Описание
Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields.
Ссылки
- Vendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5.3 (включая)
Одновременно
Одно из
cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.13:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.14:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.15:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.3.16:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.12:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.15:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.16:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.17:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.4.18:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:alex_kellner:powermail:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*
EPSS
Процентиль: 39%
0.00178
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
github
больше 3 лет назад
Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields.
EPSS
Процентиль: 39%
0.00178
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-noinfo