Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pivotx pivotx 2.3.11 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2015-5457
PivotX prior to 2.3.11 does not validate the new file extension when renaming a file with multiple extensions, which allows remote malicious users to execute arbitrary code by uploading a crafted file, as demonstrated by a file named foo.php.php.
Pivotx Pivotx
605
VMScore
CVE-2015-5458
Session fixation vulnerability in fileupload.php in PivotX prior to 2.3.11 allows remote malicious users to hijack web sessions via the sess parameter.
Pivotx Pivotx
578
VMScore
CVE-2017-14958
lib.php in PivotX 2.3.11 does not properly block uploads of dangerous file types by admin users, which allows remote PHP code execution via an upload of a .php file.
Pivotx Pivotx 2.3.11
578
VMScore
CVE-2017-8402
PivotX 2.3.11 allows remote authenticated users to execute arbitrary PHP code via vectors involving an upload of a .htaccess file.
Pivotx Pivotx 2.3.11
578
VMScore
CVE-2017-7570
PivotX 2.3.11 allows remote authenticated Advanced users to execute arbitrary PHP code by performing an upload with a safe file extension (such as .jpg) and then invoking the duplicate function to change to the .php extension.
Pivotx Pivotx 2.3.11
383
VMScore
CVE-2017-9332
The smarty_self function in modules/module_smarty.php in PivotX 2.3.11 mishandles the URI, allowing XSS via vectors involving quotes in the self Smarty tag.
Pivotx Pivotx 2.3.11
383
VMScore
CVE-2015-5456
Cross-site scripting (XSS) vulnerability in the form method in modules/formclass.php in PivotX prior to 2.3.11 allows remote malicious users to inject arbitrary web script or HTML via the PATH_INFO, related to the "PHP_SELF" variable and form actions.
Pivotx Pivotx
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started