CVE-2014-6288

The powermail extension 2.x before 2.0.11 for TYPO3 allows remote attackers to bypass the CAPTCHA protection mechanism via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:alex_kellner:powermail:2.0.0:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.1:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.2:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.3:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.4:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.5:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.6:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.7:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.8:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.9:*:*:*:*:typo3:*:*
cpe:2.3:a:alex_kellner:powermail:2.0.10:*:*:*:*:typo3:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://typo3.org/extensions/repository/view/powermail - () http://typo3.org/extensions/repository/view/powermail -
References () http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/ - Vendor Advisory () http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/ - Vendor Advisory

Information

Published : 2014-10-03 14:55

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6288

Mitre link : CVE-2014-6288

CVE.ORG link : CVE-2014-6288


JSON object : View

Products Affected

alex_kellner

  • powermail
CWE
CWE-264

Permissions, Privileges, and Access Controls