Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2012-1608

The t3lib_div::RemoveXSS API method in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and inject arbitrary web script or HTML via non printable characters.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.017
EPSS Ranking 81.2%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2012-1608
  • Typo3 » Typo3 » Version: 4.4.0
    cpe:2.3:a:typo3:typo3:4.4.0
  • Typo3 » Typo3 » Version: 4.4.1
    cpe:2.3:a:typo3:typo3:4.4.1
  • Typo3 » Typo3 » Version: 4.4.10
    cpe:2.3:a:typo3:typo3:4.4.10
  • Typo3 » Typo3 » Version: 4.4.11
    cpe:2.3:a:typo3:typo3:4.4.11
  • Typo3 » Typo3 » Version: 4.4.12
    cpe:2.3:a:typo3:typo3:4.4.12
  • Typo3 » Typo3 » Version: 4.4.13
    cpe:2.3:a:typo3:typo3:4.4.13
  • Typo3 » Typo3 » Version: 4.4.2
    cpe:2.3:a:typo3:typo3:4.4.2
  • Typo3 » Typo3 » Version: 4.4.3
    cpe:2.3:a:typo3:typo3:4.4.3
  • Typo3 » Typo3 » Version: 4.4.4
    cpe:2.3:a:typo3:typo3:4.4.4
  • Typo3 » Typo3 » Version: 4.4.5
    cpe:2.3:a:typo3:typo3:4.4.5
  • Typo3 » Typo3 » Version: 4.4.6
    cpe:2.3:a:typo3:typo3:4.4.6
  • Typo3 » Typo3 » Version: 4.4.7
    cpe:2.3:a:typo3:typo3:4.4.7
  • Typo3 » Typo3 » Version: 4.4.8
    cpe:2.3:a:typo3:typo3:4.4.8
  • Typo3 » Typo3 » Version: 4.4.9
    cpe:2.3:a:typo3:typo3:4.4.9
  • Typo3 » Typo3 » Version: 4.5.0
    cpe:2.3:a:typo3:typo3:4.5.0
  • Typo3 » Typo3 » Version: 4.5.1
    cpe:2.3:a:typo3:typo3:4.5.1
  • Typo3 » Typo3 » Version: 4.5.10
    cpe:2.3:a:typo3:typo3:4.5.10
  • Typo3 » Typo3 » Version: 4.5.11
    cpe:2.3:a:typo3:typo3:4.5.11
  • Typo3 » Typo3 » Version: 4.5.12
    cpe:2.3:a:typo3:typo3:4.5.12
  • Typo3 » Typo3 » Version: 4.5.13
    cpe:2.3:a:typo3:typo3:4.5.13
  • Typo3 » Typo3 » Version: 4.5.2
    cpe:2.3:a:typo3:typo3:4.5.2
  • Typo3 » Typo3 » Version: 4.5.3
    cpe:2.3:a:typo3:typo3:4.5.3
  • Typo3 » Typo3 » Version: 4.5.4
    cpe:2.3:a:typo3:typo3:4.5.4
  • Typo3 » Typo3 » Version: 4.5.5
    cpe:2.3:a:typo3:typo3:4.5.5
  • Typo3 » Typo3 » Version: 4.5.6
    cpe:2.3:a:typo3:typo3:4.5.6
  • Typo3 » Typo3 » Version: 4.5.7
    cpe:2.3:a:typo3:typo3:4.5.7
  • Typo3 » Typo3 » Version: 4.5.8
    cpe:2.3:a:typo3:typo3:4.5.8
  • Typo3 » Typo3 » Version: 4.5.9
    cpe:2.3:a:typo3:typo3:4.5.9
  • Typo3 » Typo3 » Version: 4.6.0
    cpe:2.3:a:typo3:typo3:4.6.0
  • Typo3 » Typo3 » Version: 4.6.1
    cpe:2.3:a:typo3:typo3:4.6.1
  • Typo3 » Typo3 » Version: 4.6.2
    cpe:2.3:a:typo3:typo3:4.6.2
  • Typo3 » Typo3 » Version: 4.6.3
    cpe:2.3:a:typo3:typo3:4.6.3
  • Typo3 » Typo3 » Version: 4.6.4
    cpe:2.3:a:typo3:typo3:4.6.4
  • Typo3 » Typo3 » Version: 4.6.5
    cpe:2.3:a:typo3:typo3:4.6.5
  • Typo3 » Typo3 » Version: 4.6.6
    cpe:2.3:a:typo3:typo3:4.6.6
  • Typo3 » Typo3 » Version: 4.7
    cpe:2.3:a:typo3:typo3:4.7
  • Typo3 » Typo3 » Version: 6.0
    cpe:2.3:a:typo3:typo3:6.0


Contact Us

Shodan ® - All rights reserved