CVE-2019-15485
- EPSS 0.31%
- Veröffentlicht 23.08.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:28:50
Bolt before 3.6.10 has XSS via createFolder or createFile in Controller/Async/FilesystemManager.php.
CVE-2019-15484
- EPSS 0.31%
- Veröffentlicht 23.08.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:28:50
Bolt before 3.6.10 has XSS via an image's alt or title field.
CVE-2019-15483
- EPSS 0.22%
- Veröffentlicht 23.08.2019 13:15:11
- Zuletzt bearbeitet 21.11.2024 04:28:50
Bolt before 3.6.10 has XSS via a title that is mishandled in the system log.
CVE-2019-10874
- EPSS 0.41%
- Veröffentlicht 05.04.2019 05:29:03
- Zuletzt bearbeitet 21.11.2024 04:20:01
Cross Site Request Forgery (CSRF) in the bolt/upload File Upload feature in Bolt CMS 3.6.6 allows remote attackers to execute arbitrary code by uploading a JavaScript file to include executable extensions in the file/edit/config/config.yml configurat...
CVE-2019-9185
- EPSS 1.04%
- Veröffentlicht 07.03.2019 23:29:02
- Zuletzt bearbeitet 21.11.2024 04:51:09
Controller/Async/FilesystemManager.php in the filemanager in Bolt before 3.6.5 allows remote attackers to execute arbitrary PHP code by renaming a previously uploaded file to have a .php extension.
CVE-2017-16754
- EPSS 0.38%
- Veröffentlicht 10.11.2017 02:29:19
- Zuletzt bearbeitet 20.04.2025 01:37:25
Bolt before 3.3.6 does not properly restrict access to _profiler routes, related to EventListener/ProfilerListener.php and Provider/EventListenerServiceProvider.php.
CVE-2017-11128
- EPSS 0.28%
- Veröffentlicht 17.07.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Bolt CMS 3.2.14 allows stored XSS via text input, as demonstrated by the Title field of a New Entry.
CVE-2017-11127
- EPSS 0.28%
- Veröffentlicht 17.07.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Bolt CMS 3.2.14 allows stored XSS by uploading an SVG document with a "Content-Type: image/svg+xml" header.
CVE-2015-7309
- EPSS 60.27%
- Veröffentlicht 22.09.2015 15:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The theme editor in Bolt before 2.2.5 does not check the file extension when renaming files, which allows remote authenticated users to execute arbitrary code by renaming a crafted file and then directly accessing it.