43 results (0.007 seconds)

CVSS: 7.2EPSS: 1%CPEs: 1EXPL: 2

MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator. MODX Revolution versiones hasta 2.8.3-pl, permite a administradores remotos autenticados ejecutar código arbitrario al subir un archivo ejecutable, ya que la configuración de Tipos de Archivos para Subir puede ser cambiada por un administrador. MODX Revolution version 2.8.3-pl suffers from an authenticated remote code execution vulnerability. • https://www.exploit-db.com/exploits/51059 http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). Se detectó una vulnerabilidad de entidad externa XML (XXE) en el componente modRestServiceRequest en MODX CMS versión 2.7.3, que puede conllevar a una divulgación de información o denegación de servicio (DOS) • https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md https://github.com/modxcms/revolution/issues/15237 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 3

Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel. ** EN DISPUTA ** Evolution CMS 2.0.x permite XSS a través de una descripción y una nueva ubicación de categoría en una plantilla. NOTA: el proveedor indica que el comportamiento es consistente con la "política de acceso en el panel de administración" • https://github.com/evolution-cms/evolution/issues/1041 https://github.com/evolution-cms/evolution/issues/1042 https://github.com/evolution-cms/evolution/issues/1043 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 7EXPL: 1

Fred MODX Revolution < 1.0.0-beta5 is affected by: Incorrect Access Control - CWE-648. The impact is: Remote Code Execution. The component is: assets/components/fred/web/elfinder/connector.php. The attack vector is: Uploading a PHP file or change data in the database. The fixed version is: https://github.com/modxcms/fred/commit/139cefac83b2ead90da23187d92739dec79d3ccd and https://github.com/modxcms/fred/commit/01f0a3d1ae7f3970639c2a0db1887beba0065246. • https://www.youtube.com/watch?v=vOlw2DP9WbE • CWE-269: Improper Privilege Management CWE-648: Incorrect Use of Privileged APIs •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php. MODX Revolution Gallery versión 1.7.0, está afectado por: CWE-434: Carga sin Restricciones de Archivos con Tipos Peligrosos. • https://modx.pro/security/15912#comment-99640 https://modx.today/posts/2018/07/critical-security-vulnerability-in-gallery-1.7.1 • CWE-434: Unrestricted Upload of File with Dangerous Type •