CVE-2014-3941

CVSS V2 Medium 5 CVSS V3 None
Description
TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
Overview
  • CVE ID
  • CVE-2014-3941
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2014-06-03T14:55:10
  • Last Modified Date
  • 2017-12-29T02:29:22
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:4.5.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.2.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.2.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.2.0:beta3:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:typo3:typo3:6.0.13:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 18:54:02 Added to TrackCVE
2022-12-01 23:21:06 2014-06-03T14:55Z 2014-06-03T14:55:10 CVE Published Date updated
2022-12-01 23:21:06 2017-12-29T02:29:22 CVE Modified Date updated
2022-12-01 23:21:06 Modified Vulnerability Status updated