Modx

Modx Revolution

36 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.21%
  • Published 30.03.2017 07:59:00
  • Last modified 20.04.2025 01:37:25

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the ...

Exploit
  • EPSS 0.55%
  • Published 30.03.2017 07:59:00
  • Last modified 20.04.2025 01:37:25

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via ...

Exploit
  • EPSS 2.18%
  • Published 30.03.2017 07:59:00
  • Last modified 20.04.2025 01:37:25

setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI.

Exploit
  • EPSS 0.31%
  • Published 30.03.2017 07:59:00
  • Last modified 20.04.2025 01:37:25

setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a denial of service (cookie quota exhaustion), or con...

  • EPSS 0.79%
  • Published 24.12.2016 11:59:00
  • Last modified 12.04.2025 10:46:40

Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist.

  • EPSS 0.79%
  • Published 24.12.2016 11:59:00
  • Last modified 12.04.2025 10:46:40

Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove.

  • EPSS 0.79%
  • Published 24.12.2016 11:59:00
  • Last modified 12.04.2025 10:46:40

Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/getfiles.

Exploit
  • EPSS 0.23%
  • Published 22.12.2014 19:59:03
  • Last modified 12.04.2025 10:46:40

Cross-site scripting (XSS) vulnerability in manager/assets/fileapi/FileAPI.flash.image.swf in MODX Revolution 2.3.2-pl allows remote attackers to inject arbitrary web script or HTML via the callback parameter.

Exploit
  • EPSS 5.97%
  • Published 03.12.2014 18:59:06
  • Last modified 12.04.2025 10:46:40

MODX Revolution 2.x before 2.2.15 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Exploit
  • EPSS 0.45%
  • Published 03.12.2014 18:59:05
  • Last modified 12.04.2025 10:46:40

Cross-site scripting (XSS) vulnerability in manager/index.php in MODX Revolution 2.x before 2.2.15 allows remote attackers to inject arbitrary web script or HTML via the context_key parameter.