icon

We found results for “

CVE-2015-4612

Good to know:

icon

Date: June 16, 2015

SQL injection vulnerability in the "FAQ - Frequently Asked Questions" (js_faq) extension before 1.2.1 for TYPO3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-89

Top Fix

icon

Upgrade Version

Upgrade to version instituteweb/typo3-cms - 7.6.4;instituteweb/typo3-cms - dev-TYPO3_7;typo3/cms - 6.2.2;typo3/cms - 6.2.16;typo3/cms - 6.2.13;typo3/cms - 7.0.2;typo3/cms - 6.2.19;typo3/cms - 6.2.24;typo3/cms - 6.2.8;typo3/cms - 6.2.28;typo3/cms - 6.2.10-rc1;typo3/cms - 7.2.0;typo3/cms - dev-TYPO3_7-6

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): SINGLE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us