Vulnerabilities (CVE)

Filtered by vendor Textpattern Subscribe
Filtered by product Textpattern
Total 27 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2011-5019 1 Textpattern 1 Textpattern 2023-12-10 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in setup/index.php in Textpattern CMS 4.4.1, when the product is incompletely installed, allows remote attackers to inject arbitrary web script or HTML via the ddb parameter.
CVE-2011-3807 1 Textpattern 1 Textpattern 2023-12-10 5.0 MEDIUM N/A
Textpattern 4.2.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/txplib_db.php and certain other files.
CVE-2008-5669 1 Textpattern 1 Textpattern 2023-12-10 5.0 MEDIUM N/A
index.php in the comments preview section in Textpattern (aka Txp CMS) 4.0.5 allows remote attackers to cause a denial of service via a long message parameter.
CVE-2008-5670 1 Textpattern 1 Textpattern 2023-12-10 6.8 MEDIUM N/A
Textpattern (aka Txp CMS) 4.0.5 does not ask for the old password during a password reset, which makes it easier for remote attackers to change a password after hijacking a session.
CVE-2008-5668 1 Textpattern 1 Textpattern 2023-12-10 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Textpattern (aka Txp CMS) 4.0.5 allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to setup/index.php or (2) the name parameter to index.php in the comments preview section.
CVE-2008-5757 1 Textpattern 1 Textpattern 2023-12-10 3.5 LOW N/A
Cross-site scripting (XSS) vulnerability in textarea/index.php in Textpattern (aka Txp CMS) 4.0.6 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the Body parameter in an article action. NOTE: some of these details are obtained from third party information.
CVE-2006-5615 1 Textpattern 1 Textpattern 2023-12-10 7.5 HIGH N/A
PHP remote file inclusion vulnerability in publish.php in Textpattern 1.19, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the txpcfg[txpath] parameter.