Lookup for vulnerable packages by Package URL.

Purlpkg:composer/typo3/cms@4.3.0
Typecomposer
Namespacetypo3
Namecms
Version4.3.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version10.4.35
Latest_non_vulnerable_version12.2.0
Affected_by_vulnerabilities
0
url VCID-5arh-exf5-zub1
vulnerability_id VCID-5arh-exf5-zub1
summary
TYPO3 SQL Injection vulnerability
SQL injection vulnerability in the list module in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via unspecified vectors.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5103
reference_id
reference_type
scores
0
value 0.00652
scoring_system epss
scoring_elements 0.70849
published_at 2026-04-04T12:55:00Z
1
value 0.00652
scoring_system epss
scoring_elements 0.70908
published_at 2026-04-21T12:55:00Z
2
value 0.00652
scoring_system epss
scoring_elements 0.70928
published_at 2026-04-18T12:55:00Z
3
value 0.00652
scoring_system epss
scoring_elements 0.70921
published_at 2026-04-16T12:55:00Z
4
value 0.00652
scoring_system epss
scoring_elements 0.70875
published_at 2026-04-13T12:55:00Z
5
value 0.00652
scoring_system epss
scoring_elements 0.70891
published_at 2026-04-12T12:55:00Z
6
value 0.00652
scoring_system epss
scoring_elements 0.70906
published_at 2026-04-11T12:55:00Z
7
value 0.00652
scoring_system epss
scoring_elements 0.70883
published_at 2026-04-09T12:55:00Z
8
value 0.00652
scoring_system epss
scoring_elements 0.70824
published_at 2026-04-07T12:55:00Z
9
value 0.00652
scoring_system epss
scoring_elements 0.70816
published_at 2026-04-01T12:55:00Z
10
value 0.00652
scoring_system epss
scoring_elements 0.70831
published_at 2026-04-02T12:55:00Z
11
value 0.00652
scoring_system epss
scoring_elements 0.70868
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5103
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64184
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64184
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-5103
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-5103
4
reference_url https://web.archive.org/web/20120123102224/http://www.securityfocus.com/bid/45470
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20120123102224/http://www.securityfocus.com/bid/45470
5
reference_url https://web.archive.org/web/20120801235059/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20120801235059/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022
6
reference_url http://www.openwall.com/lists/oss-security/2011/01/13/2
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2011/01/13/2
7
reference_url http://www.openwall.com/lists/oss-security/2012/05/10/7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/10/7
8
reference_url http://www.openwall.com/lists/oss-security/2012/05/11/3
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/11/3
9
reference_url http://www.openwall.com/lists/oss-security/2012/05/12/5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/12/5
10
reference_url https://github.com/advisories/GHSA-r2w2-2r2x-fpcx
reference_id GHSA-r2w2-2r2x-fpcx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r2w2-2r2x-fpcx
fixed_packages
0
url pkg:composer/typo3/cms@4.3.9
purl pkg:composer/typo3/cms@4.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.3.9
1
url pkg:composer/typo3/cms@4.4.5
purl pkg:composer/typo3/cms@4.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.4.5
aliases CVE-2010-5103, GHSA-r2w2-2r2x-fpcx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5arh-exf5-zub1
1
url VCID-enht-zcrt-mbe6
vulnerability_id VCID-enht-zcrt-mbe6
summary
TYPO3 Path Traversal vulnerability
The fileDenyPattern functionality in the PHP file inclusion protection API in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 does not properly filter file types, which allows remote attackers to bypass intended access restrictions and access arbitrary PHP files, as demonstrated using path traversal sequences with %00 null bytes and CVE-2010-3714 to read the TYPO3 encryption key from localconf.php.
references
0
reference_url http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5099
reference_id
reference_type
scores
0
value 0.05249
scoring_system epss
scoring_elements 0.89995
published_at 2026-04-21T12:55:00Z
1
value 0.05957
scoring_system epss
scoring_elements 0.90646
published_at 2026-04-13T12:55:00Z
2
value 0.05957
scoring_system epss
scoring_elements 0.90652
published_at 2026-04-12T12:55:00Z
3
value 0.05957
scoring_system epss
scoring_elements 0.90643
published_at 2026-04-09T12:55:00Z
4
value 0.05957
scoring_system epss
scoring_elements 0.90605
published_at 2026-04-01T12:55:00Z
5
value 0.05957
scoring_system epss
scoring_elements 0.90664
published_at 2026-04-18T12:55:00Z
6
value 0.05957
scoring_system epss
scoring_elements 0.90666
published_at 2026-04-16T12:55:00Z
7
value 0.05957
scoring_system epss
scoring_elements 0.90637
published_at 2026-04-08T12:55:00Z
8
value 0.05957
scoring_system epss
scoring_elements 0.90626
published_at 2026-04-07T12:55:00Z
9
value 0.05957
scoring_system epss
scoring_elements 0.90618
published_at 2026-04-04T12:55:00Z
10
value 0.05957
scoring_system epss
scoring_elements 0.90608
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5099
2
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64180
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64180
3
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
4
reference_url https://web.archive.org/web/20120801235059/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20120801235059/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022
5
reference_url http://www.exploit-db.com/exploits/15856
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.exploit-db.com/exploits/15856
6
reference_url http://www.openwall.com/lists/oss-security/2011/01/13/2
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2011/01/13/2
7
reference_url http://www.openwall.com/lists/oss-security/2012/05/10/7
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/10/7
8
reference_url http://www.openwall.com/lists/oss-security/2012/05/11/3
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/11/3
9
reference_url http://www.openwall.com/lists/oss-security/2012/05/12/5
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/12/5
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-5099
reference_id CVE-2010-5099
reference_type
scores
0
value 6.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-5099
11
reference_url https://github.com/advisories/GHSA-66j3-66cp-6c2m
reference_id GHSA-66j3-66cp-6c2m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-66j3-66cp-6c2m
fixed_packages
0
url pkg:composer/typo3/cms@4.3.9
purl pkg:composer/typo3/cms@4.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.3.9
1
url pkg:composer/typo3/cms@4.4.5
purl pkg:composer/typo3/cms@4.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.4.5
aliases CVE-2010-5099, GHSA-66j3-66cp-6c2m
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-enht-zcrt-mbe6
2
url VCID-jbu9-bp56-rkgw
vulnerability_id VCID-jbu9-bp56-rkgw
summary
TYPO3 Remote File Disclosure vulnerability in the jumpUrl mechanism
The jumpUrl (aka access tracking) implementation in `tslib/class.tslib_fe.php` in TYPO3 4.2.x before 4.2.15, 4.3.x before 4.3.7, and 4.4.x before 4.4.4 does not properly compare certain hash values during access-control decisions, which allows remote attackers to read arbitrary files via unspecified vectors.
references
0
reference_url http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3714
reference_id
reference_type
scores
0
value 0.35507
scoring_system epss
scoring_elements 0.97074
published_at 2026-04-21T12:55:00Z
1
value 0.35507
scoring_system epss
scoring_elements 0.9707
published_at 2026-04-18T12:55:00Z
2
value 0.35507
scoring_system epss
scoring_elements 0.97067
published_at 2026-04-16T12:55:00Z
3
value 0.35507
scoring_system epss
scoring_elements 0.97056
published_at 2026-04-13T12:55:00Z
4
value 0.35507
scoring_system epss
scoring_elements 0.97055
published_at 2026-04-12T12:55:00Z
5
value 0.35507
scoring_system epss
scoring_elements 0.97052
published_at 2026-04-09T12:55:00Z
6
value 0.35507
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-08T12:55:00Z
7
value 0.35507
scoring_system epss
scoring_elements 0.97041
published_at 2026-04-07T12:55:00Z
8
value 0.35507
scoring_system epss
scoring_elements 0.9703
published_at 2026-04-01T12:55:00Z
9
value 0.35507
scoring_system epss
scoring_elements 0.97037
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3714
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://github.com/TYPO3/typo3/commit/687b671c765eac10ffb764547bb403ac3ef55620
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/687b671c765eac10ffb764547bb403ac3ef55620
4
reference_url https://github.com/TYPO3/typo3/commit/a8ccd387cafd2c2c338fc29109c16418f7657229
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/a8ccd387cafd2c2c338fc29109c16418f7657229
5
reference_url https://github.com/TYPO3/typo3/commit/d95f06f633fd2c289b544f6d5907b789eae6cccb
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3/commit/d95f06f633fd2c289b544f6d5907b789eae6cccb
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3714
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-3714
7
reference_url https://web.archive.org/web/20111220151231/http://www.securityfocus.com/bid/43786
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20111220151231/http://www.securityfocus.com/bid/43786
8
reference_url http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020
9
reference_url http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-020/
10
reference_url http://www.debian.org/security/2010/dsa-2121
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2010/dsa-2121
11
reference_url http://www.exploit-db.com/exploits/15856
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.exploit-db.com/exploits/15856
12
reference_url http://www.securityfocus.com/bid/43786
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43786
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.4.3:*:*:*:*:*:*:*
39
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/15856.php
reference_id CVE-2012-2344;OSVDB-70121;CVE-2010-5099;CVE-2010-3714;OSVDB-68590
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/15856.php
40
reference_url https://github.com/advisories/GHSA-w736-qv86-vq94
reference_id GHSA-w736-qv86-vq94
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w736-qv86-vq94
fixed_packages
0
url pkg:composer/typo3/cms@4.3.7
purl pkg:composer/typo3/cms@4.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.3.7
1
url pkg:composer/typo3/cms@4.4.4
purl pkg:composer/typo3/cms@4.4.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.4.4
aliases CVE-2010-3714, GHSA-w736-qv86-vq94
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jbu9-bp56-rkgw
3
url VCID-k6fn-pcqn-byhu
vulnerability_id VCID-k6fn-pcqn-byhu
summary
TYPO3 Directory Traversal vulnerability
Directory traversal vulnerability in the TypoScript setup in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allows remote authenticated administrators to read arbitrary files via unspecified vectors related to the "file inclusion functionality."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5101
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.60999
published_at 2026-04-01T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.6115
published_at 2026-04-21T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61168
published_at 2026-04-18T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61163
published_at 2026-04-16T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61122
published_at 2026-04-13T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61141
published_at 2026-04-12T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61155
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61119
published_at 2026-04-08T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.6107
published_at 2026-04-07T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61104
published_at 2026-04-04T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61076
published_at 2026-04-02T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61134
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5101
1
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64180
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64180
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-5101
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-5101
4
reference_url https://web.archive.org/web/20120123102224/http://www.securityfocus.com/bid/45470
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20120123102224/http://www.securityfocus.com/bid/45470
5
reference_url https://web.archive.org/web/20121103085228/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121103085228/http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-sa-2010-022
6
reference_url http://www.openwall.com/lists/oss-security/2011/01/13/2
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2011/01/13/2
7
reference_url http://www.openwall.com/lists/oss-security/2012/05/10/7
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/10/7
8
reference_url http://www.openwall.com/lists/oss-security/2012/05/11/3
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/11/3
9
reference_url http://www.openwall.com/lists/oss-security/2012/05/12/5
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/12/5
10
reference_url https://github.com/advisories/GHSA-rmqc-wfjm-3f66
reference_id GHSA-rmqc-wfjm-3f66
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rmqc-wfjm-3f66
fixed_packages
0
url pkg:composer/typo3/cms@4.3.9
purl pkg:composer/typo3/cms@4.3.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.3.9
1
url pkg:composer/typo3/cms@4.4.5
purl pkg:composer/typo3/cms@4.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.4.5
aliases CVE-2010-5101, GHSA-rmqc-wfjm-3f66
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6fn-pcqn-byhu
4
url VCID-p8an-crb2-2qc3
vulnerability_id VCID-p8an-crb2-2qc3
summary
TYPO3 PHP remote file inclusion vulnerability
PHP remote file inclusion vulnerability in the autoloader in TYPO3 4.3.x before 4.3.3 allows remote attackers to execute arbitrary PHP code via a URL in an input field associated with the className variable.
references
0
reference_url http://marc.info/?l=oss-security&m=127092306209177&w=2
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://marc.info/?l=oss-security&m=127092306209177&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1153
reference_id
reference_type
scores
0
value 0.00602
scoring_system epss
scoring_elements 0.69563
published_at 2026-04-18T12:55:00Z
1
value 0.00602
scoring_system epss
scoring_elements 0.69449
published_at 2026-04-01T12:55:00Z
2
value 0.00602
scoring_system epss
scoring_elements 0.6946
published_at 2026-04-02T12:55:00Z
3
value 0.00602
scoring_system epss
scoring_elements 0.69476
published_at 2026-04-04T12:55:00Z
4
value 0.00602
scoring_system epss
scoring_elements 0.69456
published_at 2026-04-07T12:55:00Z
5
value 0.00602
scoring_system epss
scoring_elements 0.69506
published_at 2026-04-08T12:55:00Z
6
value 0.00602
scoring_system epss
scoring_elements 0.69522
published_at 2026-04-09T12:55:00Z
7
value 0.00602
scoring_system epss
scoring_elements 0.69544
published_at 2026-04-21T12:55:00Z
8
value 0.00602
scoring_system epss
scoring_elements 0.69528
published_at 2026-04-12T12:55:00Z
9
value 0.00602
scoring_system epss
scoring_elements 0.69514
published_at 2026-04-13T12:55:00Z
10
value 0.00602
scoring_system epss
scoring_elements 0.69554
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1153
2
reference_url https://github.com/TYPO3/typo3
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TYPO3/typo3
3
reference_url https://web.archive.org/web/20100813082506/http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-008
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20100813082506/http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-008
4
reference_url http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-008/
reference_id
reference_type
scores
url http://typo3.org/teams/security/security-bulletins/typo3-sa-2010-008/
5
reference_url http://www.openwall.com/lists/oss-security/2010/04/12/1
reference_id
reference_type
scores
0
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2010/04/12/1
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1153
reference_id CVE-2010-1153
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2010-1153
10
reference_url https://github.com/advisories/GHSA-4h9j-f98m-p4hg
reference_id GHSA-4h9j-f98m-p4hg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4h9j-f98m-p4hg
fixed_packages
0
url pkg:composer/typo3/cms@4.3.3
purl pkg:composer/typo3/cms@4.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.3.3
aliases CVE-2010-1153, GHSA-4h9j-f98m-p4hg
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8an-crb2-2qc3
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/typo3/cms@4.3.0