Vulnerability Details : CVE-2009-3819
Unspecified vulnerability in the Random Images (maag_randomimage) extension 1.6.4 and earlier for TYPO3 allows remote attackers to execute arbitrary shell commands via unspecified vectors.
Exploit prediction scoring system (EPSS) score for CVE-2009-3819
Probability of exploitation activity in the next 30 days: 0.20%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 57 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-3819
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2009-3819
-
http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-014/
Patch;Vendor Advisory
Products affected by CVE-2009-3819
- cpe:2.3:a:urs_maag:maag_randomimage:*:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:urs_maag:maag_randomimage:1.1.3:*:*:*:*:*:*:*