Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.0:*:*:*:*:typo3:*:*", "matchCriteriaId": "852C029A-368F-4842-B476-D4D0FF28984E", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.1:*:*:*:*:typo3:*:*", "matchCriteriaId": "A263A4C5-8DFC-4E27-9933-F91E4E2975DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.2:*:*:*:*:typo3:*:*", "matchCriteriaId": "808FBA6A-46FB-4D03-97E4-CDD0FF7E9D2B", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.3:*:*:*:*:typo3:*:*", "matchCriteriaId": "B5EE43D3-2ECC-42E4-BE59-B45EFB7A2012", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.4:*:*:*:*:typo3:*:*", "matchCriteriaId": "99FBC6DE-94B0-4519-8037-850B925EC275", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.5:*:*:*:*:typo3:*:*", "matchCriteriaId": "5F362ED4-18ED-4694-A7DB-EE1C681211C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.6:*:*:*:*:typo3:*:*", "matchCriteriaId": "8B1C1B4D-687A-49D9-8FF5-4C478D6E6582", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.7:*:*:*:*:typo3:*:*", "matchCriteriaId": "6C6DF662-67CD-47E1-98B2-1485A59431DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.8:*:*:*:*:typo3:*:*", "matchCriteriaId": "3D9ABB8B-B020-4EE7-ABA1-1931FB206405", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.9:*:*:*:*:typo3:*:*", "matchCriteriaId": "1700A775-8FCF-4FA3-96E6-6464ED0332A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:alex_kellner:powermail:2.0.10:*:*:*:*:typo3:*:*", "matchCriteriaId": "82F57D30-B6FF-4A8D-94EE-E6355B9E12B1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The powermail extension 2.x before 2.0.11 for TYPO3 allows remote attackers to bypass the CAPTCHA protection mechanism via unspecified vectors."}, {"lang": "es", "value": "La extensi\u00f3n de powermail versiones 2.x anteriores a 2.0.11 para TYPO3, permite a los atacantes remotos omitir el mecanismo de protecci\u00f3n CAPTCHA por medio de vectores no especificados."}], "evaluatorComment": "Per http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/, only version 2.0.0 - 2.0.10 are vulnerable.", "id": "CVE-2014-6288", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-10-03T14:55:08.820", "references": [{"source": "cve@mitre.org", "url": "http://typo3.org/extensions/repository/view/powermail"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://typo3.org/extensions/repository/view/powermail"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-006/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}