Filtered by vendor Textpattern
Subscriptions
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2011-3807 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
Textpattern 4.2.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/txplib_db.php and certain other files. | ||||
CVE-2010-3205 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
PHP remote file inclusion vulnerability in index.php in Textpattern CMS 4.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter. | ||||
CVE-2008-5757 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in textarea/index.php in Textpattern (aka Txp CMS) 4.0.6 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the Body parameter in an article action. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-5670 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
Textpattern (aka Txp CMS) 4.0.5 does not ask for the old password during a password reset, which makes it easier for remote attackers to change a password after hijacking a session. | ||||
CVE-2008-5669 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
index.php in the comments preview section in Textpattern (aka Txp CMS) 4.0.5 allows remote attackers to cause a denial of service via a long message parameter. | ||||
CVE-2008-5668 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Textpattern (aka Txp CMS) 4.0.5 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to setup/index.php or (2) the name parameter to index.php in the comments preview section. | ||||
CVE-2006-5615 | 1 Textpattern | 1 Textpattern | 2024-11-21 | N/A |
PHP remote file inclusion vulnerability in publish.php in Textpattern 1.19, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the txpcfg[txpath] parameter. |