Page 15 of 147 results (0.009 seconds)

CVSS: 6.5EPSS: 1%CPEs: 1EXPL: 6

16 Aug 2018 — Pimcore before 5.3.0 allows SQL Injection via the REST web service API. Pimcore en versiones anteriores a la 5.3.0 permite la inyección SQL mediante la API REST de servicio web. Pimcore versions 5.2.3 and below suffer from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. • https://packetstorm.news/files/id/180637 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 5

16 Aug 2018 — Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the X-pimcore-csrf-token anti-CSRF token only in the "Settings > Users / Roles" function. Pimcore en versiones anteriores a la 5.3.0 permite que los atacantes remotos realicen ataques Cross-Site Request Forgery (CSRF) utilizando la validación del token anti-CSRF X-pimcore-csrf-token solo en la función "Settings > Users / Roles". Pimcore versions 5.2.3 and below suffer from cross site... • https://packetstorm.news/files/id/148954 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 5

16 Aug 2018 — Pimcore allows XSS via Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions. Pimcore permite Cross-Site Scripting (XSS) mediante las funciones Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity... • https://packetstorm.news/files/id/148954 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

14 Jul 2015 — SQL injection vulnerability in pimcore before build 3473 allows remote attackers to execute arbitrary SQL commands via the filter parameter to admin/asset/grid-proxy. Vulnerabilidad de inyección SQL en pimcore en versiones anteriores a build 3473, permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro filter a admin/asset/grid-proxy. Pimcore CMS build 3450 suffers from a remote SQL injection vulnerability. • https://packetstorm.news/files/id/132678 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 3

14 Jul 2015 — Directory traversal vulnerability in pimcore before build 3473 allows remote authenticated users with the "assets" permission to create or write to arbitrary files via a .. (dot dot) in the dir parameter to admin/asset/add-asset-compatibility. Vulnerabilidad de salto de directorio en pimcore en versiones anteriores a build 3473, permite a usuarios remotos autenticados con el permiso 'assets' crear o escribir archivos arbitrarios a través de un .. (punto punto) en el parámetro dir a admin/asset/add-asset-com... • https://packetstorm.news/files/id/132677 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 2

21 Apr 2014 — The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a Zend_Pdf_ElementFactory_Proxy object and a pathname with a trailing \0 character. La función getObjectByToken en Newsletter.php en el módulo Pimcore_Tool_Newsletter en pimcore 1.4.9 hasta 2.0.0... • https://www.exploit-db.com/exploits/43886 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 2

21 Apr 2014 — The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object. La función getObjectByToken en Newsletter.php en el módulo Pimcore_Tool_Newsletter en pimcore 1.4.9 hasta 2.1.0 no maneja debidamente un objeto obtenido deserializando... • https://www.exploit-db.com/exploits/43886 • CWE-20: Improper Input Validation •