Filtered by vendor Pluxml
Subscriptions
Total
16 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-22636 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 8.8 High |
PluXml Blog v5.8.9 was discovered to contain a remote code execution (RCE) vulnerability in the Static Pages feature. This vulnerability is exploited via injecting a crafted payload into the Content field. | ||||
CVE-2022-25020 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 5.4 Medium |
A cross-site scripting (XSS) vulnerability in Pluxml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the thumbnail path of a blog post. | ||||
CVE-2022-25018 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 8.8 High |
Pluxml v5.8.7 was discovered to allow attackers to execute arbitrary code via crafted PHP code inserted into static pages. | ||||
CVE-2022-24587 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 5.4 Medium |
A stored cross-site scripting (XSS) vulnerability in the component core/admin/medias.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML. | ||||
CVE-2022-24586 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 5.4 Medium |
A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters. | ||||
CVE-2022-24585 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 5.4 Medium |
A stored cross-site scripting (XSS) vulnerability in the component /core/admin/comment.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the author parameter. | ||||
CVE-2021-38603 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 4.8 Medium |
PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field. | ||||
CVE-2021-38602 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 4.8 Medium |
PluXML 5.8.7 allows Article Editing stored XSS via Headline or Content. | ||||
CVE-2020-18185 | 1 Pluxml | 1 Pluxml | 2024-11-21 | 9.8 Critical |
class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrary PHP code by modify the configuration file in a linux environment. | ||||
CVE-2017-1001001 | 1 Pluxml | 1 Pluxml | 2024-11-21 | N/A |
PluXml version 5.6 is vulnerable to stored cross-site scripting vulnerability, within the article creation page, which can result in escalation of privileges. | ||||
CVE-2012-4675 | 1 Pluxml | 1 Pluxml | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in PluXml 5.1.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to file update. | ||||
CVE-2012-4674 | 1 Pluxml | 1 Pluxml | 2024-11-21 | N/A |
PluXml before 5.1.6 allows remote attackers to obtain the installation path via the PHPSESSID. | ||||
CVE-2012-2227 | 1 Pluxml | 1 Pluxml | 2024-11-21 | N/A |
Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter. | ||||
CVE-2007-3542 | 1 Pluxml | 1 Pluxml | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in admin/auth.php in Pluxml 0.3.1 allows remote attackers to inject arbitrary web script or HTML via the msg parameter. | ||||
CVE-2007-3432 | 1 Pluxml | 1 Pluxml | 2024-11-21 | N/A |
Unrestricted file upload vulnerability in admin/images.php in Pluxml 0.3.1 allows remote attackers to upload and execute arbitrary PHP code via a .jpg filename. | ||||
CVE-2024-48138 | 1 Pluxml | 1 Pluxml | 2024-11-01 | 9.8 Critical |
A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template. |
Page 1 of 1.