FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
b9a347ac-8671-11e2-b73c-0019d18c446atypo3 -- Multiple vulnerabilities in TYPO3 Core

Typo Security Team reports:

Extbase Framework - Failing to sanitize user input, the Extbase database abstraction layer is susceptible to SQL Injection. TYPO3 sites which have no Extbase extensions installed are not affected. Extbase extensions are affected if they use the Query Object Model and relation values are user generated input. Credits go to Helmut Hummel and Markus Opahle who discovered and reported the issue.

Access tracking mechanism - Failing to validate user provided input, the access tracking mechanism allows redirects to arbitrary URLs. To fix this vulnerability, we had to break existing behaviour of TYPO3 sites that use the access tracking mechanism (jumpurl feature) to transform links to external sites. The link generation has been changed to include a hash that is checked before redirecting to an external URL. This means that old links that have been distributed (e.g. by a newsletter) will not work any more.


Discovery 2013-03-06
Entry 2013-03-06
typo3
ge 4.5.0 lt 4.5.23

ge 4.6.0 lt 4.6.16

ge 4.7.0 lt 4.7.8

ge 6.0.0 lt 6.0.2

http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-001/
a0d77bc8-c6a7-11e5-96d6-14dae9d210b8typo3 -- multiple vulnerabilities

TYPO3 Security Team reports:

It has been discovered that TYPO3 CMS is susceptible to Cross-Site Scripting and Cross-Site Flashing.


Discovery 2015-12-15
Entry 2016-01-29
typo3
< 7.6.1

typo3-lts
< 6.2.16

http://lists.typo3.org/pipermail/typo3-announce/2015/000351.html
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-010/
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-011/
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-012/
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-013/
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-014/
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2015-015/
3caf4e6c-4cef-11e6-a15f-00248c0c745dtypo3 -- Missing access check in Extbase

TYPO3 reports:

Extbase request handling fails to implement a proper access check for requested controller/ action combinations, which makes it possible for an attacker to execute arbitrary Extbase actions by crafting a special request. To successfully exploit this vulnerability, an attacker must have access to at least one Extbase plugin or module action in a TYPO3 installation. The missing access check inevitably leads to information disclosure or remote code execution, depending on the action that an attacker is able to execute.


Discovery 2016-05-24
Entry 2016-07-18
typo3
< 7.6.8

typo3-lts
< 6.2.24

CVE-2016-5091
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-013/
https://wiki.typo3.org/TYPO3_CMS_7.6.8
https://wiki.typo3.org/TYPO3_CMS_6.2.24