Page 5 of 24 results (0.008 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 1

grav is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') grav es vulnerable a una Neutralización Inapropiada de Entradas Durante la Generación de Páginas Web ("Cross-site Scripting") • https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 1

grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking grav es vulnerable a una Dependencia de Cookies sin comprobación ni Comprobación de Integridad • https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07 https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea • CWE-565: Reliance on Cookies without Validation and Integrity Checking •

CVSS: 8.4EPSS: 5%CPEs: 1EXPL: 4

Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11. Grav es una plataforma web basada en archivos. • https://www.exploit-db.com/exploits/49961 https://github.com/CsEnox/CVE-2021-29440 http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc https://packagist.org/packages/getgrav/grav • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x. El archivo Common/Grav.php en Grav versiones anteriores a 1.7 presenta un Redireccionamiento Abierto. Esto está parcialmente arreglado en la versión1.6.23 y sigue presente en la versión 1.6.x • https://getgrav.org/#changelog https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7 https://github.com/getgrav/grav/issues/3134 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •