Vulnerability Database

With exploit

liferay / digital_experience_platform

Title Severity Exploit Date Affected Version
CVE-2023-37940 Low Dec 17, 2024 == 7.3-fix_pack_1
== 7.3
== 7.3-fix_pack_2
== 7.4-update34
== 7.4-update1
== 7.4
== 7.4-update21
== 7.4-update36
== 7.4-update41
== 7.4-update48
== 7.4-update50
== 7.4-update52
== 7.4-update62
== 7.4-update67
== 7.4-update76
== 7.4-update82
== 7.4-update83
== 7.4-update84
== 7.3-update14
== 7.3-update29
== 7.4-update2
== 7.4-update3
== 7.4-update4
== 7.4-update5
== 7.4-update6
== 7.4-update7
== 7.4-update8
== 7.4-update9
== 7.4-update10
== 7.4-update11
== 7.4-update12
== 7.4-update13
== 7.4-update14
== 7.4-update15
== 7.4-update75
== 7.4-update78
== 7.4-update79
== 7.4-update80
== 7.4-update81
== 7.4-update85
== 7.4-update86
== 7.4-update87
== 7.4-update19
== 7.4-update20
== 7.4-update22
== 7.4-update23
== 7.4-update24
== 7.4-update25
== 7.4-update26
== 7.4-update27
== 7.4-update28
== 7.4-update29
== 7.4-update30
== 7.4-update31
== 7.4-update32
== 7.4-update33
== 7.4-update35
== 7.4-update37
== 7.4-update38
== 7.4-update39
== 7.4-update40
== 7.4-update42
== 7.4-update43
== 7.4-update44
== 7.4-update45
== 7.4-update46
== 7.4-update47
== 7.4-update49
== 7.4-update51
== 7.4-update53
== 7.4-update54
== 7.4-update55
== 7.4-update56
== 7.4-update57
== 7.4-update58
== 7.4-update59
== 7.4-update60
== 7.4-update61
== 7.4-update63
== 7.4-update64
== 7.4-update65
== 7.4-update66
== 7.4-update68
== 7.4-update69
== 7.4-update70
== 7.4-update71
== 7.4-update72
== 7.4-update73
== 7.4-update74
== 7.4-update77
>= 7.0 < 7.3
== 7.3-service_pack_1
== 7.3-service_pack_3
== 7.3-update4
== 7.3-update5
== 7.3-update6
== 7.3-update7
== 7.3-update8
== 7.3-update9
== 7.3-update10
== 7.3-update11
== 7.3-update12
== 7.3-update13
== 7.3-update15
== 7.3-update16
== 7.3-update17
== 7.3-update18
== 7.3-update19
== 7.3-update20
== 7.3-update21
== 7.3-update22
== 7.3-update23
== 7.3-update24
== 7.3-update25
== 7.3-update26
== 7.3-update27
== 7.3-update28
== 7.4-update16
== 7.4-update17
== 7.4-update18
CVE-2024-11993 Medium Dec 17, 2024 == 7.4-update34
== 7.4-update1
== 7.4
== 7.4-update36
== 7.4-update21
== 7.4-update2
== 7.4-update3
== 7.4-update4
== 7.4-update5
== 7.4-update6
== 7.4-update7
== 7.4-update8
== 7.4-update9
== 7.4-update10
== 7.4-update11
== 7.4-update12
== 7.4-update13
== 7.4-update14
>= 7.1 < 7.4
== 7.4-update15
== 7.4-update16
== 7.4-update17
== 7.4-update18
== 7.4-update19
== 7.4-update20
== 7.4-update22
== 7.4-update23
== 7.4-update24
== 7.4-update25
== 7.4-update26
== 7.4-update27
== 7.4-update28
== 7.4-update29
== 7.4-update30
== 7.4-update31
== 7.4-update32
== 7.4-update33
== 7.4-update35
== 7.4-update37
== 7.4-update38
CVE-2024-26271 High Oct 22, 2024 == 7.4-update76
== 7.4-update82
== 7.4-update83
== 7.4-update84
== 7.4-update85
== 7.4-update81
== 7.3-update35
