Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:N/I:P/A:N)
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* versions from (including) 6.2.0 up to (excluding) 6.2.54
*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* versions from (including) 7.6.0 up to (excluding) 7.6.48
*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* versions from (including) 8.7.0 up to (excluding) 8.7.38
*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (excluding) 9.5.23
*cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:* versions from (including) 10.0.0 up to (excluding) 10.4.10
|
Changed |
Reference Type |
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-vqqx-jw6p-q3rf No Types Assigned
|
https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-vqqx-jw6p-q3rf Exploit, Third Party Advisory
|
Changed |
Reference Type |
https://typo3.org/security/advisory/typo3-core-sa-2020-010 No Types Assigned
|
https://typo3.org/security/advisory/typo3-core-sa-2020-010 Exploit, Vendor Advisory
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|