Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Modx_revolution
(Modx)Repositories | https://github.com/modxcms/revolution |
#Vulnerabilities | 36 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-09-26 | CVE-2018-17556 | MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action. | Modx_revolution | 5.4 | ||
2018-06-01 | CVE-2018-10382 | MODX Revolution 2.6.3 has XSS. | Modx_revolution | 5.4 | ||
2018-07-13 | CVE-2018-1000208 | MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13980. | Modx_revolution | 7.5 | ||
2018-07-13 | CVE-2018-1000207 | MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68. | Modx_revolution | 7.2 | ||
2017-05-18 | CVE-2017-9071 | In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning. | Modx_revolution | 4.7 | ||
2017-05-18 | CVE-2017-9070 | In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php. | Modx_revolution | 5.4 | ||
2017-05-18 | CVE-2017-9069 | In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess. | Modx_revolution | 8.8 | ||
2017-05-18 | CVE-2017-9068 | In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter. | Modx_revolution | 6.1 | ||
2017-05-18 | CVE-2017-9067 | In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal. | Modx_revolution, Php | 7.0 | ||
2017-04-25 | CVE-2017-8115 | Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information. | Modx_revolution | 5.3 |