== 7.3-update34
== 7.3-update33
== 7.3-update32
== 7.4-update92
== 7.4-update91
== 7.4-update90
== 7.4-update89
== 7.4-update88
== 7.4-update86
== 7.4-update75
== 7.4-update87
== 7.4-update80
== 7.4-update79
== 7.4-update78
== 7.4-update77
>= 2023.q3.1 < 2023.q3.6
>= 2023.q4.0 < 2023.q4.3
CVE-2024-26272 High Oct 22, 2024 == 7.3-fix_pack_1
== 7.3
== 7.3-fix_pack_2
== 7.4-update34
== 7.4-update1
== 7.4
== 7.4-update84
== 7.4-update83
== 7.4-update82
== 7.4-update76
== 7.4-update67
== 7.4-update62
== 7.4-update52
== 7.4-update50
== 7.4-update48
== 7.4-update41
== 7.4-update36
== 7.4-update21
== 7.4-update92
== 7.4-update86
== 7.4-update85
== 7.4-update81
== 7.4-update75
== 7.4-update12
== 7.4-update11
== 7.4-update10
== 7.4-update9
== 7.4-update8
== 7.4-update7
== 7.4-update6
== 7.4-update5
== 7.4-update4
== 7.4-update3
== 7.4-update2
== 7.3-update35
== 7.3-update34
== 7.3-update33
== 7.3-update32
== 7.3-update29
== 7.3-update14
== 7.4-update91
== 7.4-update90
== 7.4-update89
== 7.4-update88
== 7.4-update87
== 7.4-update80
== 7.4-update79
== 7.4-update78
== 7.4-update77
== 7.4-update74
== 7.4-update73
== 7.4-update72
== 7.4-update71
== 7.4-update70
== 7.4-update69
== 7.4-update68
== 7.4-update66
== 7.4-update65
== 7.4-update64
== 7.4-update63
== 7.4-update61
== 7.4-update60
== 7.4-update59
== 7.4-update58
== 7.4-update57
== 7.4-update56
== 7.4-update55
== 7.4-update54
== 7.4-update53
== 7.4-update51
== 7.4-update49
== 7.4-update47
== 7.4-update46
== 7.4-update45
== 7.4-update44
== 7.4-update43
== 7.4-update42
== 7.4-update40
== 7.4-update39
== 7.4-update38
== 7.4-update37
== 7.4-update35
== 7.4-update33
== 7.4-update32
== 7.4-update31
== 7.4-update15
== 7.4-update14
== 7.4-update13
== 7.4-update30
== 7.4-update29
== 7.4-update28
== 7.4-update27
== 7.4-update26
== 7.4-update25
== 7.4-update24
== 7.4-update23
== 7.4-update22
== 7.4-update20
== 7.4-update19
== 7.4-update18
== 7.4-update17
== 7.4-update16
== 7.3-update31
== 7.3-update30
== 7.3-update28
== 7.3-update27
== 7.3-update26
== 7.3-update25
== 7.3-update24
== 7.3-update23
== 7.3-update22
== 7.3-update21
== 7.3-update20
== 7.3-update19
== 7.3-update18
== 7.3-update17
== 7.3-update16
== 7.3-update15
== 7.3-update13
== 7.3-update12
== 7.3-update11
== 7.3-update10
== 7.3-update9
== 7.3-update8
== 7.3-update7
== 7.3-update6
== 7.3-update5
== 7.3-update4
== 7.3-service_pack_3
== 7.3-service_pack_1
>= 2023.q3.1 < 2023.q3.6
>= 2023.q4.0 < 2023.q4.3
CVE-2024-26273 High Oct 22, 2024 == 7.4-update34
== 7.4-update1
== 7.4
== 7.4-update36
== 7.4-update41
== 7.4-update52
== 7.4-update86
== 7.4-update85
== 7.4-update84
== 7.4-update83
== 7.4-update82
== 7.4-update81
== 7.4-update76
== 7.4-update67
== 7.4-update62
== 7.4-update50
== 7.4-update48
== 7.4-update21
== 7.3-update35
== 7.3-update34
== 7.3-update33
== 7.3-update32
== 7.3-update29
== 7.4-update92
== 7.4-update91
== 7.4-update90
== 7.4-update75
== 7.4-update15
== 7.4-update14
== 7.4-update13
== 7.4-update12
== 7.4-update11
== 7.4-update10
== 7.4-update9
== 7.4-update8
== 7.4-update7
== 7.4-update6
== 7.4-update5
== 7.4-update4
== 7.4-update3
== 7.4-update2
== 7.4-update89
== 7.4-update88
== 7.4-update87
== 7.4-update80
== 7.4-update79
== 7.4-update78
== 7.4-update77
== 7.4-update74
== 7.4-update73
== 7.4-update72
== 7.4-update71
== 7.4-update70
== 7.4-update69
== 7.4-update68
== 7.4-update66
== 7.4-update65
== 7.4-update64
== 7.4-update63
== 7.4-update61
== 7.4-update60
== 7.4-update59
== 7.4-update58
== 7.4-update57
== 7.4-update56
== 7.4-update55
== 7.4-update54
== 7.4-update53
== 7.4-update51
== 7.4-update49
== 7.4-update47
== 7.4-update46
== 7.4-update45
== 7.4-update44
== 7.4-update43
== 7.4-update42
== 7.4-update40
== 7.4-update39
== 7.4-update38
== 7.4-update37
== 7.4-update35
== 7.4-update33
== 7.4-update32
== 7.4-update31
== 7.4-update30
== 7.4-update29
== 7.4-update28
== 7.4-update27
== 7.4-update26
== 7.3-update31
== 7.3-update30
== 7.4-update25
== 7.4-update24
== 7.4-update23
== 7.4-update22
== 7.4-update20
== 7.4-update19
== 7.4-update18
== 7.4-update17
== 7.4-update16
>= 2023.q3.1 < 2023.q3.6
>= 2023.q4.0 < 2023.q4.3
CVE-2024-38002 High Oct 22, 2024 == 7.3-fix_pack_1
== 7.3
== 7.3-fix_pack_2
== 7.4-update34
== 7.4-update1
== 7.4
== 7.4-update84
== 7.4-update83
== 7.4-update82
== 7.4-update76
== 7.4-update67
== 7.4-update62
== 7.4-update52
== 7.4-update50
== 7.4-update48
== 7.4-update41
== 7.4-update36
== 7.4-update21
== 7.3-update35
== 7.3-update34
== 7.3-update33
== 7.3-update32
== 7.3-update29
== 7.3-update14
== 7.4-update92
== 7.4-update86
== 7.4-update85
== 7.4-update81
== 7.4-update75
== 7.4-update12
== 7.4-update11
== 7.4-update10
== 7.4-update9
== 7.4-update8
== 7.4-update7
== 7.4-update6
== 7.4-update5
== 7.4-update4
== 7.4-update3
== 7.4-update2
== 7.4-update91
== 7.4-update90
== 7.4-update89
== 7.4-update88
== 7.4-update87
== 7.4-update80
== 7.4-update79
== 7.4-update78
== 7.4-update77
== 7.4-update74
== 7.4-update73
== 7.4-update72
== 7.4-update71
== 7.4-update70
== 7.4-update69
== 7.4-update68
== 7.4-update66
== 7.4-update65
== 7.4-update64
== 7.4-update63
== 7.4-update61
== 7.4-update60
== 7.4-update59
== 7.4-update58
== 7.4-update57
== 7.4-update56
== 7.4-update55
== 7.4-update54
== 7.4-update53
== 7.4-update51
== 7.4-update49
== 7.4-update47
== 7.4-update46
== 7.4-update45
== 7.4-update44
== 7.4-update43
== 7.4-update42
== 7.4-update40
== 7.4-update39
== 7.4-update38
== 7.4-update37
== 7.4-update35
== 7.4-update33
== 7.4-update32
== 7.4-update31
== 7.4-update15
== 7.4-update14
== 7.4-update13
== 7.3-update36
== 7.3-update31
== 7.3-update30
== 7.3-update28
== 7.3-update27
== 7.3-update26
== 7.3-update25
== 7.3-update24
== 7.3-update23
== 7.3-update22
== 7.3-update21
== 7.3-update20
