Page 2 of 16 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. En Lavalite versión 9.0.0, la cookie XSRF-TOKEN es vulnerable a ataques de salto de ruta, permitiendo el acceso de lectura a archivos arbitrarios en el servidor • https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/LavaLite • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,". Se presenta una vulnerabilidad de tipo Cross Site Scripting (XSS) en LavaLite CMS versión 5.8.0, por medio de la funcionalidad Menu Blocks, que puede ser omitida al usar manejadores de eventos HTML, como "ontoggle," • https://github.com/LavaLite/cms/issues/320 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature. Una vulnerabilidad de tipo Cross Site Scripting (XSS) en LavaLite-CMS versión 5.8.0, por medio de la funcionalidad Menu Links • https://github.com/LavaLite/cms/issues/319 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A stored cross site scripting (XSS) vulnerability in the /admin/contact/contact component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter. Una vulnerabilidad de tipo cross site scripting (XSS) almacenada en el componente /admin/contact/contact de LavaLite versión 5.8.0 permite a atacantes autenticados ejecutar scripts web o HTML arbitrario por medio de una carga útil diseñada introducida en el parámetro "New" • https://github.com/LavaLite/cms/issues/323 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter. Una vulnerabilidad de tipo cross site scripting (XSS) almacenada en el componente /admin/roles/role de LavaLite versión 5.8.0 permite a atacantes autenticados ejecutar scripts web o HTML arbitrario por medio de una carga útil diseñada introducida en el parámetro "New" • https://github.com/LavaLite/cms/issues/322 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •