Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pivotx pivotx vulnerabilities and exploits
(subscribe to this query)
312
VMScore
CVE-2014-0341
Multiple cross-site scripting (XSS) vulnerabilities in PivotX prior to 2.3.9 allow remote authenticated users to inject arbitrary web script or HTML via the title field to (1) templates_internal/pages.tpl, (2) templates_internal/home.tpl, or (3) templates_internal/entries.tpl; (4...
Pivotx Pivotx 2.3.7
Pivotx Pivotx 2.3.6
Pivotx Pivotx 2.3.5
Pivotx Pivotx 2.3.3
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.1.1
Pivotx Pivotx
Pivotx Pivotx 2.3.2
Pivotx Pivotx 2.2.5
Pivotx Pivotx 2.1.2
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.3.0
Pivotx Pivotx 2.2.3
668
VMScore
CVE-2014-0342
Multiple unrestricted file upload vulnerabilities in fileupload.php in PivotX prior to 2.3.9 allow remote authenticated users to execute arbitrary PHP code by uploading a file with a (1) .php or (2) .php# extension, and then accessing it via unspecified vectors.
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.3.2
Pivotx Pivotx 2.2.5
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.2.3
Pivotx Pivotx
Pivotx Pivotx 2.3.7
Pivotx Pivotx 2.3.6
Pivotx Pivotx 2.3.5
Pivotx Pivotx 2.1.2
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.3.3
Pivotx Pivotx 2.3.0
435
VMScore
CVE-2012-2274
Cross-site scripting (XSS) vulnerability in pivotx/ajaxhelper.php in PivotX 2.3.2 and previous versions allows remote malicious users to inject arbitrary web script or HTML via the file parameter.
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx
Pivotx Pivotx 2.2.3
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.2
1 EDB exploit
668
VMScore
CVE-2011-1035
The password reset in PivotX prior to 2.2.4 allows remote malicious users to modify the passwords of arbitrary users via unspecified vectors.
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.2
Pivotx Pivotx
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.2.2
Pivotx Pivotx 2.2.1
435
VMScore
CVE-2011-0773
Cross-site scripting (XSS) vulnerability in pivotx/modules/module_image.php in PivotX prior to 2.2.3 allows remote malicious users to inject arbitrary web script or HTML via the image parameter.
Pivotx Pivotx 2.2.0
Pivotx Pivotx
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.1.2
Pivotx Pivotx 2.1.1
1 EDB exploit
440
VMScore
CVE-2011-0772
Multiple cross-site scripting (XSS) vulnerabilities in PivotX 2.2.0, and possibly other versions prior to 2.2.2, allow remote malicious users to inject arbitrary web script or HTML via the (1) color parameter to includes/blogroll.php or (2) src parameter to includes/timwrapper.ph...
Pivotx Pivotx 2.1.1
Pivotx Pivotx 2.1.0
Pivotx Pivotx 2.2.1
Pivotx Pivotx 2.2.0
Pivotx Pivotx 2.1.2
2 EDB exploits
605
VMScore
CVE-2015-5458
Session fixation vulnerability in fileupload.php in PivotX prior to 2.3.11 allows remote malicious users to hijack web sessions via the sess parameter.
Pivotx Pivotx
383
VMScore
CVE-2015-5456
Cross-site scripting (XSS) vulnerability in the form method in modules/formclass.php in PivotX prior to 2.3.11 allows remote malicious users to inject arbitrary web script or HTML via the PATH_INFO, related to the "PHP_SELF" variable and form actions.
Pivotx Pivotx
668
VMScore
CVE-2015-5457
PivotX prior to 2.3.11 does not validate the new file extension when renaming a file with multiple extensions, which allows remote malicious users to execute arbitrary code by uploading a crafted file, as demonstrated by a file named foo.php.php.
Pivotx Pivotx
578
VMScore
CVE-2017-7570
PivotX 2.3.11 allows remote authenticated Advanced users to execute arbitrary PHP code by performing an upload with a safe file extension (such as .jpg) and then invoking the duplicate function to change to the .php extension.
Pivotx Pivotx 2.3.11
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »