2.6

CVE-2015-2047

The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.

Data is provided by the National Vulnerability Database (NVD)
Typo3Typo3 Version4.3.0
Typo3Typo3 Version4.3.1
Typo3Typo3 Version4.3.2
Typo3Typo3 Version4.3.3
Typo3Typo3 Version4.3.4
Typo3Typo3 Version4.3.5
Typo3Typo3 Version4.3.6
Typo3Typo3 Version4.3.7
Typo3Typo3 Version4.3.8
Typo3Typo3 Version4.3.9
Typo3Typo3 Version4.3.10
Typo3Typo3 Version4.3.11
Typo3Typo3 Version4.3.12
Typo3Typo3 Version4.3.13
Typo3Typo3 Version4.3.14
Typo3Typo3 Version4.4.0
Typo3Typo3 Version4.4.1
Typo3Typo3 Version4.4.2
Typo3Typo3 Version4.4.3
Typo3Typo3 Version4.4.4
Typo3Typo3 Version4.4.5
Typo3Typo3 Version4.4.6
Typo3Typo3 Version4.4.7
Typo3Typo3 Version4.4.8
Typo3Typo3 Version4.4.9
Typo3Typo3 Version4.4.10
Typo3Typo3 Version4.4.11
Typo3Typo3 Version4.4.12
Typo3Typo3 Version4.4.13
Typo3Typo3 Version4.4.14
Typo3Typo3 Version4.4.15
Typo3Typo3 Version4.5.0
Typo3Typo3 Version4.5.1
Typo3Typo3 Version4.5.2
Typo3Typo3 Version4.5.3
Typo3Typo3 Version4.5.4
Typo3Typo3 Version4.5.5
Typo3Typo3 Version4.5.6
Typo3Typo3 Version4.5.7
Typo3Typo3 Version4.5.8
Typo3Typo3 Version4.5.9
Typo3Typo3 Version4.5.10
Typo3Typo3 Version4.5.11
Typo3Typo3 Version4.5.12
Typo3Typo3 Version4.5.13
Typo3Typo3 Version4.5.14
Typo3Typo3 Version4.5.15
Typo3Typo3 Version4.5.16
Typo3Typo3 Version4.5.17
Typo3Typo3 Version4.5.18
Typo3Typo3 Version4.5.19
Typo3Typo3 Version4.5.20
Typo3Typo3 Version4.5.21
Typo3Typo3 Version4.5.22
Typo3Typo3 Version4.5.23
Typo3Typo3 Version4.5.24
Typo3Typo3 Version4.5.25
Typo3Typo3 Version4.5.26
Typo3Typo3 Version4.5.27
Typo3Typo3 Version4.5.28
Typo3Typo3 Version4.5.29
Typo3Typo3 Version4.5.30
Typo3Typo3 Version4.5.31
Typo3Typo3 Version4.5.32
Typo3Typo3 Version4.5.33
Typo3Typo3 Version4.5.34
Typo3Typo3 Version4.5.35
Typo3Typo3 Version4.5.36
Typo3Typo3 Version4.5.37
Typo3Typo3 Version4.5.38
Typo3Typo3 Version4.5.39
Typo3Typo3 Version4.6
Typo3Typo3 Version4.6.0
Typo3Typo3 Version4.6.1
Typo3Typo3 Version4.6.2
Typo3Typo3 Version4.6.3
Typo3Typo3 Version4.6.4
Typo3Typo3 Version4.6.5
Typo3Typo3 Version4.6.6
Typo3Typo3 Version4.6.7
Typo3Typo3 Version4.6.8
Typo3Typo3 Version4.6.9
Typo3Typo3 Version4.6.10
Typo3Typo3 Version4.6.11
Typo3Typo3 Version4.6.12
Typo3Typo3 Version4.6.13
Typo3Typo3 Version4.6.14
Typo3Typo3 Version4.6.15
Typo3Typo3 Version4.6.16
Typo3Typo3 Version4.6.17
Typo3Typo3 Version4.6.18
DebianDebian Linux Version7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.77% 0.711
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.6 4.9 2.9
AV:N/AC:H/Au:N/C:N/I:P/A:N
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.