Search for packages
| purl | pkg:composer/typo3/cms@4.6.6 |
| Tags | Ghost |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-88ng-ph1q-cybw
Aliases: CVE-2012-1608 GHSA-w3v6-r62r-fvqh |
Improper Input Validation The t3lib_div::RemoveXSS API method in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and inject arbitrary web script or HTML via non printable characters. |
Affected by 0 other vulnerabilities. |
|
VCID-fprf-zjud-8fcv
Aliases: CVE-2012-1606 GHSA-7wwr-p84q-qr3q |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Multiple cross-site scripting (XSS) vulnerabilities in the Backend component in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors. |
Affected by 0 other vulnerabilities. |
|
VCID-fv74-gq28-rkd5
Aliases: CVE-2012-1605 GHSA-7jfm-px59-99w8 |
Typo3 Extbase Framework Unsafe Deserialization The Extbase Framework in TYPO3 4.6.x through 4.6.6, 4.7, and 6.0 unserializes untrusted data, which allows remote attackers to unserialize arbitrary objects and possibly execute arbitrary code via vectors related to "a missing signature (HMAC) for a request argument." |
Affected by 0 other vulnerabilities. |
|
VCID-yk4b-baue-rkbt
Aliases: CVE-2012-1607 GHSA-q68v-vcjg-r3vp |
TYPO3 allows remote attackers to obtain the database name via a direct request The Command Line Interface (CLI) script in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allows remote attackers to obtain the database name via a direct request. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||