Total vulnerabilities in the database
The configuration module in the backend in TYPO3 4.5.x before 4.5.19, 4.6.x before 4.6.12 and 4.7.x before 4.7.4 allows remote authenticated backend users to obtain the encryption key via unspecified vectors.
Software | From | Fixed in |
---|---|---|
typo3 / typo3 | 4.5.3 | 4.5.3.x |
typo3 / typo3 | 4.5.9 | 4.5.9.x |
typo3 / typo3 | 4.5.12 | 4.5.12.x |
typo3 / typo3 | 4.5.15 | 4.5.15.x |
typo3 / typo3 | 4.5.5 | 4.5.5.x |
typo3 / typo3 | 4.5.13 | 4.5.13.x |
typo3 / typo3 | 4.5.17 | 4.5.17.x |
typo3 / typo3 | 4.5.8 | 4.5.8.x |
typo3 / typo3 | 4.5.14 | 4.5.14.x |
typo3 / typo3 | 4.5.7 | 4.5.7.x |
typo3 / typo3 | 4.5.6 | 4.5.6.x |
typo3 / typo3 | 4.5.18 | 4.5.18.x |
typo3 / typo3 | 4.5.0 | 4.5.0.x |
typo3 / typo3 | 4.5 | 4.5.x |
typo3 / typo3 | 4.5.11 | 4.5.11.x |
typo3 / typo3 | 4.5.1 | 4.5.1.x |
typo3 / typo3 | 4.5.16 | 4.5.16.x |
typo3 / typo3 | 4.5.4 | 4.5.4.x |
typo3 / typo3 | 4.5.2 | 4.5.2.x |
typo3 / typo3 | 4.5.10 | 4.5.10.x |
typo3 / typo3 | 4.6.6 | 4.6.6.x |
typo3 / typo3 | 4.6.3 | 4.6.3.x |
typo3 / typo3 | 4.6.8 | 4.6.8.x |
typo3 / typo3 | 4.6.0 | 4.6.0.x |
typo3 / typo3 | 4.6.10 | 4.6.10.x |
typo3 / typo3 | 4.6.5 | 4.6.5.x |
typo3 / typo3 | 4.6 | 4.6.x |
typo3 / typo3 | 4.6.1 | 4.6.1.x |
typo3 / typo3 | 4.6.4 | 4.6.4.x |
typo3 / typo3 | 4.6.7 | 4.6.7.x |
typo3 / typo3 | 4.6.2 | 4.6.2.x |
typo3 / typo3 | 4.6.9 | 4.6.9.x |
typo3 / typo3 | 4.6.11 | 4.6.11.x |
typo3 / typo3 | 4.7.1 | 4.7.1.x |
typo3 / typo3 | 4.7.2 | 4.7.2.x |
typo3 / typo3 | 4.7 | 4.7.x |
typo3 / typo3 | 4.7.0 | 4.7.0.x |
typo3 / typo3 | 4.7.3 | 4.7.3.x |