SilverStripe 4.6.0 Release Candidate 1

CPE Details

SilverStripe 4.6.0 Release Candidate 1
4.6.0
2020-08-06
11h13 +00:00
2020-08-06
11h13 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:silverstripe:silverstripe:4.6.0:rc1:*:*:*:*:*:*

Informations

Vendor

silverstripe

Product

silverstripe

Version

4.6.0

Update

rc1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-37421 2022-11-22 23h00 +00:00 Silverstripe silverstripe/cms through 4.11.0 allows XSS.
5.4
Moyen
CVE-2022-28803 2022-06-28 22h50 +00:00 In SilverStripe Framework through 2022-04-07, Stored XSS can occur in javascript link tags added via XMLHttpRequest (XHR).
5.4
Moyen
CVE-2021-41559 2022-06-28 19h27 +00:00 Silverstripe silverstripe/framework 4.8.1 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
6.5
Moyen
CVE-2021-36150 2021-10-07 11h59 +00:00 SilverStripe Framework through 4.8.1 allows XSS.
6.1
Moyen
CVE-2020-26136 2021-06-08 17h37 +00:00 In SilverStripe through 4.6.0-rc1, GraphQL doesn't honour MFA (multi-factor authentication) when using basic authentication.
6.5
Moyen
CVE-2020-25817 2021-06-08 15h54 +00:00 SilverStripe through 4.6.0-rc1 has an XXE Vulnerability in CSSContentParser. A developer utility meant for parsing HTML within unit tests can be vulnerable to XML External Entity (XXE) attacks. When this developer utility is misused for purposes involving external or user submitted data in custom project code, it can lead to vulnerabilities such as XSS on HTML output rendered through this custom code. This is now mitigated by disabling external entities during parsing. (The correct CVE ID year is 2020 [CVE-2020-25817, not CVE-2021-25817]).
4.8
Moyen
CVE-2020-26138 2021-06-08 15h35 +00:00 In SilverStripe through 4.6.0-rc1, a FormField with square brackets in the field name skips validation.
5.3
Moyen