Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  SEC Consult SA-20150227-0 :: Multiple vulnerabilities in Loxone Smart Home

  Stored XSS Vulnerability in ADPlugg  Wordpress Plugin

  CVE-2014-8487: Kony EMM insecurity Direct Object Reference

  N.E.T. E-Commerce Group Cross Site Scripting Vulnerability

From:DEBIAN
Date:23 марта 2015 г.
Subject:[SECURITY] [DSA 3164-1] typo3-src security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3164-1                   [email protected]
http://www.debian.org/security/                        Moritz Muehlenhoff
February 21, 2015                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : typo3-src
CVE ID         : not yet available

Pierrick Caillon discovered that the authentication could be bypassed in
the Typo 3 content management system. Please refer to the upstream
advisory for additional information:
https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-
2015-001/

For the stable distribution (wheezy), this problem has been fixed in
version 4.5.19+dfsg1-5+wheezy4.

The upcoming stable distribution (jessie) no longer includes Typo 3.

For the unstable distribution (sid), this problem has been fixed in
version 4.5.40+dfsg1-1.

We recommend that you upgrade your typo3-src packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Euei
-----END PGP SIGNATURE-----

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород