Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2025-2001
Vulnerability from csaf_certbund
Published
2025-09-08 22:00
Modified
2025-09-09 22:00
Summary
TYPO3 Core: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
TYPO3 ist ein freies Content-Management-System, basierend auf der Scriptsprache PHP und einer SQL-Datenbank. Über zahlreiche Extensions kann der Funktionsumfang der Core-Installation individuell erweitert werden.
Angriff
Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im TYPO3 Core ausnutzen, um Phishing-Angriffe durchzuführen, vertrauliche Informationen offenzulegen, Daten zu manipulieren, Sicherheitsmaßnahmen zu umgehen und einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "TYPO3 ist ein freies Content-Management-System, basierend auf der Scriptsprache PHP und einer SQL-Datenbank. \u00dcber zahlreiche Extensions kann der Funktionsumfang der Core-Installation individuell erweitert werden.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im TYPO3 Core ausnutzen, um Phishing-Angriffe durchzuf\u00fchren, vertrauliche Informationen offenzulegen, Daten zu manipulieren, Sicherheitsma\u00dfnahmen zu umgehen und einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-2001 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2001.json" }, { "category": "self", "summary": "WID-SEC-2025-2001 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2001" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/article/typo3-13418-and-12437-security-releases-published" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-017" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-018" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-019" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-020" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-021" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-022" }, { "category": "external", "summary": "Typo3 Security Advisory vom 2025-09-08", "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-023" } ], "source_lang": "en-US", "title": "TYPO3 Core: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-09-09T22:00:00.000+00:00", "generator": { "date": "2025-09-10T05:07:25.877+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-2001", "initial_release_date": "2025-09-08T22:00:00.000+00:00", "revision_history": [ { "date": "2025-09-08T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-09-09T22:00:00.000+00:00", "number": "2", "summary": "Referenz(en) aufgenommen: EUVD-2025-27227, EUVD-2025-27226, EUVD-2025-27232, EUVD-2025-27231, EUVD-2025-27230, EUVD-2025-27229, EUVD-2025-27228" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c13.4.18", "product": { "name": "TYPO3 Core \u003c13.4.18", "product_id": "T046803" } }, { "category": "product_version", "name": "13.4.18", "product": { "name": "TYPO3 Core 13.4.18", "product_id": "T046803-fixed", "product_identification_helper": { "cpe": "cpe:/a:typo3:typo3:13.4.18" } } }, { "category": "product_version_range", "name": "\u003c12.4.37", "product": { "name": "TYPO3 Core \u003c12.4.37", "product_id": "T046804" } }, { "category": "product_version", "name": "12.4.37", "product": { "name": "TYPO3 Core 12.4.37", "product_id": "T046804-fixed", "product_identification_helper": { "cpe": "cpe:/a:typo3:typo3:12.4.37" } } } ], "category": "product_name", "name": "Core" } ], "category": "vendor", "name": "TYPO3" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-59013", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59013" }, { "cve": "CVE-2025-59014", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59014" }, { "cve": "CVE-2025-59015", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59015" }, { "cve": "CVE-2025-59016", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59016" }, { "cve": "CVE-2025-59017", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59017" }, { "cve": "CVE-2025-59018", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59018" }, { "cve": "CVE-2025-59019", "product_status": { "known_affected": [ "T046804", "T046803" ] }, "release_date": "2025-09-08T22:00:00.000+00:00", "title": "CVE-2025-59019" } ] }
CVE-2025-59017 (GCVE-0-2025-59017)
Vulnerability from cvelistv5
Published
2025-09-09 09:01
Modified
2025-09-09 19:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
Missing authorization checks in the Backend Routing of TYPO3 CMS versions 9.0.0‑9.5.54, 10.0.0‑10.4.53, 11.0.0‑11.5.47, 12.0.0‑12.4.36, and 13.0.0‑13.4.17 allow backend users to directly invoke AJAX backend routes without having access to the corresponding backend modules.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-021 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | TYPO3 | TYPO3 CMS |
