Total vulnerabilities in the database
The Command Line Interface (CLI) script in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allows remote attackers to obtain the database name via a direct request.
Software | From | Fixed in |
---|---|---|
typo3 / typo3 | 4.4.13 | 4.4.13.x |
typo3 / typo3 | 4.4.4 | 4.4.4.x |
typo3 / typo3 | 4.4.5 | 4.4.5.x |
typo3 / typo3 | 4.4.11 | 4.4.11.x |
typo3 / typo3 | 4.4.1 | 4.4.1.x |
typo3 / typo3 | 4.4.2 | 4.4.2.x |
typo3 / typo3 | 4.4.6 | 4.4.6.x |
typo3 / typo3 | 4.4.7 | 4.4.7.x |
typo3 / typo3 | 4.4.0 | 4.4.0.x |
typo3 / typo3 | 4.4.9 | 4.4.9.x |
typo3 / typo3 | 4.4 | 4.4.x |
typo3 / typo3 | 4.4.8 | 4.4.8.x |
typo3 / typo3 | 4.4.10 | 4.4.10.x |
typo3 / typo3 | 4.4.3 | 4.4.3.x |
typo3 / typo3 | 4.4.12 | 4.4.12.x |
typo3 / typo3 | 4.5.3 | 4.5.3.x |
typo3 / typo3 | 4.5.9 | 4.5.9.x |
typo3 / typo3 | 4.5.12 | 4.5.12.x |
typo3 / typo3 | 4.5.5 | 4.5.5.x |
typo3 / typo3 | 4.5.13 | 4.5.13.x |
typo3 / typo3 | 4.5.8 | 4.5.8.x |
typo3 / typo3 | 4.5.7 | 4.5.7.x |
typo3 / typo3 | 4.5.6 | 4.5.6.x |
typo3 / typo3 | 4.5.0 | 4.5.0.x |
typo3 / typo3 | 4.5 | 4.5.x |
typo3 / typo3 | 4.5.11 | 4.5.11.x |
typo3 / typo3 | 4.5.1 | 4.5.1.x |
typo3 / typo3 | 4.5.4 | 4.5.4.x |
typo3 / typo3 | 4.5.2 | 4.5.2.x |
typo3 / typo3 | 4.5.10 | 4.5.10.x |
typo3 / typo3 | 4.6.6 | 4.6.6.x |
typo3 / typo3 | 4.6.3 | 4.6.3.x |
typo3 / typo3 | 4.6.0 | 4.6.0.x |
typo3 / typo3 | 4.6.5 | 4.6.5.x |
typo3 / typo3 | 4.6 | 4.6.x |
typo3 / typo3 | 4.6.1 | 4.6.1.x |
typo3 / typo3 | 4.6.4 | 4.6.4.x |
typo3 / typo3 | 4.6.2 | 4.6.2.x |
typo3 / typo3 | 6.0 | 6.0.x |
typo3 / typo3 | 4.7 | 4.7.x |