Vulnerability Database

With exploit

jelsoft / vbulletin

Title Severity Exploit Date Affected Version
CVE-2004-2695 High Dec 31, 2004 == 3.0_beta_6
== 3.0.1
== 3.0_beta_7
== 3.0_beta_3
== 3.0_beta_2
== 3.0.2
== 3.0_gamma
== 3.0_beta_4
== 3.0.3
== 3.0
== 3.0_beta_5
CVE-2004-0620 Low Dec 6, 2004 == 3.0.1
CVE-2004-0091 Low Feb 17, 2004 == 3.0_beta_2
CVE-2004-0036 Medium Jan 20, 2004 == 2.3.0
CVE-2003-0295 Medium Jun 16, 2003 == 3.0.0_beta_2
CVE-2002-1660 High Dec 31, 2002 <= 2.1.9
CVE-2002-1678 Low Dec 31, 2002 == 2.2.0
== 2.0_rc2
== 2.0_rc3
== 2.2.1
== 2.2.4
== 2.2.2
== 2.2.3
CVE-2002-1679 Low Dec 31, 2002 == 2.2.0
CVE-2002-1922 Low Dec 31, 2002 == 2.2.0
== 2.0_rc2
== 2.0_rc3
== 2.2.1
== 2.2.7
== 2.2.4
== 2.2.2
== 2.2.5
== 2.2.6
== 2.2.8
== 2.2.3
CVE-2002-2235 Medium Dec 31, 2002 == 2.2.0
== 2.2.9_can
== 2.2.1
== 2.0.2
== 2.0
== 2.0.1
== 2.2.7
== 2.2.4
== 2.2.2
== 2.2.5
== 2.2.6
== 2.2.9
== 2.2.8
== 2.2.3

vbulletin / vbulletin

Title Severity Exploit Date Affected Version
CVE-2011-5251 Medium Dec 31, 2012 == 4.0.4
== 4.1.1
<= 4.1.3
== 4.0.8
== 4.0.2
== 4.0.1
== 4.0.3
== 4.0.7
== 4.0.6
== 4.1
== 4.0.5
== 4.1.2
== 4.0.0
CVE-2012-4686 High Aug 28, 2012 == 4.1.10
CVE-2012-3844 Low Jul 4, 2012 == 4.1.12
CVE-2008-6255 Medium Feb 24, 2009 == 3.7.4
CVE-2008-6256 Medium Feb 24, 2009 == 3.7.3-pl1
CVE-2008-3773 Low Aug 22, 2008 == 3.6.10-pl3
== 3.7.2-pl1
CVE-2008-3184 Low Jul 15, 2008 == 3.6.10-pl1
== 3.6.8
== 3.6.3
== 3.6.7
== 3.6.5
== 3.6.4
== 3.6
== 3.6.2
== 3.7.1-gold
== 3.7.1
== 3.6.1
== 3.7.0
== 3.7.2
== 3.6.9
== 3.6.10
== 3.6.6
== 3.7.1-pl1
CVE-2008-2744 Low Jun 17, 2008 == 3.7.1
== 3.6.10
CVE-2008-2460 High May 27, 2008 == 3.7.0-gold