Lavalite CMS Cross Site Scripting vulnerability
Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL.
Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL.
LavaLite CMS v 9.0.0 is vulnerable to Sensitive Data Exposure.
LavaLite CMS v 9.0.0 is vulnerable to Sensitive Data Exposure.
LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS).
LavaLite CMS v 9.0.0 was discovered to be vulnerable to web cache poisoning.
LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.
In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.
Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,".
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS via the Menu Links feature.
A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the New parameter.
A stored cross site scripting (XSS) vulnerability in the /admin/contact/contact component of LavaLite allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the New parameter.
A stored cross site scripting (XSS) vulnerability in the /admin/user/team component of LavaLite allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the New parameter.
LavaLite is vulnerable to Cross Site Scripting (XSS) via the Address field.
LavaLite has XSS via a /edit URI, as demonstrated by client/job/job/Zy8PWBekrJ/edit.
LavaLite is vulnerable to stored cross-site scripting vulnerability, within the blog creation page, which can result in disruption of service and execution of javascript code.