CVE-2018-14059
- EPSS 0.01%
- Veröffentlicht 24.08.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:48:32
Pimcore allows XSS via Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes function...
CVE-2018-14057
- EPSS 0.01%
- Veröffentlicht 17.08.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:48:32
Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the X-pimcore-csrf-token anti-CSRF token only in the "Settings > Users / Roles" function.
CVE-2018-14058
- EPSS 1.51%
- Veröffentlicht 17.08.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:48:32
Pimcore before 5.3.0 allows SQL Injection via the REST web service API.
CVE-2015-4426
- EPSS 0%
- Veröffentlicht 18.08.2015 17:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
SQL injection vulnerability in pimcore before build 3473 allows remote attackers to execute arbitrary SQL commands via the filter parameter to admin/asset/grid-proxy.
CVE-2015-4425
- EPSS 0.03%
- Veröffentlicht 18.08.2015 17:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
Directory traversal vulnerability in pimcore before build 3473 allows remote authenticated users with the "assets" permission to create or write to arbitrary files via a .. (dot dot) in the dir parameter to admin/asset/add-asset-compatibility.
CVE-2014-2921
- EPSS 0.46%
- Veröffentlicht 21.04.2014 22:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object ...
CVE-2014-2922
- EPSS 0.22%
- Veröffentlicht 21.04.2014 22:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injectio...