Vulnerability Database

With exploit

smarty / smarty

Title Severity Exploit Date Affected Version
CVE-2012-4277 Low Aug 14, 2012 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
<= 3.1.7
== 3.0.0-beta6
== 2.6.0-rc3
== 2.6.25
== 3.0.0-beta8
== 3.0.5
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 3.0.0-rc2
== 2.6.14
== 3.1.1
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 3.1.6
== 2.6.11
== 2.6.0-rc2
== 3.0.2
== 3.0.0-rc3
== 3.1.4
== 3.0.0-beta7
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 3.0.4
== 2.1.0
== 2.6.22
== 1.5.2
== 3.1-rc1
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 3.1.0
== 2.6.6
== 2.6.26
== 3.1.3
== 2.6.16
== 2.6.9
== 1.2.2
== 3.0.0-beta5
== 3.0.0-rc4
== 3.0.7
== 2.6.0-rc1
== 3.1.5
== 2.6.24
== 2.1.1
== 3.0.3
== 2.6.4
== 3.0.0
== 2.2.0
== 2.4.2
== 3.1.2
== 3.0.1
== 2.6.10
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 3.0.6
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
== 3.0.0-rc1
CVE-2009-5052 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 2.6.0-rc3
== 2.6.25
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 2.6.14
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
== 2.6.26
== 2.6.16
== 2.6.9
== 1.2.2
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 2.2.0
== 2.4.2
== 2.6.10
<= 3.0.0
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
CVE-2009-5053 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 2.6.0-rc3
== 2.6.25
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 2.6.14
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
== 2.6.26
== 2.6.16
== 2.6.9
== 1.2.2
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 2.2.0
== 2.4.2
== 2.6.10
<= 3.0.0
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
CVE-2009-5054 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 2.6.0-rc3
== 2.6.25
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 2.6.14
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
<= 2.6.26
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
== 2.6.16
== 2.6.9
== 1.2.2
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 2.2.0
== 2.4.2
== 2.6.10
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
CVE-2010-4722 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 3.0.0-beta6
== 2.6.0-rc3
== 2.6.25
== 3.0.0-beta8
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 3.0.0-rc2
== 2.6.14
== 2.5.0-rc1
== 1.2.1
<= 3.0.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 3.0.0-rc3
== 3.0.0-beta7
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
== 2.6.26
== 2.6.16
== 2.6.9
== 1.2.2
== 3.0.0-beta5
== 3.0.0-rc4
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 3.0.0
== 2.2.0
== 2.4.2
== 2.6.10
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
== 3.0.0-rc1
CVE-2010-4723 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 3.0.0-beta6
== 2.6.0-rc3
== 2.6.25
== 3.0.0-beta8
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
<= 3.0.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 3.0.0-rc2
== 2.6.14
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 3.0.0-rc3
== 3.0.0-beta7
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
== 2.6.26
== 2.6.16
== 2.6.9
== 1.2.2
== 3.0.0-beta5
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 2.2.0
== 2.4.2
== 2.6.10
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
== 3.0.0-rc1
CVE-2010-4724 High Feb 3, 2011 <= 3.0.0
== 1.0
== 1.0a
== 1.0b
== 1.1.0
== 1.2.0
== 1.2.1
== 1.2.2
== 1.3.0
== 1.3.1
== 1.3.2
== 1.4.0
== 1.4.0-b1
== 1.4.0-b2
== 1.4.1
== 1.4.2
== 1.4.3
== 1.4.4
== 1.4.5
== 1.4.6
== 1.5.0
== 1.5.1
== 1.5.2
== 2.0.0
== 2.0.1
== 2.1.0
== 2.1.1
== 2.2.0
== 2.3.0
== 2.3.1
== 2.4.0
== 2.4.1
== 2.4.2
== 2.5.0
== 2.5.0-rc1
== 2.5.0-rc2
== 2.6.0
== 2.6.0-rc1
== 2.6.0-rc2
== 2.6.0-rc3
== 2.6.1
== 2.6.10
== 2.6.11
== 2.6.12
== 2.6.13
== 2.6.14
== 2.6.15
== 2.6.16
== 2.6.17
== 2.6.18
== 2.6.2
== 2.6.20
== 2.6.22
== 2.6.24
== 2.6.25
== 2.6.26
== 2.6.3
== 2.6.4
== 2.6.5
== 2.6.6
== 2.6.7
== 2.6.9
== 3.0.0-beta4
== 3.0.0-beta5
== 3.0.0-beta6
== 3.0.0-beta7
== 3.0.0-beta8
== 3.0.0-rc1
CVE-2010-4725 High Feb 3, 2011 <= 3.0.0
== 1.0
== 1.0a
== 1.0b
== 1.1.0
== 1.2.0
== 1.2.1
== 1.2.2
== 1.3.0
== 1.3.1
== 1.3.2
== 1.4.0
== 1.4.0-b1
== 1.4.0-b2
== 1.4.1
== 1.4.2
== 1.4.3
== 1.4.4
== 1.4.5
== 1.4.6
== 1.5.0
== 1.5.1
== 1.5.2
== 2.0.0
== 2.0.1
== 2.1.0
== 2.1.1
== 2.2.0
== 2.3.0
== 2.3.1
== 2.4.0
== 2.4.1
== 2.4.2
== 2.5.0
== 2.5.0-rc1
== 2.5.0-rc2
== 2.6.0
== 2.6.0-rc1
== 2.6.0-rc2
== 2.6.0-rc3
== 2.6.1
== 2.6.10
== 2.6.11
== 2.6.12
== 2.6.13
== 2.6.14
== 2.6.15
== 2.6.16
== 2.6.17
== 2.6.18
== 2.6.2
== 2.6.20
== 2.6.22
== 2.6.24
== 2.6.25
== 2.6.26
== 2.6.3
== 2.6.4
== 2.6.5
== 2.6.6
== 2.6.7
== 2.6.9
== 3.0.0-beta4
== 3.0.0-beta5
== 3.0.0-beta6
== 3.0.0-beta7
== 3.0.0-beta8
== 3.0.0-rc1
CVE-2010-4726 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 3.0.0-beta6
== 2.6.0-rc3
== 2.6.25
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 2.6.14
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 3.0.0-beta7
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
<= 3.0.0
== 2.6.26
== 2.6.16
== 2.6.9
== 1.2.2
== 3.0.0-beta5
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 2.2.0
== 2.4.2
== 2.6.10
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0
CVE-2010-4727 High Feb 3, 2011 == 1.4.3
== 1.0
== 1.0b
== 2.3.1
== 2.6.0-rc3
== 2.6.25
== 1.4.0
== 1.4.5
== 2.6.1
== 2.6.7
== 2.6.20
== 2.3.0
== 1.0a
== 1.1.0
== 1.4.0-b2
== 2.6.0
== 2.6.15
== 2.6.3
== 2.6.14
== 2.5.0-rc1
== 1.2.1
== 2.6.17
== 2.6.11
== 2.6.0-rc2
== 1.3.0
== 1.4.1
== 2.5.0-rc2
== 2.0.1
== 2.5.0
== 1.4.2
== 1.5.0
== 2.1.0
== 2.6.22
== 1.5.2
== 2.6.12
== 2.6.18
== 1.5.1
== 2.0.0
== 2.4.1
== 2.6.6
== 2.6.26
== 2.6.16
<= 3.0.0
== 2.6.9
== 1.2.2
== 3.0.0-beta5
== 2.6.0-rc1
== 2.6.24
== 2.1.1
== 2.6.4
== 2.2.0
== 2.4.2
== 2.6.10
== 2.6.2
== 1.4.0-b1
== 2.6.13
== 3.0.0-beta4
== 2.6.5
== 1.3.2
== 2.4.0
== 1.3.1
== 1.4.4
== 1.4.6
== 1.2.0