TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2016-08/msg00083.html - | |
References | () http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/ - Vendor Advisory | |
References | () http://www.debian.org/security/2014/dsa-2942 - | |
References | () http://www.openwall.com/lists/oss-security/2014/06/03/2 - |
Information
Published : 2014-06-03 14:55
Updated : 2024-11-21 02:09
NVD link : CVE-2014-3941
Mitre link : CVE-2014-3941
CVE.ORG link : CVE-2014-3941
JSON object : View
Products Affected
typo3
- typo3
CWE
CWE-20
Improper Input Validation