Vulnerability Database

With exploit

silverstripe / silverstripe

Title Severity Exploit Date Affected Version
CVE-2010-5089 Low Aug 26, 2012 <= 2.4.1
== 2.0.0
== 2.0.1
== 2.0.2
== 2.1.0
== 2.1.1
== 2.2.0
== 2.2.1
== 2.2.2
== 2.2.4
== 2.3.0
== 2.3.0-rc1
== 2.3.0-rc2
== 2.3.0-rc3
== 2.3.1
== 2.3.1-rc1
== 2.3.1-rc2
== 2.3.10
== 2.3.2
== 2.3.3
== 2.3.4
== 2.3.5
== 2.3.6
== 2.3.7
== 2.3.8
== 2.3.9
== 2.4.0
CVE-2010-5090 Low Aug 26, 2012 <= 2.4.1
== 2.0.0
== 2.0.1
== 2.0.2
== 2.1.0
== 2.1.1
== 2.2.0
== 2.2.1
== 2.2.2
== 2.2.4
== 2.3.0
== 2.3.0-rc1
== 2.3.0-rc2
== 2.3.0-rc3
== 2.3.1
== 2.3.1-rc1
== 2.3.1-rc2
== 2.3.10
== 2.3.2
== 2.3.3
== 2.3.4
== 2.3.5
== 2.3.6
== 2.3.7
== 2.3.8
== 2.3.9
== 2.4.0
CVE-2010-5091 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.4.0
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2010-5092 Low Aug 26, 2012 == 2.4.0
CVE-2010-5093 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2010-5094 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2010-5095 Low Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2010-5187 Low Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.4.0
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2010-5188 Medium Aug 26, 2012 == 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.0
== 2.3.2
== 2.3.0-rc1
CVE-2012-0976 Low Feb 2, 2012 == 2.4.6