cvelist/2011/4xxx/CVE-2011-4626.json

67 lines
2.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 03:07:42 +00:00
"CVE_data_meta": {
2019-11-06 17:01:22 +00:00
"ASSIGNER": "secalert@redhat.com",
2019-03-18 03:07:42 +00:00
"ID": "CVE-2011-4626",
2019-11-06 17:01:22 +00:00
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "TYPO3",
"product": {
"product_data": [
{
"product_name": "TYPO3",
"version": {
"version_data": [
{
"version_value": "before 4.5.4"
}
]
}
}
]
}
}
]
}
2019-03-18 03:07:42 +00:00
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
2019-11-06 17:01:22 +00:00
"value": "Cross-site Scripting (XSS) in TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to inject arbitrary web script or HTML via the \"JSwindow\" property of the typolink function."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-Site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://security-tracker.debian.org/tracker/CVE-2011-4626",
"refsource": "MISC",
"name": "https://security-tracker.debian.org/tracker/CVE-2011-4626"
},
{
"refsource": "CONFIRM",
"name": "https://typo3.org/security/advisory/typo3-core-sa-2011-001/#XSS",
"url": "https://typo3.org/security/advisory/typo3-core-sa-2011-001/#XSS"
2019-03-18 03:07:42 +00:00
}
]
}
}