Vulnerabilities > Textpattern

DATE CVE VULNERABILITY TITLE RISK
2011-09-24 CVE-2011-3807 Information Exposure vulnerability in Textpattern 4.2.0
Textpattern 4.2.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/txplib_db.php and certain other files.
network
low complexity
textpattern CWE-200
5.0
2010-09-03 CVE-2010-3205 Code Injection vulnerability in Textpattern 4.2.0
PHP remote file inclusion vulnerability in index.php in Textpattern CMS 4.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the inc parameter.
network
low complexity
textpattern CWE-94
7.5
2008-12-30 CVE-2008-5757 Cross-Site Scripting vulnerability in Textpattern
Cross-site scripting (XSS) vulnerability in textarea/index.php in Textpattern (aka Txp CMS) 4.0.6 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the Body parameter in an article action.
3.5
2008-12-19 CVE-2008-5670 Credentials Management vulnerability in Textpattern 4.0.5
Textpattern (aka Txp CMS) 4.0.5 does not ask for the old password during a password reset, which makes it easier for remote attackers to change a password after hijacking a session.
6.8
2008-12-19 CVE-2008-5669 Improper Input Validation vulnerability in Textpattern 4.0.5
index.php in the comments preview section in Textpattern (aka Txp CMS) 4.0.5 allows remote attackers to cause a denial of service via a long message parameter.
network
low complexity
textpattern CWE-20
5.0
2008-12-19 CVE-2008-5668 Cross-Site Scripting vulnerability in Textpattern 4.0.5
Multiple cross-site scripting (XSS) vulnerabilities in Textpattern (aka Txp CMS) 4.0.5 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to setup/index.php or (2) the name parameter to index.php in the comments preview section.
4.3
2006-10-31 CVE-2006-5615 Remote File Include vulnerability in Textpattern 1.19
PHP remote file inclusion vulnerability in publish.php in Textpattern 1.19, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the txpcfg[txpath] parameter.
network
low complexity
textpattern
7.5