Hortusfox

Hortusfox

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.08.2025 00:00:00
  • Zuletzt bearbeitet 18.08.2025 15:12:38

A cross-site scripting (XSS) vulnerability in the /controller/admin.php endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the email parameter.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 13.08.2025 00:00:00
  • Zuletzt bearbeitet 15.08.2025 20:18:52

A zip slip vulnerability in the /modules/ImportModule.php component of hortusfox-web v4.4 allows attackers to execute arbitrary code via a crafted archive.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.08.2025 00:00:00
  • Zuletzt bearbeitet 18.08.2025 15:12:46

A cross-site scripting (XSS) vulnerability in the /Calendar endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the add function.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 13.08.2025 00:00:00
  • Zuletzt bearbeitet 18.08.2025 15:01:11

A cross-site scripting (XSS) vulnerability in the TextBlockModule.php component of hortusfox-web v4.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name parameter.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.08.2025 00:00:00
  • Zuletzt bearbeitet 15.08.2025 20:08:43

A cross-site scripting (XSS) vulnerability in the /tasks endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the title parameter.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 23.01.2025 22:15:15
  • Zuletzt bearbeitet 14.08.2025 20:59:28

HortusFox v3.9 contains a stored XSS vulnerability in the "Add Plant" function. The name input field does not sanitize or escape user inputs, allowing attackers to inject and execute arbitrary JavaScript payloads.