Vulnerabilities > Textpattern
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-09-24 | CVE-2011-3807 | Information Exposure vulnerability in Textpattern 4.2.0 Textpattern 4.2.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/txplib_db.php and certain other files. | 5.0 |
2010-09-03 | CVE-2010-3205 | Code Injection vulnerability in Textpattern 4.2.0 PHP remote file inclusion vulnerability in index.php in Textpattern CMS 4.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter. | 7.5 |
2008-12-30 | CVE-2008-5757 | Cross-Site Scripting vulnerability in Textpattern Cross-site scripting (XSS) vulnerability in textarea/index.php in Textpattern (aka Txp CMS) 4.0.6 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the Body parameter in an article action. | 3.5 |
2008-12-19 | CVE-2008-5670 | Credentials Management vulnerability in Textpattern 4.0.5 Textpattern (aka Txp CMS) 4.0.5 does not ask for the old password during a password reset, which makes it easier for remote attackers to change a password after hijacking a session. | 6.8 |
2008-12-19 | CVE-2008-5669 | Improper Input Validation vulnerability in Textpattern 4.0.5 index.php in the comments preview section in Textpattern (aka Txp CMS) 4.0.5 allows remote attackers to cause a denial of service via a long message parameter. | 5.0 |
2008-12-19 | CVE-2008-5668 | Cross-Site Scripting vulnerability in Textpattern 4.0.5 Multiple cross-site scripting (XSS) vulnerabilities in Textpattern (aka Txp CMS) 4.0.5 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to setup/index.php or (2) the name parameter to index.php in the comments preview section. | 4.3 |
2006-10-31 | CVE-2006-5615 | Remote File Include vulnerability in Textpattern 1.19 PHP remote file inclusion vulnerability in publish.php in Textpattern 1.19, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the txpcfg[txpath] parameter. | 7.5 |