Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/typo3-src@4.0.2%2Bdebian-3
Typedeb
Namespacedebian
Nametypo3-src
Version4.0.2+debian-3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-133h-9erq-2fhy
vulnerability_id VCID-133h-9erq-2fhy
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3946
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35625
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35635
published_at 2026-04-07T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35681
published_at 2026-04-08T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35703
published_at 2026-04-09T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35713
published_at 2026-04-11T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35669
published_at 2026-04-12T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35646
published_at 2026-04-13T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35686
published_at 2026-04-16T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35676
published_at 2026-04-18T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35527
published_at 2026-04-01T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35728
published_at 2026-04-02T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35754
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3946
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
7
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3946.yaml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3946.yaml
8
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3946
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3946
10
reference_url https://typo3.org/security/advisory/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2014-001
11
reference_url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
12
reference_url http://www.debian.org/security/2014/dsa-2942
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2942
13
reference_url http://www.openwall.com/lists/oss-security/2014/06/03/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/03/2
14
reference_url https://github.com/advisories/GHSA-vccp-5v5h-p8m6
reference_id GHSA-vccp-5v5h-p8m6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vccp-5v5h-p8m6
fixed_packages
aliases CVE-2014-3946, GHSA-vccp-5v5h-p8m6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-133h-9erq-2fhy
1
url VCID-4auu-re6t-p3gu
vulnerability_id VCID-4auu-re6t-p3gu
summary
Improper Authentication
The Authentication component in TYPO3 does not properly invalidate timed out user sessions, which allows remote attackers to bypass authentication via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3944
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40395
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40428
published_at 2026-04-07T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40479
published_at 2026-04-08T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.4049
published_at 2026-04-09T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40511
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40474
published_at 2026-04-12T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40454
published_at 2026-04-13T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40502
published_at 2026-04-16T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.4047
published_at 2026-04-18T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40393
published_at 2026-04-01T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.4048
published_at 2026-04-02T12:55:00Z
11
value 0.00186
scoring_system epss
scoring_elements 0.40506
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3944
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
7
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3944.yaml
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3944.yaml
8
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3944
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3944
10
reference_url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
11
reference_url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/
reference_id
reference_type
scores
url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/
12
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
13
reference_url http://www.debian.org/security/2014/dsa-2942
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2942
14
reference_url http://www.openwall.com/lists/oss-security/2014/06/03/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/03/2
15
reference_url https://github.com/advisories/GHSA-9j8h-xrgj-7gw2
reference_id GHSA-9j8h-xrgj-7gw2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9j8h-xrgj-7gw2
fixed_packages
aliases CVE-2014-3944, GHSA-9j8h-xrgj-7gw2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4auu-re6t-p3gu
2
url VCID-5rae-psy2-dba5
vulnerability_id VCID-5rae-psy2-dba5
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7076
reference_id
reference_type
scores
0
value 0.00475
scoring_system epss
scoring_elements 0.64757
published_at 2026-04-01T12:55:00Z
1
value 0.00475
scoring_system epss
scoring_elements 0.64808
published_at 2026-04-02T12:55:00Z
2
value 0.00475
scoring_system epss
scoring_elements 0.64837
