com/concrete5/concrete5/pull/8713 https://github.com/concrete5/concrete5/releases/tag/8.5.3 https://herolab.usd.de/security-advisories https://herolab.usd.de/security-advisories/usd-2020-0041 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value. Concrete5 versiones anteriores a 8.5.3, no restringe la dirección de clasificación a un valor asc o desc válido • https://github.com/concrete5/concrete5/pull/8651 https://github.com/concrete5/concrete5/releases/tag/8.5.3 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

A Cross-Site Scripting (XSS) vulnerability exists in the rcID parameter in Concrete CMS 5.4.1.1 and earlier. Se presenta una vulnerabilidad de tipo Cross-Site Scripting (XSS) en el parámetro rcID en Concrete CMS versión 5.4.1.1 y anteriores. • https://www.openwall.com/lists/oss-security/2011/08/22/11 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •