Page 9 of 45 results (0.022 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The start function in class.t3lib_formmail.php in TYPO3 before 4.0.5, 4.1beta, and 4.1RC1 allows attackers to inject arbitrary email headers via unknown vectors. NOTE: some details were obtained from third party information. La función start en class.t3lib_formmail.php en TYPO3 anterior a 4.0.5, 4.1beta, y 4.1RC1 permite a atacantes remotos inyectar cabeceras email de su elección a través de vectores desconocidos. NOTA: Algunos de estos detalles se obtuvieron de información de terceros. • http://osvdb.org/33471 http://secunia.com/advisories/24207 http://typo3.org/teams/security/security-bulletins/typo3-20070221-1 http://www.securityfocus.com/bid/22668 http://www.vupen.com/english/advisories/2007/0697 https://exchange.xforce.ibmcloud.com/vulnerabilities/32630 •

CVSS: 7.5EPSS: 4%CPEs: 6EXPL: 4

rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php in Typo3 4.0.0 through 4.0.3, 3.7 and 3.8 with the rtehtmlarea extension, and 4.1 beta allows remote authenticated users to execute arbitrary commands via shell metacharacters in the userUid parameter to rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, and possibly another vector. rtehtmlarea/pi1/class.tx_rtehtmlarea_pi1.php en Typo3 4.0.0 hasta 4.0.3, 3.7 y 3.8 con la extensión rtehtmlarea, y 4.1 beta, permite a atacantes remotos autenticados ejecutar comandos de su elección mediante metacaracteres del intérprete de comandos (shell) a través del parámetro userUid en rtehtmlarea/htmlarea/plugins/SpellChecker/spell-check-logic.php, y posiblemente otro vector. • https://www.exploit-db.com/exploits/29300 http://lists.netfielders.de/pipermail/typo3-announce/2006/000045.html http://lists.netfielders.de/pipermail/typo3-announce/2006/000046.html http://secunia.com/advisories/23446 http://secunia.com/advisories/23466 http://securityreason.com/securityalert/2056 http://securitytracker.com/id?1017428 http://typo3.org/news-single-view/?tx_newsimporter_pi1%5BshowItem%5D=0&cHash=e4a40a11a9 http://www.sec-consult.com/272.html http://www.securityfocus.com&#x •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in class.tx_indexedsearch.php in the Indexed Search 2.9.0 extension for Typo3 before 4.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the search parameter. Vulnerabilidad de XSS en class.tx_indexedsearch.php en la extensión Indexed Search 2.9.0 para Typo3 en versiones anteriores a 4.0.2 y versiones anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través del parámetro de búsqueda. • http://marc.info/?l=full-disclosure&m=115918334930694&w=2 http://secunia.com/advisories/22071 http://securityreason.com/securityalert/1646 http://typo3.org/teams/security/security-bulletins/typo3-20060911-1 http://www.securityfocus.com/archive/1/446885/100/0/threaded http://www.securityfocus.com/bid/20173 http://www.vupen.com/english/advisories/2006/3782 https://exchange.xforce.ibmcloud.com/vulnerabilities/29128 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 1

TYPO3 3.7.1 allows remote attackers to obtain sensitive information via a direct request to (1) thumbs.php, (2) showpic.php, or (3) tables.php, which causes them to incorrectly define a variable and reveal the path in an error message when a require function call fails. • http://bugs.typo3.org/view.php?id=2248 http://secunia.com/advisories/18546 http://securityreason.com/securityalert/361 http://www.irmplc.com/advisory015.htm http://www.osvdb.org/22665 http://www.osvdb.org/22666 http://www.osvdb.org/22667 http://www.securityfocus.com/archive/1/422360/100/0/threaded http://www.securityfocus.com/archive/1/422390/100/0/threaded http://www.vupen.com/english/advisories/2006/0269 https://exchange.xforce.ibmcloud.com/vulnerabilities/24244 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

TYPO3 3.8.0 and earlier allows remote attackers to obtain sensitive information via a direct request to misc/phpcheck/, which invokes the phpinfo function and prints values of unspecified environment variables. • http://bugs.typo3.org/view.php?id=1250 http://typo3.org/teams/security/security-bulletins/typo3-20050725-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/42457 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •