FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  374986
Date:      2014-12-20
Time:      00:21:30Z
Committer: delphij

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
b9a347ac-8671-11e2-b73c-0019d18c446atypo3 -- Multiple vulnerabilities in TYPO3 Core

Typo Security Team reports:

Extbase Framework - Failing to sanitize user input, the Extbase database abstraction layer is susceptible to SQL Injection. TYPO3 sites which have no Extbase extensions installed are not affected. Extbase extensions are affected if they use the Query Object Model and relation values are user generated input. Credits go to Helmut Hummel and Markus Opahle who discovered and reported the issue.

Access tracking mechanism - Failing to validate user provided input, the access tracking mechanism allows redirects to arbitrary URLs. To fix this vulnerability, we had to break existing behaviour of TYPO3 sites that use the access tracking mechanism (jumpurl feature) to transform links to external sites. The link generation has been changed to include a hash that is checked before redirecting to an external URL. This means that old links that have been distributed (e.g. by a newsletter) will not work any more.


Discovery 2013-03-06
Entry 2013-03-06
typo3
ge 4.5.0 lt 4.5.23

ge 4.6.0 lt 4.6.16

ge 4.7.0 lt 4.7.8

ge 6.0.0 lt 6.0.2

http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-001/
79818ef9-2d10-11e2-9160-00262d5ed8eetypo3 -- Multiple vulnerabilities in TYPO3 Core

Typo Security Team reports:

TYPO3 Backend History Module - Due to missing encoding of user input, the history module is susceptible to SQL Injection and Cross-Site Scripting. A valid backend login is required to exploit this vulnerability. Credits go to Thomas Worm who discovered and reported the issue.

TYPO3 Backend API - Failing to properly HTML-encode user input the tree render API (TCA-Tree) is susceptible to Cross-Site Scripting. TYPO3 Versions below 6.0 does not make us of this API, thus is not exploitable, if no third party extension is installed which uses this API. A valid backend login is required to exploit this vulnerability. Credits go to Richard Brain who discovered and reported the issue.


Discovery 2012-11-08
Entry 2012-11-12
typo3
ge 4.5.0 lt 4.5.21

ge 4.6.0 lt 4.6.14

ge 4.7.0 lt 4.7.6

http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-005/