cvelist/2013/1xxx/CVE-2013-1843.json
2019-03-18 00:25:57 +00:00

97 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1843",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130311 Re: CVE Request: typo3 sql injection and open redirection",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/12/3"
},
{
"name": "DSA-2646",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2646"
},
{
"name": "openSUSE-SU-2013:0510",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html"
},
{
"name": "52638",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52638"
},
{
"name": "90924",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/90924"
},
{
"name": "58330",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58330"
},
{
"name": "52433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52433"
},
{
"name": "http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/",
"refsource": "CONFIRM",
"url": "http://typo3.org/support/teamssecuritysecurity-bulletins/security-bulletins-single-view/article/sql-injection-and-open-redirection-in-typo3-core/"
}
]
}
}