Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 314,343
With exploit
typo3 / typo3
You can search for specific versions with
https://synscan.net/product/typo3/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2012-3529
Low
Sep 5, 2012
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3530
Low
Sep 5, 2012
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3531
Low
Sep 5, 2012
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3528
Low
Sep 5, 2012
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3527
Low
Sep 5, 2012
>= 4.5.0 < 4.5.19
>= 4.6.0 < 4.6.12
>= 4.7.0 < 4.7.4
CVE-2012-1605
Medium
Sep 4, 2012
== 4.6.6
== 4.6.3
== 4.6.0
== 6.0
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.7
== 4.6.2
CVE-2012-1606
Low
Sep 4, 2012
== 4.5.3
== 4.5.9
== 4.5.12
== 4.6.6
== 4.6.3
== 4.5.5
== 4.5.13
== 4.4.13
== 4.5.8
== 4.4.4
== 4.4.5
== 4.6.0
== 4.4.11
== 4.5.7
== 4.5.6
== 6.0
== 4.4.1
== 4.5.0
== 4.6.5
== 4.4.2
== 4.4.6
== 4.4.7
== 4.5.11
== 4.4.0
== 4.6.1
== 4.4.9
== 4.6.4
== 4.4.8
== 4.7
== 4.5.1
== 4.5.4
== 4.6.2
== 4.4.10
== 4.5.2
== 4.5.10
== 4.4.3
== 4.4.12
CVE-2012-1607
Medium
Sep 4, 2012
== 4.4.13
== 4.4.4
== 4.4.5
== 4.4.11
== 4.4.1
== 4.4.2
== 4.4.6
== 4.4.7
== 4.4.0
== 4.4.9
== 4.4
== 4.4.8
== 4.4.10
== 4.4.3
== 4.4.12
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.5
== 4.5.13
== 4.5.8
== 4.5.7
== 4.5.6
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.0
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.2
== 6.0
== 4.7
CVE-2012-1608
Medium
Sep 4, 2012
== 4.5.3
== 4.5.9
== 4.5.12
== 4.6.6
== 4.6.3
== 4.5.5
== 4.5.13
== 4.4.13
== 4.5.8
== 4.4.4
== 4.4.5
== 4.6.0
== 4.4.11
== 4.5.7
== 4.5.6
== 6.0
== 4.4.1
== 4.5.0
== 4.6.5
== 4.4.2
== 4.4.6
== 4.4.7
== 4.5.11
== 4.4.0
== 4.6.1
== 4.4.9
== 4.6.4
== 4.4.8
== 4.7
== 4.5.1
== 4.5.4
== 4.6.2
== 4.4.10
== 4.5.2
== 4.5.10
== 4.4.3
== 4.4.12
CVE-2012-2112
Low
Aug 27, 2012
== 4.4.14
== 4.4.13
== 4.4.4
== 4.4.5
== 4.4.11
== 4.4.1
== 4.4.2
== 4.4.6
== 4.4.7
== 4.4.0
== 4.4.9
== 4.4.8
== 4.4.10
== 4.4.3
== 4.4.12
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.5
== 4.5.13
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.0
== 4.5.11
== 4.5.1
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.0
== 4.6.5
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.7
‹
›
‹
1
2
...
16
17
18
...
21
22
›