Version: 9.0.0 ≤ Version: 10.0.0 ≤ Version: 11.0.0 ≤ Version: 12.0.0 ≤ Version: 13.0.0 ≤ |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59017", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:30:08.547495Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:30:15.708Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Backend" ], "packageName": "typo3/cms-backend", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Backend User" ], "packageName": "typo3/cms-beuser", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Dashboard" ], "packageName": "typo3/cms-dashboard", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Recycler" ], "packageName": "typo3/cms-recycler", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Workspaces" ], "packageName": "typo3/cms-workspaces", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Elias H\u00e4u\u00dfler" }, { "lang": "en", "type": "remediation developer", "value": "Elias H\u00e4u\u00dfler" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Missing authorization checks in the Backend Routing of TYPO3 CMS versions 9.0.0\u20119.5.54, 10.0.0\u201110.4.53, 11.0.0\u201111.5.47, 12.0.0\u201112.4.36, and 13.0.0\u201113.4.17 allow backend users to directly invoke AJAX backend routes without having access to the corresponding backend modules." } ], "value": "Missing authorization checks in the Backend Routing of TYPO3 CMS versions 9.0.0\u20119.5.54, 10.0.0\u201110.4.53, 11.0.0\u201111.5.47, 12.0.0\u201112.4.36, and 13.0.0\u201113.4.17 allow backend users to directly invoke AJAX backend routes without having access to the corresponding backend modules." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T09:01:03.951Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-021" } ], "source": { "discovery": "UNKNOWN" }, "title": "Broken Access Control in Backend AJAX Routes", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59017", "datePublished": "2025-09-09T09:01:03.951Z", "dateReserved": "2025-09-07T19:01:20.436Z", "dateUpdated": "2025-09-09T19:30:15.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59014 (GCVE-0-2025-59014)
Vulnerability from cvelistv5
Published
2025-09-09 09:00
Modified
2025-09-09 19:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An uncaught exception in the Bookmark Toolbar of TYPO3 CMS versions 11.0.0–11.5.47, 12.0.0–12.4.36, and 13.0.0–13.4.17 lets administrator‑level backend users trigger a denial‑of‑service condition in the backend user interface by saving manipulated data in the bookmark toolbar.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-018 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59014", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:31:24.905016Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:31:32.972Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Backend" ], "packageName": "typo3/cms-backend", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Jakub \u015awies" }, { "lang": "en", "type": "remediation developer", "value": "Oliver Hader" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An uncaught exception in the Bookmark Toolbar of TYPO3 CMS versions 11.0.0\u201311.5.47, 12.0.0\u201312.4.36, and 13.0.0\u201313.4.17 lets administrator\u2011level backend users trigger a denial\u2011of\u2011service condition in the backend user interface by saving manipulated data in the bookmark toolbar." } ], "value": "An uncaught exception in the Bookmark Toolbar of TYPO3 CMS versions 11.0.0\u201311.5.47, 12.0.0\u201312.4.36, and 13.0.0\u201313.4.17 lets administrator\u2011level backend users trigger a denial\u2011of\u2011service condition in the backend user interface by saving manipulated data in the bookmark toolbar." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T09:00:38.664Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-018" } ], "source": { "discovery": "UNKNOWN" }, "title": "Denial of Service in TYPO3 Bookmark Toolbar", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59014", "datePublished": "2025-09-09T09:00:38.664Z", "dateReserved": "2025-09-07T19:01:20.435Z", "dateUpdated": "2025-09-09T19:31:32.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59015 (GCVE-0-2025-59015)
Vulnerability from cvelistv5
Published
2025-09-09 09:00
Modified
2025-09-09 19:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-331 - Insufficient Entropy
Summary
A deterministic three‑character prefix in the Password Generation component of TYPO3 CMS versions 12.0.0–12.4.36 and 13.0.0–13.4.17 reduces entropy, allowing attackers to carry out brute‑force attacks more quickly.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-019 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59015", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:31:01.239247Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:31:09.254Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Core" ], "packageName": "typo3/cms-core", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Mathias Brodala" }, { "lang": "en", "type": "remediation developer", "value": "Oliver Hader" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A deterministic three\u2011character prefix in the Password Generation component of TYPO3 CMS versions 12.0.0\u201312.4.36 and 13.0.0\u201313.4.17 reduces entropy, allowing attackers to carry out brute\u2011force attacks more quickly." } ], "value": "A deterministic three\u2011character prefix in the Password Generation component of TYPO3 CMS versions 12.0.0\u201312.4.36 and 13.0.0\u201313.4.17 reduces entropy, allowing attackers to carry out brute\u2011force attacks more quickly." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 6.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331 Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T09:00:48.801Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-019" } ], "source": { "discovery": "UNKNOWN" }, "title": "Insufficient Entropy in Password Generation", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59015", "datePublished": "2025-09-09T09:00:48.801Z", "dateReserved": "2025-09-07T19:01:20.436Z", "dateUpdated": "2025-09-09T19:31:09.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59013 (GCVE-0-2025-59013)
