Page 7 of 45 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

SQL injection vulnerability in the Frontend MP3 Player (fe_mp3player) 0.2.3 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en la extensión Frontend MP3 Player (fe_mp3player) v0.2.3 y anteriores para TYPO3, permite a atacantes remotos ejecutar comandos SQL de su elección a través de vectores no especificados. • http://osvdb.org/55123 http://secunia.com/advisories/35484 http://typo3.org/extensions/repository/view/fe_mp3player/0.2.4 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-008 http://www.securityfocus.com/bid/35394 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 28EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in the backend user interface in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 allow remote attackers to inject arbitrary web script or HTML via unspecified fields. Múltiples vulnerabilidades de tipo cross-site-scripting (XSS) en la interfaz de usuario backend en TYPO3 versión 3.3.x hasta 3.8.x, versión 4.0 anterior a 4.0.12, versión 4.1 anterior a 4.1.10, versión 4.2 anterior a 4.2.6 y versión 4.3alpha1, permiten a los atacantes remotos inyectar script web o HTML arbitrario por medio de campos no especificados. • http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002 http://www.debian.org/security/2009/dsa-1720 http://www.openwall.com/lists/oss-security/2009/02/10/6 http://www.securitytracker.com/id?1021709 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 18%CPEs: 24EXPL: 1

The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request. El mecanismo jumpUrl en la biblioteca class.tslib_fe.php en TYPO3 versión 3.3.x hasta 3.8.x, versión 4.0 anterior a 4.0.12, versión 4.1 anterior a 4.1.10, versión 4.2 anterior a 4.2.6 y versión 4.3alpha1, filtra un hash secreto (juHash) en un mensaje de error, que permite a los atacantes remotos leer archivos arbitrarios mediante la inclusión del hash en una petición. • https://www.exploit-db.com/exploits/8038 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002 http://www.debian.org/security/2009/dsa-1720 http://www.openwall.com/lists/oss-security/2009/02/10/6 http://www.securitytracker.com/id?1021710 http://web.archive.org/web/20090212165636/http://secunia.com:80/advisories/33829 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 24EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) content of indexed files to the (a) Indexed Search Engine (indexed_search) system extension; (b) unspecified test scripts in the ADOdb system extension; and (c) unspecified vectors in the Workspace module. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en TYPO3 v4.0.0 a v4.0.9, v4.1.0 a 4.1.7 y v4.2.0 a v4.2.3, permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el (1) nombre y (2) el contenido de ficheros indexados para (a) la extensión del sistema Indexed Search Engine (indexed_search), (b) comandos de prueba no especificados en la extensión del sistema ADOb y (c) vectores no especificados en el módulo Workspace. • http://secunia.com/advisories/33617 http://secunia.com/advisories/33679 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001 http://www.debian.org/security/2009/dsa-1711 http://www.securityfocus.com/bid/33376 https://exchange.xforce.ibmcloud.com/vulnerabilities/48133 https://exchange.xforce.ibmcloud.com/vulnerabilities/48135 https://exchange.xforce.ibmcloud.com/vulnerabilities/48136 https://exchange.xforce.ibmcloud.com/vulnerabilities/48137 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 1%CPEs: 24EXPL: 0

The Indexed Search Engine (indexed_search) system extension in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allows remote attackers to execute arbitrary commands via a crafted filename containing shell metacharacters, which is not properly handled by the command-line indexer. Vulnerabilidad no especificada en la extensión del sistema de la Indexed Search Engine (indexed_search) en TYPO3 v4.0.0 a v4.0.9, v4.1.0 a 4.1.7 y v4.2.0 a v4.2.3 permite a atacantes remotos ejecutar comandos de su elección mediante vectores desconocidos relacionados con la la línea de comandos indexer. • http://secunia.com/advisories/33617 http://secunia.com/advisories/33679 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001 http://www.debian.org/security/2009/dsa-1711 http://www.openwall.com/lists/oss-security/2009/01/23/4 http://www.securityfocus.com/bid/33376 https://exchange.xforce.ibmcloud.com/vulnerabilities/48138 • CWE-20: Improper Input Validation •