Search for vulnerabilities
Vulnerability ID | VCID-tdsj-15xc-x3ar |
Aliases |
GHSA-qmwf-j7g7-f5jw
|
Summary | Cross-Site Scripting in third party library mso/idna-convert Make sure to not expose the vendor directory to the publicly accessible document root. In composer managed installation, make sure to configure a dedicated web folder. In general it is recommended to not expose the complete typo3_src sources folder in the document root. |
Status | Published |
Exploitability | None |
Weighted Severity | None |
Risk | None |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3.1_qr | MODERATE | https://github.com/advisories/GHSA-qmwf-j7g7-f5jw |
generic_textual | MODERATE | https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2016-07-19-7.yaml |
generic_textual | MODERATE | https://typo3.org/security/advisory/typo3-core-sa-2016-020 |
Reference id | Reference type | URL |
---|---|---|
https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2016-07-19-7.yaml | ||
https://typo3.org/security/advisory/typo3-core-sa-2016-020 | ||
GHSA-qmwf-j7g7-f5jw | https://github.com/advisories/GHSA-qmwf-j7g7-f5jw |
No EPSS data available for this vulnerability.
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:11:06.997743+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-qmwf-j7g7-f5jw/GHSA-qmwf-j7g7-f5jw.json | 36.1.3 |