Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2014-3942
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-03 Jun, 2014 | 14:55
Updated At-12 Apr, 2025 | 10:46

The Color Picker Wizard component in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, and 6.1.0 before 6.1.9 allows remote authenticated editors to execute arbitrary PHP code via a serialized PHP object.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.0MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:P
CPE Matches

TYPO3 Association
typo3
>>typo3>>6.1
cpe:2.3:a:typo3:typo3:6.1:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.1
cpe:2.3:a:typo3:typo3:6.1.1:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.2
cpe:2.3:a:typo3:typo3:6.1.2:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.3
cpe:2.3:a:typo3:typo3:6.1.3:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.4
cpe:2.3:a:typo3:typo3:6.1.4:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.5
cpe:2.3:a:typo3:typo3:6.1.5:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.6
cpe:2.3:a:typo3:typo3:6.1.6:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.7
cpe:2.3:a:typo3:typo3:6.1.7:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>6.1.8
cpe:2.3:a:typo3:typo3:6.1.8:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.0
cpe:2.3:a:typo3:typo3:4.7.0:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.1
cpe:2.3:a:typo3:typo3:4.7.1:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.2
cpe:2.3:a:typo3:typo3:4.7.2:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.3
cpe:2.3:a:typo3:typo3:4.7.3:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.4
cpe:2.3:a:typo3:typo3:4.7.4:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.5
cpe:2.3:a:typo3:typo3:4.7.5:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.6
cpe:2.3:a:typo3:typo3:4.7.6:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.7
cpe:2.3:a:typo3:typo3:4.7.7:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.8
cpe:2.3:a:typo3:typo3:4.7.8:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.9
cpe:2.3:a:typo3:typo3:4.7.9:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.10
cpe:2.3:a:typo3:typo3:4.7.10:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.11
cpe:2.3:a:typo3:typo3:4.7.11:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.12
cpe:2.3:a:typo3:typo3:4.7.12:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.13
cpe:2.3:a:typo3:typo3:4.7.13:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.14
cpe:2.3:a:typo3:typo3:4.7.14:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.15
cpe:2.3:a:typo3:typo3:4.7.15:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.16
cpe:2.3:a:typo3:typo3:4.7.16:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.17
cpe:2.3:a:typo3:typo3:4.7.17:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.7.18
cpe:2.3:a:typo3:typo3:4.7.18:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.0
cpe:2.3:a:typo3:typo3:4.5.0:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.1
cpe:2.3:a:typo3:typo3:4.5.1:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.2
cpe:2.3:a:typo3:typo3:4.5.2:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.3
cpe:2.3:a:typo3:typo3:4.5.3:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.4
cpe:2.3:a:typo3:typo3:4.5.4:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.5
cpe:2.3:a:typo3:typo3:4.5.5:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.6
cpe:2.3:a:typo3:typo3:4.5.6:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.7
cpe:2.3:a:typo3:typo3:4.5.7:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.8
cpe:2.3:a:typo3:typo3:4.5.8:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.9
cpe:2.3:a:typo3:typo3:4.5.9:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.10
cpe:2.3:a:typo3:typo3:4.5.10:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.11
cpe:2.3:a:typo3:typo3:4.5.11:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.12
cpe:2.3:a:typo3:typo3:4.5.12:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.13
cpe:2.3:a:typo3:typo3:4.5.13:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.14
cpe:2.3:a:typo3:typo3:4.5.14:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.15
cpe:2.3:a:typo3:typo3:4.5.15:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.16
cpe:2.3:a:typo3:typo3:4.5.16:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.17
cpe:2.3:a:typo3:typo3:4.5.17:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.18
cpe:2.3:a:typo3:typo3:4.5.18:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.19
cpe:2.3:a:typo3:typo3:4.5.19:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.20
cpe:2.3:a:typo3:typo3:4.5.20:*:*:*:*:*:*:*
TYPO3 Association
typo3
>>typo3>>4.5.21
cpe:2.3:a:typo3:typo3:4.5.21:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.htmlcve@mitre.org
N/A
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/cve@mitre.org
Vendor Advisory
http://www.debian.org/security/2014/dsa-2942cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2014/06/03/2cve@mitre.org
N/A
http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-001/af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2014/dsa-2942af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2014/06/03/2af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found