Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms@4.7.16
Typecomposer
Namespacetypo3
Namecms
Version4.7.16
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.4.35
Latest_non_vulnerable_version12.2.0
Affected_by_vulnerabilities
0
url VCID-p8m8-y53c-cubn
vulnerability_id VCID-p8m8-y53c-cubn
summary
TYPO3 vulnerable to Information Disclosure via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7073
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50906
published_at 2026-04-07T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50988
published_at 2026-04-21T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.51009
published_at 2026-04-18T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.51003
published_at 2026-04-16T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50965
published_at 2026-04-13T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50981
published_at 2026-04-12T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50864
published_at 2026-04-01T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.50922
published_at 2026-04-02T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.50948
published_at 2026-04-04T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.51002
published_at 2026-04-11T12:55:00Z
10
value 0.00275
scoring_system epss
scoring_elements 0.5096
published_at 2026-04-09T12:55:00Z
11
value 0.00275
scoring_system epss
scoring_elements 0.50963
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7073
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
12
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
13
reference_url http://seclists.org/oss-sec/2013/q4/487
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/487
14
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
15
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
16
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
17
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7073
reference_id CVE-2013-7073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7073
19
reference_url https://github.com/advisories/GHSA-4rpv-g4gq-rh4m
reference_id GHSA-4rpv-g4gq-rh4m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4rpv-g4gq-rh4m
fixed_packages
0
url pkg:composer/typo3/cms@4.7.17
purl pkg:composer/typo3/cms@4.7.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.7.17
1
url pkg:composer/typo3/cms@6.0.12
purl pkg:composer/typo3/cms@6.0.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@6.0.12
2
url pkg:composer/typo3/cms@6.1.7
purl pkg:composer/typo3/cms@6.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@6.1.7
aliases CVE-2013-7073, GHSA-4rpv-g4gq-rh4m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8m8-y53c-cubn
1
url VCID-y9d1-wwne-hba5
vulnerability_id VCID-y9d1-wwne-hba5
summary several
references
0
reference_url http://osvdb.org/100881
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://osvdb.org/100881
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7074
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56394
published_at 2026-04-18T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56361
published_at 2026-04-13T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56355
published_at 2026-04-04T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56363
published_at 2026-04-21T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56379
published_at 2026-04-12T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56403
published_at 2026-04-11T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56393
published_at 2026-04-16T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.56387
published_at 2026-04-08T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56336
published_at 2026-04-07T12:55:00Z
9
value 0.00335
scoring_system epss
scoring_elements 0.56223
published_at 2026-04-01T12:55:00Z
10
value 0.00335
scoring_system epss
scoring_elements 0.56333
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
10
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
11
reference_url http://seclists.org/oss-sec/2013/q4/487
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/487
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/89620
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/89620
13
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7074
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7074
15
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
16
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
17
reference_url http://www.securityfocus.com/bid/64245
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/64245
18
reference_url https://github.com/advisories/GHSA-r8m7-792j-5jvq
reference_id GHSA-r8m7-792j-5jvq
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r8m7-792j-5jvq
fixed_packages
0
url pkg:composer/typo3/cms@4.7.17
purl pkg:composer/typo3/cms@4.7.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.7.17
1
url pkg:composer/typo3/cms@6.0.12
purl pkg:composer/typo3/cms@6.0.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@6.0.12
2
url pkg:composer/typo3/cms@6.1.7
purl pkg:composer/typo3/cms@6.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@6.1.7
aliases CVE-2013-7074, GHSA-r8m7-792j-5jvq
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9d1-wwne-hba5
2
url VCID-zqqe-vew2-nbfk
vulnerability_id VCID-zqqe-vew2-nbfk
summary
TYPO3 vulnerable to Insecure Unserialize via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated backend users to unserialize arbitrary PHP objects, delete arbitrary files, and possibly have other unspecified impacts via an unspecified parameter, related to a "missing signature."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7075
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61209
published_at 2026-04-21T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.6106
published_at 2026-04-01T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61138
published_at 2026-04-02T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-04T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61132
published_at 2026-04-07T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.6118
published_at 2026-04-08T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61195
published_at 2026-04-09T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61215
published_at 2026-04-11T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61202
published_at 2026-04-12T12:55:00Z
9
value 0.00408
scoring_system epss
scoring_elements 0.61183
published_at 2026-04-13T12:55:00Z
10
value 0.00408
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-16T12:55:00Z
11
value 0.00408
scoring_system epss
scoring_elements 0.61228
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7075
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
9
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
10
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7075
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7075
12
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
13
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
14
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
15
reference_url https://github.com/advisories/GHSA-47ww-mq32-g4xw
reference_id GHSA-47ww-mq32-g4xw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-47ww-mq32-g4xw
fixed_packages
0
url pkg:composer/typo3/cms@4.7.17
purl pkg:composer/typo3/cms@4.7.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.7.17
1
url pkg:composer/typo3/cms@6.0.12
purl pkg:composer/typo3/cms@6.0.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@6.0.12
2
url pkg:composer/typo3/cms@6.1.7
purl pkg:composer/typo3/cms@6.1.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@6.1.7
aliases CVE-2013-7075, GHSA-47ww-mq32-g4xw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zqqe-vew2-nbfk
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.7.16