Vulnerability from cvelistv5
Published
2025-09-09 09:00
Modified
2025-09-09 19:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
An open‑redirect vulnerability in GeneralUtility::sanitizeLocalUrl of TYPO3 CMS 9.0.0–9.5.54, 10.0.0–10.4.53, 11.0.0–11.5.47, 12.0.0–12.4.36, and 13.0.0–13.4.17 allows an attacker to redirect users to arbitrary external sites, enabling phishing attacks by supplying a manipulated, sanitized URL.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-017 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59013", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:31:48.748993Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:31:56.794Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Core" ], "packageName": "typo3/cms-core", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Oliver Hader" }, { "lang": "en", "type": "remediation developer", "value": "Benjamin Franzke" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An open\u2011redirect vulnerability in \u003ccode\u003eGeneralUtility::sanitizeLocalUrl\u003c/code\u003e of TYPO3 CMS 9.0.0\u20139.5.54, 10.0.0\u201310.4.53, 11.0.0\u201311.5.47, 12.0.0\u201312.4.36, and 13.0.0\u201313.4.17 allows an attacker to redirect users to arbitrary external sites, enabling phishing attacks by supplying a manipulated, sanitized URL." } ], "value": "An open\u2011redirect vulnerability in GeneralUtility::sanitizeLocalUrl of TYPO3 CMS 9.0.0\u20139.5.54, 10.0.0\u201310.4.53, 11.0.0\u201311.5.47, 12.0.0\u201312.4.36, and 13.0.0\u201313.4.17 allows an attacker to redirect users to arbitrary external sites, enabling phishing attacks by supplying a manipulated, sanitized URL." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "LOW", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T09:00:23.176Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-017" } ], "source": { "discovery": "UNKNOWN" }, "title": "Open Redirect in TYPO3 CMS", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59013", "datePublished": "2025-09-09T09:00:23.176Z", "dateReserved": "2025-09-07T19:01:20.435Z", "dateUpdated": "2025-09-09T19:31:56.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59019 (GCVE-0-2025-59019)
Vulnerability from cvelistv5
Published
2025-09-09 09:01
Modified
2025-09-11 20:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Missing authorization checks in the CSV download feature of TYPO3 CMS versions 11.0.0‑11.5.47, 12.0.0‑12.4.36, and 13.0.0‑13.4.17 allow backend users to disclose information from arbitrary database tables stored within the users' web mounts without having access to them.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-023 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59019", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:29:26.567968Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:29:34.088Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Backend" ], "packageName": "typo3/cms-backend", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] }, { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Record List" ], "packageName": "typo3/cms-recordlist", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Oliver Hader" }, { "lang": "en", "type": "remediation developer", "value": "Benjamin Franzke" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Missing authorization checks in the CSV download feature of TYPO3 CMS versions 11.0.0\u201111.5.47, 12.0.0\u201112.4.36, and 13.0.0\u201113.4.17 allow backend users to disclose information from arbitrary database tables stored within the users\u0027 web mounts without having access to them." } ], "value": "Missing authorization checks in the CSV download feature of TYPO3 CMS versions 11.0.0\u201111.5.47, 12.0.0\u201112.4.36, and 13.0.0\u201113.4.17 allow backend users to disclose information from arbitrary database tables stored within the users\u0027 web mounts without having access to them." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-11T20:44:40.074Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-023" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information Disclosure via CSV Download", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59019", "datePublished": "2025-09-09T09:01:17.787Z", "dateReserved": "2025-09-07T19:01:20.436Z", "dateUpdated": "2025-09-11T20:44:40.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59016 (GCVE-0-2025-59016)
Vulnerability from cvelistv5
Published
