Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
revolution vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2018-17556
MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action.
Modx Modx Revolution 2.6.5
7.2
CVSSv3
CVE-2018-1000207
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. Thi...
Modx Modx Revolution
7.5
CVSSv3
CVE-2018-1000208
MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have b...
Modx Modx Revolution
5.4
CVSSv3
CVE-2018-10382
MODX Revolution 2.6.3 has XSS.
Modx Modx Revolution 2.6.3
5.4
CVSSv3
CVE-2017-1000223
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and previous versions. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims...
Modx Modx Revolution
6.1
CVSSv3
CVE-2015-6588
Cross-site scripting (XSS) vulnerability in login-fsp.html in MODX Revolution prior to 1.9.1 allows remote malicious users to inject arbitrary web script or HTML via the QUERY_STRING.
Modx Modx Revolution
6.1
CVSSv3
CVE-2017-11744
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module.
Modx Modx Revolution 2.5.7
8.8
CVSSv3
CVE-2017-1000067
MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges.
Modx Revolution 2.5.5
Modx Revolution 2.4.0
Modx Revolution 2.3.0
Modx Revolution 2.2.5
Modx Revolution 2.2.3
Modx Revolution 2.2.1
Modx Revolution 2.1.5
Modx Revolution 2.1.3
Modx Revolution 2.0.0
Modx Revolution 2.5.3
Modx Revolution 2.5.2
Modx Revolution 2.5.1
Modx Revolution 2.5.0
Modx Revolution 2.2.0
Modx Revolution 2.2.9
Modx Revolution 2.2.8
Modx Revolution 2.2.7
Modx Revolution 2.2.6
Modx Revolution 2.1.1
Modx Revolution 2.1.0
Modx Revolution 2.5.6
Modx Revolution 2.5.4
7
CVSSv3
CVE-2017-9067
In MODX Revolution prior to 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
Modx Modx Revolution 2.5.6
Php Php 5.3.3
6.1
CVSSv3
CVE-2017-9068
In MODX Revolution prior to 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
Modx Modx Revolution
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »