Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pivotx vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2014-0341
Multiple cross-site scripting (XSS) vulnerabilities in PivotX prior to 2.3.9 allow remote authenticated users to inject arbitrary web script or HTML via the title field to (1) templates_internal/pages.tpl, (2) templates_internal/home.tpl, or (3) templates_internal/entries.tpl; (4...
Pivotx Pivotx 2.3.7
Pivotx Pivotx 2.3.6
Pivotx Pivotx 2.3.5
Pivotx Pivotx 2.3.3
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.1.1
Pivotx Pivotx
Pivotx Pivotx 2.3.2
Pivotx Pivotx 2.2.5
Pivotx Pivotx 2.1.2
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.3.0
Pivotx Pivotx 2.2.3
7.5
CVSSv2
CVE-2014-0342
Multiple unrestricted file upload vulnerabilities in fileupload.php in PivotX prior to 2.3.9 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) .php or (2) .php# extension, and then accessing it via unspecified vectors.
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.3.2
Pivotx Pivotx 2.2.5
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.2.3
Pivotx Pivotx
Pivotx Pivotx 2.3.7
Pivotx Pivotx 2.3.6
Pivotx Pivotx 2.3.5
Pivotx Pivotx 2.1.2
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.3.3
Pivotx Pivotx 2.3.0
4.3
CVSSv2
CVE-2012-2274
Cross-site scripting (XSS) vulnerability in pivotx/ajaxhelper.php in PivotX 2.3.2 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the file parameter.
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx
Pivotx Pivotx 2.2.3
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.2
1 EDB exploit
7.5
CVSSv2
CVE-2011-1035
The password reset in PivotX prior to 2.2.4 allows remote malicious users to modify the passwords of arbitrary users via unspecified vectors.
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.2
Pivotx Pivotx
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.2.1
4.3
CVSSv2
CVE-2011-0773
Cross-site scripting (XSS) vulnerability in pivotx/modules/module_image.php in PivotX prior to 2.2.3 allows remote malicious users to inject arbitrary web script or HTML via the image parameter.
Pivotx Pivotx 2.2.0
Pivotx Pivotx
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.1.2
Pivotx Pivotx 2.1.1
1 EDB exploit
4.3
CVSSv2
CVE-2011-0772
Multiple cross-site scripting (XSS) vulnerabilities in PivotX 2.2.0, and possibly other versions prior to 2.2.2, allow remote malicious users to inject arbitrary web script or HTML via the (1) color parameter to includes/blogroll.php or (2) src parameter to includes/timwrapper.ph...
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.2
2 EDB exploits
6.8
CVSSv2
CVE-2015-5458
Session fixation vulnerability in fileupload.php in PivotX prior to 2.3.11 allows remote malicious users to hijack web sessions via the sess parameter.
Pivotx Pivotx
4.3
CVSSv2
CVE-2015-5456
Cross-site scripting (XSS) vulnerability in the form method in modules/formclass.php in PivotX prior to 2.3.11 allows remote malicious users to inject arbitrary web script or HTML via the PATH_INFO, related to the "PHP_SELF" variable and form actions.
Pivotx Pivotx
7.5
CVSSv2
CVE-2015-5457
PivotX prior to 2.3.11 does not validate the new file extension when renaming a file with multiple extensions, which allows remote malicious users to execute arbitrary code by uploading a crafted file, as demonstrated by a file named foo.php.php.
Pivotx Pivotx
6.5
CVSSv2
CVE-2017-7570
PivotX 2.3.11 allows remote authenticated Advanced users to execute arbitrary PHP code by performing an upload with a safe file extension (such as .jpg) and then invoking the duplicate function to change to the .php extension.
Pivotx Pivotx 2.3.11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »