Vulnerability Database

With exploit

typo3 / typo3

Title Severity Exploit Date Affected Version
CVE-2012-3528 Low Sep 6, 2012 == 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3529 Low Sep 6, 2012 == 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3530 Low Sep 6, 2012 == 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3531 Low Sep 6, 2012 == 4.5.3
== 4.5.9
== 4.5.12
== 4.5.15
== 4.5.5
== 4.5.13
== 4.5.17
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.18
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.16
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.8
== 4.6.0
== 4.6.10
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.6.9
== 4.6.11
== 4.7.1
== 4.7.2
== 4.7
== 4.7.0
== 4.7.3
CVE-2012-3527 Low Sep 6, 2012 >= 4.5.0 < 4.5.19
>= 4.6.0 < 4.6.12
>= 4.7.0 < 4.7.4
CVE-2012-1605 Medium Sep 4, 2012 == 4.6.6
== 4.6.3
== 4.6.0
== 6.0
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.7
== 4.6.2
CVE-2012-1606 Low Sep 4, 2012 == 4.5.3
== 4.5.9
== 4.5.12
== 4.6.6
== 4.6.3
== 4.5.5
== 4.5.13
== 4.4.13
== 4.5.8
== 4.4.4
== 4.4.5
== 4.6.0
== 4.4.11
== 4.5.7
== 4.5.6
== 6.0
== 4.4.1
== 4.5.0
== 4.6.5
== 4.4.2
== 4.4.6
== 4.4.7
== 4.5.11
== 4.4.0
== 4.6.1
== 4.4.9
== 4.6.4
== 4.4.8
== 4.7
== 4.5.1
== 4.5.4
== 4.6.2
== 4.4.10
== 4.5.2
== 4.5.10
== 4.4.3
== 4.4.12
CVE-2012-1607 Medium Sep 4, 2012 == 4.4.13
== 4.4.4
== 4.4.5
== 4.4.11
== 4.4.1
== 4.4.2
== 4.4.6
== 4.4.7
== 4.4.0
== 4.4.9
== 4.4
== 4.4.8
== 4.4.10
== 4.4.3
== 4.4.12
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.5
== 4.5.13
== 4.5.8
== 4.5.7
== 4.5.6
== 4.5.0
== 4.5
== 4.5.11
== 4.5.1
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.0
== 4.6.5
== 4.6
== 4.6.1
== 4.6.4
== 4.6.2
== 6.0
== 4.7
CVE-2012-1608 Medium Sep 4, 2012 == 4.5.3
== 4.5.9
== 4.5.12
== 4.6.6
== 4.6.3
== 4.5.5
== 4.5.13
== 4.4.13
== 4.5.8
== 4.4.4
== 4.4.5
== 4.6.0
== 4.4.11
== 4.5.7
== 4.5.6
== 6.0
== 4.4.1
== 4.5.0
== 4.6.5
== 4.4.2
== 4.4.6
== 4.4.7
== 4.5.11
== 4.4.0
== 4.6.1
== 4.4.9
== 4.6.4
== 4.4.8
== 4.7
== 4.5.1
== 4.5.4
== 4.6.2
== 4.4.10
== 4.5.2
== 4.5.10
== 4.4.3
== 4.4.12
CVE-2012-2112 Low Aug 27, 2012 == 4.4.14
== 4.4.13
== 4.4.4
== 4.4.5
== 4.4.11
== 4.4.1
== 4.4.2
== 4.4.6
== 4.4.7
== 4.4.0
== 4.4.9
== 4.4.8
== 4.4.10
== 4.4.3
== 4.4.12
== 4.5.3
== 4.5.9
== 4.5.12
== 4.5.5
== 4.5.13
== 4.5.8
== 4.5.14
== 4.5.7
== 4.5.6
== 4.5.0
== 4.5.11
== 4.5.1
== 4.5.4
== 4.5.2
== 4.5.10
== 4.6.6
== 4.6.3
== 4.6.0
== 4.6.5
== 4.6.1
== 4.6.4
== 4.6.7
== 4.6.2
== 4.7