Htmly

Htmly

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.2%
  • Veröffentlicht 03.08.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:13:56

The "content" field in the "regular post" page of the "add content" menu under "dashboard" in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send authenticated post-http requests to add / content and...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 03.08.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:13:56

The "blog title" field in the "Settings" menu "config" page of "dashboard" in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send an authenticated post HTTP request to admin/config and inject arbitra...

Exploit
  • EPSS 0.87%
  • Veröffentlicht 03.08.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:13:56

In htmly version 2.8.1, is vulnerable to an Arbitrary File Deletion on the local host when delete backup files. The vulnerability may allow a remote attacker to delete arbitrary know files on the host.

Exploit
  • EPSS 1.52%
  • Veröffentlicht 21.05.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 05:14:04

An arbitrary file deletion vulnerability was discovered on htmly v2.7.5 which allows remote attackers to use any absolute path to delete any file in the server should they gain Administrator privileges.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 13.04.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 06:04:20

htmly 2.8.0 allows stored XSS via the blog title, Tagline, or Description to config.html.php.

Exploit
  • EPSS 0.48%
  • Veröffentlicht 08.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:49:44

Multiple cross-site scripting (XSS) vulnerabilities in HTMLy 2.7.4 allow remote attackers to inject arbitrary web script or HTML via the (1) destination parameter to delete feature; the (2) destination parameter to edit feature; (3) content parameter...