We found results for “”
CVE-2015-4612
Good to know:
Date: June 16, 2015
SQL injection vulnerability in the "FAQ - Frequently Asked Questions" (js_faq) extension before 1.2.1 for TYPO3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Language: PHP
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89Top Fix
Upgrade Version
Upgrade to version instituteweb/typo3-cms - 7.6.4;instituteweb/typo3-cms - dev-TYPO3_7;typo3/cms - 6.2.2;typo3/cms - 6.2.16;typo3/cms - 6.2.13;typo3/cms - 7.0.2;typo3/cms - 6.2.19;typo3/cms - 6.2.24;typo3/cms - 6.2.8;typo3/cms - 6.2.28;typo3/cms - 6.2.10-rc1;typo3/cms - 7.2.0;typo3/cms - dev-TYPO3_7-6
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | LOW |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | SINGLE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | PARTIAL |
| Availability (A): | PARTIAL |
| Additional information: |
Vulnerabilities
Projects
Contact Us


