Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-nsh9-8twn-6ydn |
| Summary | TYPO3 vulnerable to remote authenticated arbitrary code execution
The File Abstraction Layer (FAL) in TYPO3 6.0.x before 6.0.9 and 6.1.x before 6.1.4 allows remote authenticated editors to execute arbitrary PHP code via unspecified characters in the file extension when renaming a file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4250. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-m76j-69c2-c3m8 |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4321 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65397 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65377 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65388 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65407 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65286 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65335 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.6536 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00485 |
| scoring_system |
epss |
| scoring_elements |
0.65325 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4321 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
94 |
| name |
Improper Control of Generation of Code ('Code Injection') |
| description |
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
|
| 1 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 2 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
|
| Exploits |
|
| Severity_range_score | 7.0 - 8.9 |
| Exploitability | 0.5 |
| Weighted_severity | 8.0 |
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-nsh9-8twn-6ydn |