== 7.3-update19
== 7.3-update18
== 7.3-update17
== 7.3-update16
== 7.3-update15
== 7.3-update13
== 7.3-update12
== 7.3-update11
== 7.3-update10
== 7.3-update9
== 7.3-update8
== 7.3-update7
== 7.3-update6
== 7.3-update5
== 7.3-update4
== 7.3-service_pack_3
== 7.3-service_pack_1
== 7.4-update30
== 7.4-update29
== 7.4-update28
== 7.4-update27
== 7.4-update26
== 7.4-update25
== 7.4-update24
== 7.4-update23
== 7.4-update22
== 7.4-update20
== 7.4-update19
== 7.4-update18
== 7.4-update17
== 7.4-update16
>= 2023.q3.1 < 2023.q3.9
>= 2023.q4.0 < 2023.q4.6
CVE-2024-8980 Medium Oct 22, 2024 == 7.3-fix_pack_1
== 7.3
== 7.3-fix_pack_2
== 7.4-update34
== 7.4-update1
== 7.4
== 7.4-update84
== 7.4-update83
== 7.4-update82
== 7.4-update76
== 7.4-update67
== 7.4-update62
== 7.4-update52
== 7.4-update50
== 7.4-update48
== 7.4-update41
== 7.4-update36
== 7.4-update21
== 7.4-update92
== 7.4-update86
== 7.4-update85
== 7.4-update81
== 7.4-update75
== 7.4-update9
== 7.4-update8
== 7.4-update7
== 7.4-update6
== 7.4-update5
== 7.4-update4
== 7.4-update3
== 7.4-update2
== 7.3-update35
== 7.3-update34
== 7.3-update33
== 7.3-update32
== 7.3-update29
== 7.3-update14
== 7.4-update91
== 7.4-update90
== 7.4-update89
== 7.4-update88
== 7.4-update87
== 7.4-update80
== 7.4-update79
== 7.4-update78
== 7.4-update77
== 7.4-update74
== 7.4-update73
== 7.4-update72
== 7.4-update71
== 7.4-update70
== 7.4-update69
== 7.4-update68
== 7.4-update66
== 7.4-update65
== 7.4-update64
== 7.4-update63
== 7.4-update61
== 7.4-update60
== 7.4-update59
== 7.4-update58
== 7.4-update57
== 7.4-update56
== 7.4-update55
== 7.4-update54
== 7.4-update53
== 7.4-update51
== 7.4-update49
== 7.4-update47
== 7.4-update46
== 7.4-update45
== 7.4-update44
== 7.4-update43
== 7.4-update42
== 7.4-update40
== 7.4-update39
== 7.4-update38
== 7.4-update37
== 7.4-update35
== 7.4-update15
== 7.4-update14
== 7.4-update13
== 7.4-update12
== 7.4-update11
== 7.4-update10
== 7.4-update33
== 7.4-update32
== 7.4-update31
== 7.4-update30
== 7.4-update29
== 7.4-update28
== 7.4-update27
== 7.4-update26
== 7.4-update25
== 7.4-update24
== 7.4-update23
== 7.4-update22
== 7.4-update20
== 7.4-update19
== 7.4-update18
== 7.4-update17
== 7.4-update16
== 7.3-update31
== 7.3-update30
== 7.3-update28
== 7.3-update27
== 7.3-update26
== 7.3-update25
== 7.3-update24
== 7.3-update23
== 7.3-update22
== 7.3-update21
== 7.3-update20
== 7.3-update19
== 7.3-update18
== 7.3-update17
== 7.3-update16
== 7.3-update15
== 7.3-update13
== 7.3-update12
== 7.3-update11
== 7.3-update10
== 7.3-update9
== 7.3-update8
== 7.3-update7
== 7.3-update6
== 7.3-update5
== 7.3-update4
== 7.3-service_pack_3
== 7.3-service_pack_1
>= 2023.q3.1 < 2023.q3.5
>= 6.2 <= 7.2
CVE-2023-47795 Medium Feb 21, 2024 == 7.4-update34
== 7.4-update36
== 7.4-update41
== 7.4-update52
== 7.4-update50
== 7.4-update21
== 7.4-update48
== 7.4-update62