published_at 2026-04-04T12:55:00Z
3
value 0.00475
scoring_system epss
scoring_elements 0.648
published_at 2026-04-07T12:55:00Z
4
value 0.00475
scoring_system epss
scoring_elements 0.6485
published_at 2026-04-08T12:55:00Z
5
value 0.00475
scoring_system epss
scoring_elements 0.64864
published_at 2026-04-09T12:55:00Z
6
value 0.00475
scoring_system epss
scoring_elements 0.64881
published_at 2026-04-16T12:55:00Z
7
value 0.00475
scoring_system epss
scoring_elements 0.64871
published_at 2026-04-12T12:55:00Z
8
value 0.00475
scoring_system epss
scoring_elements 0.64843
published_at 2026-04-13T12:55:00Z
9
value 0.00475
scoring_system epss
scoring_elements 0.64892
published_at 2026-04-18T12:55:00Z
10
value 0.00475
scoring_system epss
scoring_elements 0.64878
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7076
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
fixed_packages
aliases CVE-2013-7076
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rae-psy2-dba5
3
url VCID-75re-n41m-y3et
vulnerability_id VCID-75re-n41m-y3et
summary
TYPO3 Improper Access Control vulnerability
The (old) Form Content Element component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated editors to generate arbitrary HMAC signatures and bypass intended access restrictions via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7081
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38333
published_at 2026-04-21T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38415
published_at 2026-04-09T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38431
published_at 2026-04-11T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38393
published_at 2026-04-12T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38368
published_at 2026-04-13T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38416
published_at 2026-04-16T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38396
published_at 2026-04-18T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38331
published_at 2026-04-01T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38468
published_at 2026-04-02T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38492
published_at 2026-04-04T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38356
published_at 2026-04-07T12:55:00Z
11
value 0.00171
scoring_system epss
scoring_elements 0.38407
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7081
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
9
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
10
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7081
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7081
12
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
13
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
14
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
15
reference_url https://github.com/advisories/GHSA-r674-mc9p-hvw5
reference_id GHSA-r674-mc9p-hvw5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r674-mc9p-hvw5
fixed_packages
aliases CVE-2013-7081, GHSA-r674-mc9p-hvw5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75re-n41m-y3et
4
url VCID-8ahj-xadv-xbhr
vulnerability_id VCID-8ahj-xadv-xbhr
summary
TYPO3 Cross-site scripting (XSS) vulnerability in the Extbase Framework
Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in the Extbase Framework in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6, when the Rewritten Property Mapper is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message.  NOTE: this might be the same vulnerability as CVE-2013-7072.
references
0
reference_url http://osvdb.org/100885
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://osvdb.org/100885
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7078
reference_id
reference_type
scores
0
value 0.00486
scoring_system epss
scoring_elements 0.65431
published_at 2026-04-21T12:55:00Z
1
value 0.00486
scoring_system epss
scoring_elements 0.6544
published_at 2026-04-11T12:55:00Z
2
value 0.00486
scoring_system epss
scoring_elements 0.65411
published_at 2026-04-08T12:55:00Z
3
value 0.00486
scoring_system epss
scoring_elements 0.65422
published_at 2026-04-09T12:55:00Z
4
value 0.00486
scoring_system epss
scoring_elements 0.65427
published_at 2026-04-12T12:55:00Z
5
value 0.00486
scoring_system epss
scoring_elements 0.65446
published_at 2026-04-18T12:55:00Z
6
value 0.00486
scoring_system epss
scoring_elements 0.65436
published_at 2026-04-16T12:55:00Z
7
value 0.00486
scoring_system epss
scoring_elements 0.65319
published_at 2026-04-01T12:55:00Z
8
value 0.00486
scoring_system epss
scoring_elements 0.65368
published_at 2026-04-02T12:55:00Z
9
value 0.00486
scoring_system epss
scoring_elements 0.65399
published_at 2026-04-13T12:55:00Z
10
value 0.00486
scoring_system epss
scoring_elements 0.65394
published_at 2026-04-04T12:55:00Z
11
value 0.00486
scoring_system epss
scoring_elements 0.65358
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7078
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
10
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
11
reference_url http://seclists.org/oss-sec/2013/q4/487
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/487
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/89629
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/89629
13
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7078
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7078
15
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
16
reference_url http://www.securityfocus.com/bid/64239
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/64239
17
reference_url https://github.com/advisories/GHSA-qj69-chjp-g4f5
reference_id GHSA-qj69-chjp-g4f5
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qj69-chjp-g4f5
fixed_packages
aliases CVE-2013-7078, GHSA-qj69-chjp-g4f5
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ahj-xadv-xbhr
5
url VCID-9j2h-q1n5-kbgt
vulnerability_id VCID-9j2h-q1n5-kbgt
summary
Typo3 XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3943
reference_id
reference_type
scores
0
value 0.00208
scoring_system epss
scoring_elements 0.43128
published_at 2026-04-21T12:55:00Z
1
value 0.00208
scoring_system epss
scoring_elements 0.43195
published_at 2026-04-18T12:55:00Z
2
value 0.00208
scoring_system epss
scoring_elements 0.43205
published_at 2026-04-16T12:55:00Z
3
value 0.00208
scoring_system epss
scoring_elements 0.43146
published_at 2026-04-13T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43161
published_at 2026-04-12T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43194
published_at 2026-04-11T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43083
published_at 2026-04-01T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43142
published_at 2026-04-02T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43173
published_at 2026-04-09T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43169
published_at 2026-04-04T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.4316
published_at 2026-04-08T12:55:00Z
11
value 0.00208
scoring_system epss
scoring_elements 0.43107
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
8
reference_url https://typo3.org/security/advisory/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2014-001
9
reference_url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
10
reference_url https://web.archive.org/web/20200229060129/http://www.securityfocus.com/bid/67625
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200229060129/http://www.securityfocus.com/bid/67625
11
reference_url http://www.debian.org/security/2014/dsa-2942
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2942
12
reference_url http://www.openwall.com/lists/oss-security/2014/06/03/2
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/03/2
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3943
reference_id CVE-2014-3943
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3943
14
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3943.yaml
reference_id CVE-2014-3943.YAML
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3943.yaml
15
reference_url https://github.com/advisories/GHSA-qqh2-h6gw-6x8x
reference_id GHSA-qqh2-h6gw-6x8x
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qqh2-h6gw-6x8x
fixed_packages
aliases CVE-2014-3943, GHSA-qqh2-h6gw-6x8x
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j2h-q1n5-kbgt
6
url VCID-d79s-4kzk-hugy
vulnerability_id VCID-d79s-4kzk-hugy
summary
Typo3 Host Header Spoofing Vulnerability
TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3941
reference_id
reference_type
scores
0
value 0.00276
scoring_system epss
scoring_elements 0.51106
published_at 2026-04-16T12:55:00Z
1
value 0.00276
scoring_system epss
scoring_elements 0.51067
published_at 2026-04-13T12:55:00Z
2
value 0.00276
scoring_system epss
scoring_elements 0.51084
published_at 2026-04-12T12:55:00Z
3
value 0.00276
scoring_system epss
scoring_elements 0.50973
published_at 2026-04-01T12:55:00Z
4
value 0.00276
scoring_system epss
scoring_elements 0.51026
published_at 2026-04-02T12:55:00Z
5
value 0.00276
scoring_system epss
scoring_elements 0.51105
published_at 2026-04-11T12:55:00Z
6
value 0.00276
scoring_system epss
scoring_elements 0.51051
published_at 2026-04-04T12:55:00Z
7
value 0.00276
scoring_system epss
scoring_elements 0.51008
published_at 2026-04-07T12:55:00Z
8
value 0.00276
scoring_system epss
scoring_elements 0.51062
published_at 2026-04-09T12:55:00Z
9
value 0.00276
scoring_system epss
scoring_elements 0.51065
published_at 2026-04-08T12:55:00Z
10
value 0.00276
scoring_system epss
scoring_elements 0.51089
published_at 2026-04-21T12:55:00Z
11
value 0.00276
scoring_system epss
scoring_elements 0.51112
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3941
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
10
reference_url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
11
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001
12
reference_url http://www.debian.org/security/2014/dsa-2942
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2942
13
reference_url http://www.openwall.com/lists/oss-security/2014/06/03/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/03/2
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3941
reference_id CVE-2014-3941
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3941
15
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3941.yaml
reference_id CVE-2014-3941.YAML
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2014-3941.yaml
16
reference_url https://github.com/advisories/GHSA-594h-cx6w-p4jf
reference_id GHSA-594h-cx6w-p4jf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-594h-cx6w-p4jf
fixed_packages
aliases CVE-2014-3941, GHSA-594h-cx6w-p4jf
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d79s-4kzk-hugy
7
url VCID-ftr5-c6nt-gbh4
vulnerability_id VCID-ftr5-c6nt-gbh4
summary
TYPO3 is vulnerable to Mass Assignment in the Extension table administration library
The creating record functionality in Extension table administration library (feuser_adminLib.inc) in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, and 6.0.0 through 6.0.11 allows remote attackers to write to arbitrary fields in the configuration database table via crafted links, aka "Mass Assignment."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7080
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50892
published_at 2026-04-21T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50868
published_at 2026-04-08T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50866
published_at 2026-04-09T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-16T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50886
published_at 2026-04-12T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50869
published_at 2026-04-13T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50913
published_at 2026-04-18T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50771
published_at 2026-04-01T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50827
published_at 2026-04-02T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50853
published_at 2026-04-04T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.50811
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7080
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
9
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
10
reference_url https://github.com/TYPO3-CMS/core
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3-CMS/core
11
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
12
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
13
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7080
reference_id CVE-2013-7080
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7080
15
reference_url https://github.com/advisories/GHSA-5fj8-wh3g-qvq2
reference_id GHSA-5fj8-wh3g-qvq2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5fj8-wh3g-qvq2
fixed_packages
aliases CVE-2013-7080, GHSA-5fj8-wh3g-qvq2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftr5-c6nt-gbh4
8
url VCID-m3dg-q4eg-wyfb
vulnerability_id VCID-m3dg-q4eg-wyfb
summary
TYPO3 Color Picker Wizard component allows remote authenticated editors to execute arbitrary PHP code
The Color Picker Wizard component in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, and 6.1.0 before 6.1.9 allows remote authenticated editors to execute arbitrary PHP code via a serialized PHP object.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3942
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.63301
published_at 2026-04-21T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.6319
published_at 2026-04-01T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63249
published_at 2026-04-02T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63279
published_at 2026-04-04T12:55:00Z
4
value 0.00442
scoring_system epss
scoring_elements 0.63244
published_at 2026-04-07T12:55:00Z
5
value 0.00442
scoring_system epss
scoring_elements 0.63295
published_at 2026-04-08T12:55:00Z
6
value 0.00442
scoring_system epss
scoring_elements 0.63313
published_at 2026-04-09T12:55:00Z
7
value 0.00442
scoring_system epss
scoring_elements 0.6333
published_at 2026-04-11T12:55:00Z
8
value 0.00442
scoring_system epss
scoring_elements 0.63314
published_at 2026-04-16T12:55:00Z
9
value 0.00442
scoring_system epss
scoring_elements 0.63278
published_at 2026-04-13T12:55:00Z
10
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
8
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
9
reference_url https://typo3.org/security/advisory/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2014-001
10
reference_url http://www.debian.org/security/2014/dsa-2942
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2942
11
reference_url http://www.openwall.com/lists/oss-security/2014/06/03/2
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/03/2
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3942
reference_id CVE-2014-3942
reference_type
scores
0
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3942
13
reference_url https://github.com/advisories/GHSA-55g3-fjwm-w2c8
reference_id GHSA-55g3-fjwm-w2c8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-55g3-fjwm-w2c8
fixed_packages
aliases CVE-2014-3942, GHSA-55g3-fjwm-w2c8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3dg-q4eg-wyfb
9
url VCID-mrst-4yau-ubce
vulnerability_id VCID-mrst-4yau-ubce
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3945
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41811
published_at 2026-04-21T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41801
