Page 6 of 54 results (0.013 seconds)

CVSS: 5.0EPSS: 0%CPEs: 82EXPL: 0

TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing." TYPO3 4.5.0 anterior a 4.5.34, 4.7.0 anterior a 4.7.19, 6.0.0 anterior a 6.0.14, 6.1.0 anterior a 6.1.9 y 6.2.0 anterior a 6.2.3 permite a atacantes remotos tener impacto no especificado a través de una cabecera de anfitrión HTTP manipulada, relacionado con 'falsificación de anfitrión.' • http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001 http://www.debian.org/security/2014/dsa-2942 http://www.openwall.com/lists/oss-security/2014/06/03/2 • CWE-20: Improper Input Validation •

CVSS: 6.0EPSS: 0%CPEs: 76EXPL: 0

The Color Picker Wizard component in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, and 6.1.0 before 6.1.9 allows remote authenticated editors to execute arbitrary PHP code via a serialized PHP object. El componente Color Picker Wizard en TYPO3 4.5.0 anterior a 4.5.34, 4.7.0 anterior a 4.7.19, 6.0.0 anterior a 6.0.14 y 6.1.0 anterior a 6.1.9 permite a editores remotos autenticados ejecutar código PHP arbitrario a través de un objeto PHP serializado. • http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001 http://www.debian.org/security/2014/dsa-2942 http://www.openwall.com/lists/oss-security/2014/06/03/2 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.0EPSS: 0%CPEs: 43EXPL: 0

The Backend History Module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 does not properly restrict access, which allows remote authenticated editors to read the history of arbitrary records via a crafted URL. El módulo Backend History en TYPO3 4.5.x anterior a 4.5.21, 4.6.x anterior a 4.6.14 y 4.7.x anterior a 4.7.6 no restringe debidamente acceso, lo que permite a editores remotos autenticados leer la historia de registros arbitrarios a través de una URL manipulada. • http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.6EPSS: 0%CPEs: 70EXPL: 0

Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in the Extbase Framework in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6, when the Rewritten Property Mapper is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message. NOTE: this might be the same vulnerability as CVE-2013-7072. Cross-site scripting (XSS) en el método errorAction en la clase base ActionController en el Framwork Extbase en TYPO3 4.5.0 hasta  4.5.31, 4.7.0 hasta  4.7.16, 6.0.0 hasta 6.0.11 y 6.1.0 hasta 6.1.6, cuando la propiedad Rewritten Mapper está activada, que permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de una entrada no especificada, que se traduce en un mensaje de error. NOTA: esta podría ser la misma vulnerabilidad CVE-2.013-7.072. • http://osvdb.org/100885 http://seclists.org/oss-sec/2013/q4/473 http://seclists.org/oss-sec/2013/q4/487 http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004 http://www.securityfocus.com/bid/64239 https://exchange.xforce.ibmcloud.com/vulnerabilities/89629 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 68EXPL: 0

The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated backend users to unserialize arbitrary PHP objects, delete arbitrary files, and possibly have other unspecified impacts via an unspecified parameter, related to a "missing signature." El componente Content Editing Wizards para TYPO3 v4.5.0 hasta v4.5.31, v4.7.0 hasta v4.7.16, v6.0.0 hasta v6.0.11, y v6.1.0 hasta v6.1.6 permite a usuarios del backend autenticados desserializar objetos PHP, eliminar cualquier fichero, y posiblemente tener otros impactos no especificados a través de un parámetro sin especificar, relacionado con una "falta de firma". • http://seclists.org/oss-sec/2013/q4/473 http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004 http://www.debian.org/security/2014/dsa-2834 • CWE-310: Cryptographic Issues •