Search criteria
6 vulnerabilities found for t3quixplorer by mads_brunn
FKIE_CVE-2011-5005
Vulnerability from fkie_nvd - Published: 2011-12-25 01:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| claudio_klingler | quixplorer | * | |
| claudio_klingler | quixplorer | 1.0 | |
| claudio_klingler | quixplorer | 1.1 | |
| claudio_klingler | quixplorer | 1.2 | |
| claudio_klingler | quixplorer | 1.4 | |
| claudio_klingler | quixplorer | 1.5 | |
| claudio_klingler | quixplorer | 1.6 | |
| claudio_klingler | quixplorer | 2.0 | |
| claudio_klingler | quixplorer | 2.1.1 | |
| claudio_klingler | quixplorer | 2.2 | |
| mads_brunn | t3quixplorer | 1.0.0 | |
| mads_brunn | t3quixplorer | 1.0.1 | |
| mads_brunn | t3quixplorer | 1.0.2 | |
| mads_brunn | t3quixplorer | 1.2.0 | |
| mads_brunn | t3quixplorer | 1.3.0 | |
| mads_brunn | t3quixplorer | 1.4.0 | |
| mads_brunn | t3quixplorer | 1.5.0 | |
| mads_brunn | t3quixplorer | 1.6.0 | |
| mads_brunn | t3quixplorer | 1.7.0 | |
| mads_brunn | t3quixplorer | 1.7.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13FBDE35-7E96-4CB0-AA02-20A54E25C034",
"versionEndIncluding": "2.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "354BBE12-96AA-4F3C-8B51-CFE80E4808D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCFC487-FDA2-4D26-8140-1F16BAA7A658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B19E0034-0B67-4A71-83E8-98A148FF89F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F06FAD64-5233-44BB-9FDA-ED019967B7D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E9541428-5609-43FE-BF9B-49414E64D0B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE410E3-E0AB-4C47-AB4A-7290460BB9BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF42BE37-1569-4D22-9302-B1F5AB12C0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF152CB-58C1-4B9A-87E0-16A7E9EFF7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:claudio_klingler:quixplorer:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "83892CE6-D168-4B03-94C8-CE167326FA60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "BE727C14-8517-4996-8D34-FAF238CB3429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "03A9826B-068A-4923-B3C7-02EA3C732038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C03C88C-5D51-4720-90C8-EDFF288702AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B77C9D-C67F-4D46-928F-50811DEF43F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D26478C-CF65-43D7-81F9-A2EB14F94689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B9A49E-17E4-4118-8AB4-B42259123E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A423F65-9148-4393-BB29-0BCB72557C83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13CB2420-FEDA-41E7-B650-84C71BFC0EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8995BEFE-4E47-47ED-88DA-3BA06D4B2392",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
},
{
"lang": "es",
"value": "Vulnerabilidad de subida no restringida de ficheros en QuiXplorer v2.3 y anteriores permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n al subir un fichero con una extensi\u00f3n ejecutable usando la opci\u00f3n de subir en index.php, accediendo posteriormente mediante una petici\u00f3n directa del fichero en un directorio no especificado"
}
],
"id": "CVE-2011-5005",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-12-25T01:55:04.523",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-1021
Vulnerability from fkie_nvd - Published: 2010-03-19 19:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mads_brunn | t3quixplorer | * | |
| mads_brunn | t3quixplorer | 1.0.0 | |
| mads_brunn | t3quixplorer | 1.0.1 | |
| mads_brunn | t3quixplorer | 1.0.2 | |
| mads_brunn | t3quixplorer | 1.2.0 | |
| mads_brunn | t3quixplorer | 1.3.0 | |
| mads_brunn | t3quixplorer | 1.4.0 | |
| mads_brunn | t3quixplorer | 1.5.0 | |
| mads_brunn | t3quixplorer | 1.6.0 | |
| typo3 | typo3 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A39EDD2-DA0D-4208-A969-44E76D7F1494",
"versionEndIncluding": "1.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "BE727C14-8517-4996-8D34-FAF238CB3429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "03A9826B-068A-4923-B3C7-02EA3C732038",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C03C88C-5D51-4720-90C8-EDFF288702AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B77C9D-C67F-4D46-928F-50811DEF43F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA0BD9C3-199A-4C23-B9E2-FC30C8461B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D26478C-CF65-43D7-81F9-A2EB14F94689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B9A49E-17E4-4118-8AB4-B42259123E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mads_brunn:t3quixplorer:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8A423F65-9148-4393-BB29-0BCB72557C83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1C59B0-CDF2-4F9A-88C7-61E8F18590DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la extensi\u00f3n Typo3 Quixplorer (t3quixplorer) anteriores a v1.7.1 para TYPO3 permite a atacantes remotos inyectar c\u00f3digo web o HTML de su elecci\u00f3n a trav\u00e9s de vectores sin especificar."
}
],
"id": "CVE-2010-1021",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-03-19T19:00:00.937",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/63036"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38993"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/38818"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/63036"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/38993"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/38818"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2011-5005 (GCVE-0-2011-5005)
Vulnerability from cvelistv5 – Published: 2011-12-25 01:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:39.630Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18118",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"name": "quixplorer-index-file-upload(71323)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18118",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"name": "quixplorer-index-file-upload(71323)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18118",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"name": "quixplorer-index-file-upload(71323)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5005",
"datePublished": "2011-12-25T01:00:00",
"dateReserved": "2011-12-24T00:00:00",
"dateUpdated": "2024-08-07T00:23:39.630Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-1021 (GCVE-0-2010-1021)
Vulnerability from cvelistv5 – Published: 2010-03-19 18:35 – Updated: 2024-09-16 19:09
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:06:52.662Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"name": "38993",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38993"
},
{
"name": "38818",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38818"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"name": "63036",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/63036"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-03-19T18:35:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"name": "38993",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38993"
},
{
"name": "38818",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38818"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"name": "63036",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/63036"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1021",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
"refsource": "CONFIRM",
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"name": "38993",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38993"
},
{
"name": "38818",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38818"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"name": "63036",
"refsource": "OSVDB",
"url": "http://osvdb.org/63036"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-1021",
"datePublished": "2010-03-19T18:35:00Z",
"dateReserved": "2010-03-19T00:00:00Z",
"dateUpdated": "2024-09-16T19:09:23.261Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5005 (GCVE-0-2011-5005)
Vulnerability from nvd – Published: 2011-12-25 01:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:39.630Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "18118",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"name": "quixplorer-index-file-upload(71323)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "18118",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"name": "quixplorer-index-file-upload(71323)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unrestricted file upload vulnerability in QuiXplorer 2.3 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension using the upload action to index.php, then accessing it via a direct request to the file in an unspecified directory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "18118",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18118"
},
{
"name": "quixplorer-index-file-upload(71323)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71323"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5005",
"datePublished": "2011-12-25T01:00:00",
"dateReserved": "2011-12-24T00:00:00",
"dateUpdated": "2024-08-07T00:23:39.630Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-1021 (GCVE-0-2010-1021)
Vulnerability from nvd – Published: 2010-03-19 18:35 – Updated: 2024-09-16 19:09
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T01:06:52.662Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"name": "38993",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38993"
},
{
"name": "38818",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/38818"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"name": "63036",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/63036"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-03-19T18:35:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"name": "38993",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38993"
},
{
"name": "38818",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/38818"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"name": "63036",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/63036"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1021",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the Typo3 Quixplorer (t3quixplorer) extension before 1.7.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/",
"refsource": "CONFIRM",
"url": "http://typo3.org/extensions/repository/view/t3quixplorer/1.7.1/"
},
{
"name": "38993",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38993"
},
{
"name": "38818",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38818"
},
{
"name": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/",
"refsource": "CONFIRM",
"url": "http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-006/"
},
{
"name": "63036",
"refsource": "OSVDB",
"url": "http://osvdb.org/63036"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-1021",
"datePublished": "2010-03-19T18:35:00Z",
"dateReserved": "2010-03-19T00:00:00Z",
"dateUpdated": "2024-09-16T19:09:23.261Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}