Page 7 of 35 results (0.007 seconds)

CVSS: 5.0EPSS: 18%CPEs: 24EXPL: 1

The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request. El mecanismo jumpUrl en la biblioteca class.tslib_fe.php en TYPO3 versión 3.3.x hasta 3.8.x, versión 4.0 anterior a 4.0.12, versión 4.1 anterior a 4.1.10, versión 4.2 anterior a 4.2.6 y versión 4.3alpha1, filtra un hash secreto (juHash) en un mensaje de error, que permite a los atacantes remotos leer archivos arbitrarios mediante la inclusión del hash en una petición. • https://www.exploit-db.com/exploits/8038 http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002 http://www.debian.org/security/2009/dsa-1720 http://www.openwall.com/lists/oss-security/2009/02/10/6 http://www.securitytracker.com/id?1021710 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 18EXPL: 0

SQL injection vulnerability in the indexed_search system extension in TYPO3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en la extensión del sistema indexed_search, en TYPO3 3.x, 4.0 hasta 4.0.7, y 4.1 hasta 4.1.3. Permite que usuarios autenticados remotamente ejecuten, a su elección, comandos SQL usando vectores sin especificar. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457446 http://osvdb.org/39506 http://secunia.com/advisories/27969 http://secunia.com/advisories/28243 http://securitytracker.com/id?1019146 http://typo3.org/teams/security/security-bulletins/typo3-20071210-1 http://www.debian.org/security/2007/dsa-1439 http://www.securityfocus.com/bid/26871 http://www.vupen.com/english/advisories/2007/4205 https://exchange.xforce.ibmcloud.com/vulnerabilities/39017 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from third party information. La función start en class.t3lib_formmail.php en TYPO3 anterior a 4.0.5, 4.1beta, y 4.1RC1 permite a atacantes remotos inyectar cabeceras email de su elección a través de vectores desconocidos. NOTA: Algunos de estos detalles se obtuvieron de información de terceros. • http://osvdb.org/33471 http://secunia.com/advisories/24207 http://typo3.org/teams/security/security-bulletins/typo3-20070221-1 http://www.securityfocus.com/bid/22668 http://www.vupen.com/english/advisories/2007/0697 https://exchange.xforce.ibmcloud.com/vulnerabilities/32630 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in class.tx_indexedsearch.php in the Indexed Search 2.9.0 extension for Typo3 before 4.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter. Vulnerabilidad de XSS en class.tx_indexedsearch.php en la extensión Indexed Search 2.9.0 para Typo3 en versiones anteriores a 4.0.2 y versiones anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro de búsqueda. • http://marc.info/?l=full-disclosure&m=115918334930694&w=2 http://secunia.com/advisories/22071 http://securityreason.com/securityalert/1646 http://typo3.org/teams/security/security-bulletins/typo3-20060911-1 http://www.securityfocus.com/archive/1/446885/100/0/threaded http://www.securityfocus.com/bid/20173 http://www.vupen.com/english/advisories/2006/3782 https://exchange.xforce.ibmcloud.com/vulnerabilities/29128 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

TYPO3 3.8.0 and earlier allows remote attackers to obtain sensitive information via a direct request to misc/phpcheck/, which invokes the phpinfo function and prints values of unspecified environment variables. • http://bugs.typo3.org/view.php?id=1250 http://typo3.org/teams/security/security-bulletins/typo3-20050725-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/42457 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •