Vulnerability Database

With exploit

mahara / mahara

Title Severity Exploit Date Affected Version
CVE-2013-4430 Low May 19, 2014 == 1.7.0
== 1.7.2
== 1.7.1
== 1.7.-rc1
== 1.6.5
== 1.6.0
== 1.6.2
== 1.6.1
== 1.6.4
== 1.6.3
== 1.6.6
== 1.5.4
<= 1.5.11
== 1.5-rc1
== 1.5.2
== 1.5.9
== 1.5.7
== 1.5.8
== 1.5.10
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
== 1.5.6
CVE-2013-4431 Medium May 19, 2014 == 1.5.4
<= 1.5.11
== 1.5-rc1
== 1.5.2
== 1.5.9
== 1.5.7
== 1.5.8
== 1.5.10
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
== 1.5.6
== 1.7.0
== 1.7.2
== 1.7.1
== 1.7.-rc1
== 1.6.5
== 1.6.0
== 1.6.2
== 1.6.1
== 1.6.4
== 1.6.3
== 1.6.6
CVE-2013-4432 Low May 19, 2014 == 1.5.4
== 1.5-rc1
== 1.5.2
== 1.5.9
== 1.5.7
== 1.5.8
== 1.5.10
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
<= 1.5.12
== 1.5.11
== 1.5.6
== 1.6.5
== 1.6.0
== 1.6.2
== 1.6.1
== 1.6.4
== 1.6.3
== 1.6.7
== 1.6.6
== 1.7.0
== 1.7.3
== 1.7.2
== 1.7.1
== 1.7.-rc1
CVE-2012-2243 Low Nov 24, 2012 == 1.4-rc2
== 1.4.0
== 1.4.2
== 1.4-rc4
== 1.4-rc3
== 1.4.4
== 1.4.3
== 1.4-rc1
== 1.4.1
== 1.5-rc1
== 1.5.2
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
CVE-2012-2244 Medium Nov 24, 2012 == 1.4-rc2
== 1.4.0
== 1.4.2
== 1.4-rc4
== 1.4-rc3
== 1.4.3
== 1.4-rc1
== 1.4.1
== 1.5-rc1
== 1.5.2
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
CVE-2012-2246 Medium Nov 24, 2012 == 1.4-rc2
== 1.4.0
== 1.4.2
== 1.4-rc4
== 1.4-rc3
== 1.4.4
== 1.4.3
== 1.4-rc1
== 1.4.1
== 1.5-rc1
== 1.5.2
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
CVE-2012-2247 Low Nov 24, 2012 == 1.4-rc2
== 1.4.0
== 1.4.2
== 1.4-rc4
== 1.4-rc3
== 1.4.4
== 1.4.3
== 1.4-rc1
== 1.4.1
== 1.5-rc1
== 1.5.2
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
CVE-2012-2253 Low Nov 24, 2012 == 1.5.4
== 1.5-rc1
== 1.5.2
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
== 1.5.6
== 1.6.0
== 1.6.1
CVE-2012-6037 Low Nov 24, 2012 == 1.4-rc2
== 1.4.0
== 1.4.2
== 1.4-rc4
== 1.4-rc3
== 1.4.4
== 1.4.3
== 1.4-rc1
== 1.4.1
== 1.5-rc1
== 1.5.2
== 1.5.3
== 1.5.0
== 1.5-rc2
== 1.5.1
CVE-2012-2239 Critical Nov 24, 2012 >= 1.4.0 < 1.4.4
>= 1.5.0 < 1.5.3