published_at 2026-04-01T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41866
published_at 2026-04-02T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41895
published_at 2026-04-04T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41823
published_at 2026-04-07T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41872
published_at 2026-04-12T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41883
published_at 2026-04-18T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41907
published_at 2026-04-11T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41859
published_at 2026-04-13T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41909
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3945
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3942
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3943
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3944
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3946
7
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3945
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3945
9
reference_url https://typo3.org/security/advisory/typo3-core-sa-2014-001
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://typo3.org/security/advisory/typo3-core-sa-2014-001
10
reference_url http://www.debian.org/security/2014/dsa-2942
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2942
11
reference_url http://www.openwall.com/lists/oss-security/2014/06/03/2
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/03/2
12
reference_url https://github.com/advisories/GHSA-h7wf-jg4f-x2wc
reference_id GHSA-h7wf-jg4f-x2wc
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h7wf-jg4f-x2wc
fixed_packages
aliases CVE-2014-3945, GHSA-h7wf-jg4f-x2wc
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrst-4yau-ubce
10
url VCID-p8m8-y53c-cubn
vulnerability_id VCID-p8m8-y53c-cubn
summary
TYPO3 vulnerable to Information Disclosure via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7073
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50906
published_at 2026-04-07T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50988
published_at 2026-04-21T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.51009
published_at 2026-04-18T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.51003
published_at 2026-04-16T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50965
published_at 2026-04-13T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50981
published_at 2026-04-12T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.50864
published_at 2026-04-01T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.50922
published_at 2026-04-02T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.50948
published_at 2026-04-04T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.51002
published_at 2026-04-11T12:55:00Z
10
value 0.00275
scoring_system epss
scoring_elements 0.5096
published_at 2026-04-09T12:55:00Z
11
value 0.00275
scoring_system epss
scoring_elements 0.50963
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7073
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
12
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
13
reference_url http://seclists.org/oss-sec/2013/q4/487
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/487
14
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
15
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
16
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
17
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7073
reference_id CVE-2013-7073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7073
19
reference_url https://github.com/advisories/GHSA-4rpv-g4gq-rh4m
reference_id GHSA-4rpv-g4gq-rh4m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4rpv-g4gq-rh4m
fixed_packages
aliases CVE-2013-7073, GHSA-4rpv-g4gq-rh4m
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8m8-y53c-cubn
11
url VCID-vgwd-1z7m-gkh8
vulnerability_id VCID-vgwd-1z7m-gkh8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2047
reference_id
reference_type
scores
0
value 0.00766
scoring_system epss
scoring_elements 0.73405
published_at 2026-04-01T12:55:00Z
1
value 0.00766
scoring_system epss
scoring_elements 0.73413
published_at 2026-04-02T12:55:00Z
2
value 0.00766
scoring_system epss
scoring_elements 0.73437
published_at 2026-04-04T12:55:00Z
3
value 0.00766
scoring_system epss
scoring_elements 0.73409
published_at 2026-04-07T12:55:00Z
4
value 0.00766
scoring_system epss
scoring_elements 0.73446
published_at 2026-04-08T12:55:00Z
5
value 0.00766
scoring_system epss
scoring_elements 0.73459
published_at 2026-04-09T12:55:00Z
6
value 0.00766
scoring_system epss
scoring_elements 0.73482
published_at 2026-04-11T12:55:00Z
7
value 0.00766
scoring_system epss
scoring_elements 0.73462
published_at 2026-04-12T12:55:00Z
8
value 0.00766
scoring_system epss
scoring_elements 0.73454
published_at 2026-04-13T12:55:00Z
9
value 0.00766
scoring_system epss
scoring_elements 0.73496
published_at 2026-04-16T12:55:00Z
10
value 0.00766
scoring_system epss
scoring_elements 0.73505
published_at 2026-04-18T12:55:00Z
11
value 0.00766
scoring_system epss
scoring_elements 0.73498
