S9y

Serendipity

53 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Veröffentlicht 16.05.2023 14:15:09
  • Zuletzt bearbeitet 23.01.2025 17:15:10

An arbitrary file upload vulnerability in Serendipity 2.4-beta1 allows attackers to execute arbitrary code via a crafted HTML or Javascript file.

  • EPSS 3.8%
  • Veröffentlicht 25.03.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 04:56:27

Serendipity before 2.3.4 on Windows allows remote attackers to execute arbitrary code because the filename of a renamed file may end with a dot. This file may then be renamed to have a .php filename.

  • EPSS 1.67%
  • Veröffentlicht 26.11.2019 05:15:12
  • Zuletzt bearbeitet 21.11.2024 01:31:49

Serendipity before 1.6 has an XSS issue in the karma plugin which may allow privilege escalation.

  • EPSS 0.86%
  • Veröffentlicht 05.11.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 01:25:37

Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in plugins/ExtendedFileManager/manager.php and plugins/ImageManager/manager.php.

  • EPSS 5%
  • Veröffentlicht 05.11.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 01:25:37

Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in the image manager.

  • EPSS 0.86%
  • Veröffentlicht 05.11.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 01:25:37

Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code via plugins/ExtendedFileManager/backend.php.

  • EPSS 0.75%
  • Veröffentlicht 24.05.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 02:44:39

serendipity_moveMediaDirectory in Serendipity 2.0.3 allows remote attackers to upload and execute arbitrary PHP code because it mishandles an extensionless filename during a rename, as demonstrated by "php" as a filename.

  • EPSS 0.44%
  • Veröffentlicht 09.05.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:55

Serendipity before 2.1.5 has XSS via EXIF data that is mishandled in the templates/2k11/admin/media_choose.tpl Editor Preview feature or the templates/2k11/admin/media_items.tpl Media Library feature.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 16.01.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 02:44:37

Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.

  • EPSS 0.32%
  • Veröffentlicht 17.11.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Serendipity 2.0.3 is vulnerable to a SQL injection in the blog component resulting in information disclosure