2025-09-09 09:00
Modified
2025-09-09 19:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
Error messages containing sensitive information in the File Abstraction Layer in TYPO3 CMS versions 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, and 13.0.0-13.4.17 allow backend users to disclose full file paths via failed low-level file-system operations.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-020 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59016", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:30:29.461750Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:30:37.493Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Core" ], "packageName": "typo3/cms-core", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Dmitry Petschke" }, { "lang": "en", "type": "reporter", "value": "Marc Willmann" }, { "lang": "en", "type": "remediation developer", "value": "Andreas Kienast" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Error messages containing sensitive information in the File Abstraction Layer in TYPO3 CMS versions 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, and 13.0.0-13.4.17 allow backend users to disclose full file paths via failed low-level file-system operations." } ], "value": "Error messages containing sensitive information in the File Abstraction Layer in TYPO3 CMS versions 9.0.0-9.5.54, 10.0.0-10.4.53, 11.0.0-11.5.47, 12.0.0-12.4.36, and 13.0.0-13.4.17 allow backend users to disclose full file paths via failed low-level file-system operations." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Generation of Error Message Containing Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-09T09:00:55.985Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-020" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information Disclosure via File Abstraction Layer", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59016", "datePublished": "2025-09-09T09:00:55.985Z", "dateReserved": "2025-09-07T19:01:20.436Z", "dateUpdated": "2025-09-09T19:30:37.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-59018 (GCVE-0-2025-59018)
Vulnerability from cvelistv5
Published
2025-09-09 09:01
Modified
2025-09-11 20:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Missing authorization checks in the Workspace Module of TYPO3 CMS versions 9.0.0‑9.5.54, 10.0.0‑10.4.53, 11.0.0‑11.5.47, 12.0.0‑12.4.36, and 13.0.0‑13.4.17 allow backend users to directly invoke the corresponding AJAX backend route to disclose sensitive information without having access.
References
▼ | URL | Tags |
---|---|---|
https://typo3.org/security/advisory/typo3-core-sa-2025-022 | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-59018", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-09T19:29:46.358887Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-09T19:29:53.763Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "modules": [ "Workspaces" ], "packageName": "typo3/cms-workspaces", "product": "TYPO3 CMS", "repo": "https://github.com/TYPO3/typo3", "vendor": "TYPO3", "versions": [ { "lessThan": "9.5.55", "status": "affected", "version": "9.0.0", "versionType": "semver" }, { "lessThan": "10.4.54", "status": "affected", "version": "10.0.0", "versionType": "semver" }, { "lessThan": "11.5.48", "status": "affected", "version": "11.0.0", "versionType": "semver" }, { "lessThan": "12.4.37", "status": "affected", "version": "12.0.0", "versionType": "semver" }, { "lessThan": "13.4.18", "status": "affected", "version": "13.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Oliver Hader" }, { "lang": "en", "type": "remediation developer", "value": "Oliver Hader" } ], "datePublic": "2025-09-09T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Missing authorization checks in the Workspace Module of TYPO3 CMS versions 9.0.0\u20119.5.54, 10.0.0\u201110.4.53, 11.0.0\u201111.5.47, 12.0.0\u201112.4.36, and 13.0.0\u201113.4.17 allow backend users to directly invoke the corresponding AJAX backend route to disclose sensitive information without having access." } ], "value": "Missing authorization checks in the Workspace Module of TYPO3 CMS versions 9.0.0\u20119.5.54, 10.0.0\u201110.4.53, 11.0.0\u201111.5.47, 12.0.0\u201112.4.36, and 13.0.0\u201113.4.17 allow backend users to directly invoke the corresponding AJAX backend route to disclose sensitive information without having access." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 7.1, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-11T20:35:36.245Z", "orgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "shortName": "TYPO3" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://typo3.org/security/advisory/typo3-core-sa-2025-022" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information Disclosure in Workspaces Module", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f4fb688c-4412-4426-b4b8-421ecf27b14a", "assignerShortName": "TYPO3", "cveId": "CVE-2025-59018", "datePublished": "2025-09-09T09:01:10.275Z", "dateReserved": "2025-09-07T19:01:20.436Z", "dateUpdated": "2025-09-11T20:35:36.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…