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2047
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2047
fixed_packages
aliases CVE-2015-2047
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgwd-1z7m-gkh8
12
url VCID-wxg4-7yap-3qdx
vulnerability_id VCID-wxg4-7yap-3qdx
summary cross-site scripting
references
0
reference_url http://insight-labs.org/?p=738
reference_id
reference_type
scores
url http://insight-labs.org/?p=738
1
reference_url http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/120129/WordPress-Audio-Player-SWF-Cross-Site-Scripting.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1464
reference_id
reference_type
scores
0
value 0.0352
scoring_system epss
scoring_elements 0.87658
published_at 2026-04-21T12:55:00Z
1
value 0.0352
scoring_system epss
scoring_elements 0.8759
published_at 2026-04-01T12:55:00Z
2
value 0.0352
scoring_system epss
scoring_elements 0.876
published_at 2026-04-02T12:55:00Z
3
value 0.0352
scoring_system epss
scoring_elements 0.87613
published_at 2026-04-04T12:55:00Z
4
value 0.0352
scoring_system epss
scoring_elements 0.87616
published_at 2026-04-07T12:55:00Z
5
value 0.0352
scoring_system epss
scoring_elements 0.87635
published_at 2026-04-08T12:55:00Z
6
value 0.0352
scoring_system epss
scoring_elements 0.87641
published_at 2026-04-09T12:55:00Z
7
value 0.0352
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-11T12:55:00Z
8
value 0.0352
scoring_system epss
scoring_elements 0.87647
published_at 2026-04-12T12:55:00Z
9
value 0.0352
scoring_system epss
scoring_elements 0.87645
published_at 2026-04-13T12:55:00Z
10
value 0.0352
scoring_system epss
scoring_elements 0.8766
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1464
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1464
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1464
4
reference_url http://secunia.com/advisories/52083
reference_id
reference_type
scores
url http://secunia.com/advisories/52083
5
reference_url http://secunia.com/advisories/58854
reference_id
reference_type
scores
url http://secunia.com/advisories/58854
6
reference_url http://wordpress.org/extend/plugins/audio-player/changelog/
reference_id
reference_type
scores
url http://wordpress.org/extend/plugins/audio-player/changelog/
7
reference_url http://www.securityfocus.com/bid/57848
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57848
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.1.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.3.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.3.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:doryphores:audio_player:2.0.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:doryphores:audio_player:2.0.4.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1464
reference_id CVE-2013-1464
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1464
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38300.txt
reference_id CVE-2013-1464;OSVDB-89963
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/38300.txt
20
reference_url https://www.securityfocus.com/bid/57848/info
reference_id CVE-2013-1464;OSVDB-89963
reference_type exploit
scores
url https://www.securityfocus.com/bid/57848/info
fixed_packages
aliases CVE-2013-1464
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxg4-7yap-3qdx
13
url VCID-y9d1-wwne-hba5
vulnerability_id VCID-y9d1-wwne-hba5
summary several
references
0
reference_url http://osvdb.org/100881
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://osvdb.org/100881
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7074
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56394
published_at 2026-04-18T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56361
published_at 2026-04-13T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56355
published_at 2026-04-04T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56363
published_at 2026-04-21T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56379
published_at 2026-04-12T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56403
published_at 2026-04-11T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56393
published_at 2026-04-16T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.56387
published_at 2026-04-08T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56336
published_at 2026-04-07T12:55:00Z
9
value 0.00335
scoring_system epss
scoring_elements 0.56223
published_at 2026-04-01T12:55:00Z
10
value 0.00335
scoring_system epss
scoring_elements 0.56333
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
10
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
11
reference_url http://seclists.org/oss-sec/2013/q4/487
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/487
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/89620
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/89620
13
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7074
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7074
15
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
16
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
17
reference_url http://www.securityfocus.com/bid/64245
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/64245
18
