From 9f8aeb54e6501bded30b35bd5d994281d1b40d19 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 13 May 2020 23:01:23 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/11xxx/CVE-2020-11063.json | 2 +- 2020/11xxx/CVE-2020-11064.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/2020/11xxx/CVE-2020-11063.json b/2020/11xxx/CVE-2020-11063.json index 8e51bb1cdab..fca3c29c68e 100644 --- a/2020/11xxx/CVE-2020-11063.json +++ b/2020/11xxx/CVE-2020-11063.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In TYPO3 CMS versions 10.4.0 and 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts.\n\nThis has been fixed in 10.4.2." + "value": "In TYPO3 CMS versions 10.4.0 and 10.4.1, it has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to mount user enumeration based on email addresses assigned to backend user accounts. This has been fixed in 10.4.2." } ] }, diff --git a/2020/11xxx/CVE-2020-11064.json b/2020/11xxx/CVE-2020-11064.json index 3869f8b5917..78933d5dd28 100644 --- a/2020/11xxx/CVE-2020-11064.json +++ b/2020/11xxx/CVE-2020-11064.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML placeholder attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.\n\nThis has been fixed in 9.5.17 and 10.4.2." + "value": "In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML placeholder attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2." } ] },