{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T10:06:18.118","vulnerabilities":[{"cve":{"id":"CVE-2013-4680","sourceIdentifier":"cve@mitre.org","published":"2013-06-25T18:55:01.283","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Open redirect vulnerability in Maag Form Captcha extension 2.0.0 and earlier for TYPO3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en la extensión \"Maag Form Captcha\" v2.0.0 y anteriores para TYPO3 permite a atacantes remotos ejecutar comandos SQL arbitrarios a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"DC0811A1-1E3B-4302-B163-08B973027D68"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"989E684D-3404-40A5-8E4E-8EA45FA30338"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"ACC64548-2FBD-46AE-BC9A-3043B4478DB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"42F0BF75-0CC8-42D1-BC4E-4B7656851804"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"99EAAFEA-A13D-4AE7-97E6-B4B99DEB9EBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"62A6433C-1F5F-4F37-B87B-B985B21A6842"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"7E75E397-389F-42B3-8374-619ED4CAFF10"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"5C6961E1-5996-425B-AFBB-6AC23F81E779"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"F0D6F755-020F-42BB-9598-EB59595B4F8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:urs_maag:maag_form_captcha:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"4B7A2D17-5EEC-450F-B827-8C8565662DC1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:typo3:typo3:-:*:*:*:*:*:*:*","matchCriteriaId":"E66C5ABA-7727-4562-A792-5E450098D520"}]}]}],"references":[{"url":"http://osvdb.org/93818","source":"cve@mitre.org"},{"url":"http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/60298","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84670","source":"cve@mitre.org"},{"url":"http://osvdb.org/93818","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2013-007/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/60298","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84670","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}