Vulnerability Database

With exploit

silverstripe / silverstripe

Title Severity Exploit Date Affected Version
CVE-2010-4822 Low Sep 17, 2012 == 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
CVE-2010-4823 Low Sep 17, 2012 == 2.3.4
== 2.3.7
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
CVE-2010-4824 Medium Sep 17, 2012 == 2.3.4
== 2.3.7
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
CVE-2011-4959 Medium Sep 17, 2012 == 2.3.4
== 2.3.7
== 2.3.10
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.4
== 2.4.3
== 2.4.5
CVE-2011-4960 High Sep 17, 2012 == 2.3.4
== 2.3.7
== 2.3.10
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
== 2.4.5
CVE-2011-4962 Medium Sep 17, 2012 == 2.4.1
== 2.4.0
== 2.4.2
== 2.4.4
== 2.4.3
== 2.4.5
CVE-2012-4968 Low Sep 17, 2012 == 2.3.4
== 2.3.7
== 2.3.10
== 2.3.12
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.6
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
== 2.4.5
CVE-2010-5087 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.10
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
CVE-2010-5091 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.4.0
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2010-5093 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1