== 7.4-update67
== 7.4-update75
== 7.4-update76
== 7.4-update81
== 7.4-update82
== 7.4-update83
== 7.4-update84
== 7.4-update85
== 7.4-update86
== 7.4-update92
== 7.4-update58
== 7.4-update59
== 7.4-update60
== 7.4-update61
== 7.4-update63
== 7.4-update64
== 7.4-update65
== 7.4-update66
== 7.4-update68
== 7.4-update69
== 7.4-update70
== 7.4-update71
== 7.4-update72
== 7.4-update73
== 7.4-update74
== 7.4-update77
== 7.4-update78
== 7.4-update79
== 7.4-update80
== 7.4-update87
== 7.4-update88
== 7.4-update89
== 7.4-update90
== 7.4-update91
== 7.4-update18
== 7.4-update19
== 7.4-update20
== 7.4-update22
== 7.4-update23
== 7.4-update24
== 7.4-update25
== 7.4-update26
== 7.4-update27
== 7.4-update28
== 7.4-update29
== 7.4-update30
== 7.4-update31
== 7.4-update32
== 7.4-update33
== 7.4-update35
== 7.4-update37
== 7.4-update38
== 7.4-update39
== 7.4-update40
== 7.4-update42
== 7.4-update43
== 7.4-update44
== 7.4-update45
== 7.4-update46
== 7.4-update47
== 7.4-update49
== 7.4-update51
== 7.4-update53
== 7.4-update54
== 7.4-update55
== 7.4-update56
== 7.4-update57
== 2023.q3.0
== 2023.q3.1
== 2023.q3.2
== 2023.q3.3
== 2023.q3.4
== 2023.q3.5
CVE-2024-25151 Medium Feb 21, 2024 == 7.2
== 7.2-fix_pack_1
== 7.2-fix_pack_2
== 7.2-fix_pack_3
== 7.2-fix_pack_5
== 7.2-fix_pack_4
== 7.2-fix_pack_6
== 7.2-fix_pack_7
== 7.2-fix_pack_8
== 7.2-fix_pack_9
== 7.2-fix_pack_10
== 7.2-fix_pack_11
== 7.2-fix_pack_12
== 7.2-fix_pack_13
== 7.2-fix_pack_14
== 7.3
== 7.3-fix_pack_1
== 7.3-fix_pack_2
< 7.2
== 7.2-service_pack_1
== 7.2-service_pack_2
== 7.2-service_pack_3
== 7.2-service_pack_4
== 7.2-service_pack_5
== 7.3-service_pack_1
CVE-2023-40191 Medium Feb 21, 2024 == 7.4-update52
== 7.4-update50
== 7.4-update62
== 7.4-update67
== 7.4-update48
== 7.4-update76
== 7.4-update75
== 7.4-update81
== 7.4-update82
== 7.4-update83
== 7.4-update84
== 7.4-update85
== 7.4-update86
== 7.4-update88
== 7.4-update89
== 7.4-update90
== 7.4-update91
== 7.4-update92
== 7.4-update54
== 7.4-update55
== 7.4-update56
== 7.4-update57
== 7.4-update58
== 7.4-update59
== 7.4-update60
== 7.4-update61
== 7.4-update63
== 7.4-update64
== 7.4-update65
== 7.4-update66
== 7.4-update68
== 7.4-update69
== 7.4-update70
== 7.4-update71
== 7.4-update72
== 7.4-update73
== 7.4-update74
== 7.4-update77
== 7.4-update78
== 7.4-update79
== 7.4-update80
== 7.4-update87
== 2023.q3.0
== 2023.q3.1
== 2023.q3.2
== 2023.q3.3
== 2023.q3.4
== 2023.q3.5
== 7.4-update44
== 7.4-update45
== 7.4-update46
== 7.4-update47
== 7.4-update49
== 7.4-update51
== 7.4-update53

ibexa / digital_experience_platform

Title Severity Exploit Date Affected Version
CVE-2022-48365 High Mar 12, 2023 >= 4.2.0 < 4.2.3
>= 3.3.0 < 3.3.28
CVE-2022-48366 Low Mar 12, 2023 >= 4.1.0 < 4.1.4
>= 4.0.0 < 4.0.7
>= 3.3.0 < 3.3.20
CVE-2022-48367 Critical Mar 12, 2023 >= 3.3.0 < 3.3.18
>= 4.0.0 < 4.0.5
>= 4.1.0 < 4.1.2