Vulnerability Database

With exploit

typo3 / typo3

Title Severity Exploit Date Affected Version
CVE-2010-5099 Medium May 30, 2012 == 4.2.10
== 4.2.14
== 4.2.4
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.2.8
== 4.2.13
== 4.2.3
== 4.2.1
== 4.2.12
== 4.2.6
== 4.2.2
== 4.2.7
== 4.2.9
== 4.3.6
== 4.3.5
== 4.3.8
== 4.3.7
== 4.3.2
== 4.3.0
== 4.3.3
== 4.3.4
== 4.3.1
== 4.4.4
== 4.4.1
== 4.4.2
== 4.4.0
== 4.4.3
CVE-2010-5097 Low May 21, 2012 == 4.3.6
== 4.3.5
== 4.3.8
== 4.3.7
== 4.4.4
== 4.3.2
== 4.4.1
== 4.4.2
== 4.3.0
== 4.3.3
== 4.3.4
== 4.4
== 4.3.1
== 4.4.3
CVE-2010-5098 Low May 21, 2012 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.3.8
== 4.2.4
== 4.2
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.3.7
== 4.2.8
== 4.2.13
== 4.2.3
== 4.4.4
== 4.2.1
== 4.3
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9
CVE-2010-5100 Low May 21, 2012 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.3.8
== 4.2.4
== 4.2
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.3.7
== 4.2.8
== 4.2.13
== 4.2.3
== 4.4.4
== 4.2.1
== 4.3
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9
CVE-2010-5101 Low May 21, 2012 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.3.8
== 4.2.4
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.3.7
== 4.2.8
== 4.2.13
== 4.2.3
== 4.4.4
== 4.2.1
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9
CVE-2010-5102 Medium May 21, 2012 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.3.8
== 4.2.4
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.3.7
== 4.2.8
== 4.2.13
== 4.2.3
== 4.4.4
== 4.2.1
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9
CVE-2010-5103 Medium May 21, 2012 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.3.8
== 4.2.4
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.3.7
== 4.2.8
== 4.2.13
== 4.2.3
== 4.4.4
== 4.2.1
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9
CVE-2010-5104 Low May 21, 2012 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.3.8
== 4.2.4
== 4.2.5
== 4.2.15
== 4.2.11
== 4.2.0
== 4.3.7
== 4.2.8
== 4.2.13
== 4.2.3
== 4.4.4
== 4.2.1
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9
CVE-2011-4614 Medium Feb 18, 2012 == 4.5.3
== 4.5.5
== 4.5.8
== 4.5.7
== 4.5.6
== 4.5
== 4.5.1
== 4.5.4
== 4.5.2
== 4.6
== 4.6.1
CVE-2010-3714 High Oct 25, 2010 == 4.2.10
== 4.3.6
== 4.2.14
== 4.3.5
== 4.2.4
== 4.2.5
== 4.2.11
== 4.2.0
== 4.2.8
== 4.2.13
== 4.2.3
== 4.2.1
== 4.3.2
== 4.4.1
== 4.4.2
== 4.2.12
== 4.2.6
== 4.3.0
== 4.2.2
== 4.3.3
== 4.3.4
== 4.4
== 4.3.1
== 4.2.7
== 4.4.3
== 4.2.9