reference_url https://github.com/advisories/GHSA-r8m7-792j-5jvq
reference_id GHSA-r8m7-792j-5jvq
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r8m7-792j-5jvq
fixed_packages
aliases CVE-2013-7074, GHSA-r8m7-792j-5jvq
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9d1-wwne-hba5
14
url VCID-yadx-n3tq-rkdb
vulnerability_id VCID-yadx-n3tq-rkdb
summary several
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7079
reference_id
reference_type
scores
0
value 0.00285
scoring_system epss
scoring_elements 0.52009
published_at 2026-04-21T12:55:00Z
1
value 0.00285
scoring_system epss
scoring_elements 0.51964
published_at 2026-04-08T12:55:00Z
2
value 0.00285
scoring_system epss
scoring_elements 0.51963
published_at 2026-04-09T12:55:00Z
3
value 0.00285
scoring_system epss
scoring_elements 0.52015
published_at 2026-04-11T12:55:00Z
4
value 0.00285
scoring_system epss
scoring_elements 0.51997
published_at 2026-04-12T12:55:00Z
5
value 0.00285
scoring_system epss
scoring_elements 0.51981
published_at 2026-04-13T12:55:00Z
6
value 0.00285
scoring_system epss
scoring_elements 0.52023
published_at 2026-04-16T12:55:00Z
7
value 0.00285
scoring_system epss
scoring_elements 0.52029
published_at 2026-04-18T12:55:00Z
8
value 0.00285
scoring_system epss
scoring_elements 0.51871
published_at 2026-04-01T12:55:00Z
9
value 0.00285
scoring_system epss
scoring_elements 0.51919
published_at 2026-04-02T12:55:00Z
10
value 0.00285
scoring_system epss
scoring_elements 0.51946
published_at 2026-04-04T12:55:00Z
11
value 0.00285
scoring_system epss
scoring_elements 0.5191
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
9
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
10
reference_url https://github.com/FriendsOfTYPO3/openid
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfTYPO3/openid
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7079
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7079
12
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
13
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
14
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
15
reference_url http://www.securityfocus.com/bid/64252
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/64252
16
reference_url https://github.com/advisories/GHSA-838c-v5cq-hp33
reference_id GHSA-838c-v5cq-hp33
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-838c-v5cq-hp33
fixed_packages
aliases CVE-2013-7079, GHSA-838c-v5cq-hp33
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yadx-n3tq-rkdb
15
url VCID-zqqe-vew2-nbfk
vulnerability_id VCID-zqqe-vew2-nbfk
summary
TYPO3 vulnerable to Insecure Unserialize via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 allows remote authenticated backend users to unserialize arbitrary PHP objects, delete arbitrary files, and possibly have other unspecified impacts via an unspecified parameter, related to a "missing signature."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7075
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61209
published_at 2026-04-21T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.6106
published_at 2026-04-01T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61138
published_at 2026-04-02T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-04T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61132
published_at 2026-04-07T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.6118
published_at 2026-04-08T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61195
published_at 2026-04-09T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61215
published_at 2026-04-11T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61202
published_at 2026-04-12T12:55:00Z
9
value 0.00408
scoring_system epss
scoring_elements 0.61183
published_at 2026-04-13T12:55:00Z
10
value 0.00408
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-16T12:55:00Z
11
value 0.00408
scoring_system epss
scoring_elements 0.61228
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7075
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7074
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7075
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7079
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7080
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7081
9
reference_url http://seclists.org/oss-sec/2013/q4/473
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q4/473
10
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7075
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7075
12
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004
13
reference_url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004/
14
reference_url http://www.debian.org/security/2014/dsa-2834
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2014/dsa-2834
15
reference_url https://github.com/advisories/GHSA-47ww-mq32-g4xw
reference_id GHSA-47ww-mq32-g4xw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-47ww-mq32-g4xw
fixed_packages
aliases CVE-2013-7075, GHSA-47ww-mq32-g4xw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zqqe-vew2-nbfk
Fixing_vulnerabilities
Risk_score7.8
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/typo3-src@4.0.2%252Bdebian-3