CVE-2014-6288
Published Oct 3, 2014
Last updated 10 years ago
Overview
- Description
- The powermail extension 2.x before 2.0.11 for TYPO3 allows remote attackers to bypass the CAPTCHA protection mechanism via unspecified vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- Per http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/, only version 2.0.0 - 2.0.10 are vulnerable.
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.0:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "852C029A-368F-4842-B476-D4D0FF28984E" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.1:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "A263A4C5-8DFC-4E27-9933-F91E4E2975DF" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.2:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "808FBA6A-46FB-4D03-97E4-CDD0FF7E9D2B" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.3:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "B5EE43D3-2ECC-42E4-BE59-B45EFB7A2012" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.4:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "99FBC6DE-94B0-4519-8037-850B925EC275" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.5:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "5F362ED4-18ED-4694-A7DB-EE1C681211C2" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.6:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "8B1C1B4D-687A-49D9-8FF5-4C478D6E6582" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.7:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "6C6DF662-67CD-47E1-98B2-1485A59431DF" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.8:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "3D9ABB8B-B020-4EE7-ABA1-1931FB206405" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.9:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "1700A775-8FCF-4FA3-96E6-6464ED0332A5" }, { "criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.10:*:*:*:*:typo3:*:*", "vulnerable": true, "matchCriteriaId": "82F57D30-B6FF-4A8D-94EE-E6355B9E12B1" } ], "operator": "OR" } ] } ]