Page 3 of 30 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess. En MODX Revolution en versiones anteriores a la 2.5.7, usuarios con permisos para subir archivos pueden ejecutar código arbitrarios mediante la subida de un archivo denominado .htaccess. • https://citadelo.com/en/2017/04/modx-revolution-cms https://github.com/modxcms/revolution/pull/13423 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php. En MODX Revolution, en versiones anteriores a la 2.5.7, un usuario con permisos para editar recursos puede inyectar una carga útil XSS en el título de cualquier publicación mediante el parámetro pagetitle en connectors/index.php. • https://citadelo.com/en/2017/04/modx-revolution-cms https://github.com/modxcms/revolution/pull/13415 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism. Las funcionalidades (1) update y (2) package-installation en MODX Revolution 2.5.4-pl y versiones anteriores utiliza por defecto http://rest.modx.com, lo que permite a atacantes man-in-the-middle suplantar servidores y desencadenar la ejecución de código arbitrario aprovechando la falta del mecanismo de protección HTTPS. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate. Las funcionalidades (1) update y (2) package-installation features en MODX Revolution 2.5.4-pl y versiones anteriores no verifican certificados X.509 de servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y activar la ejecución de código arbitrario a través de un certificado manipulado. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf • CWE-295: Improper Certificate Validation •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 1

setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter. setup/templates/findcore.php en MODX Revolution 2.5.4-pl y versiones anteriores permite a atacantes remotos ejecutar código arbitrario PHP a través del parámetro core_path. • http://www.securityfocus.com/bid/97228 https://mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') •