Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-5479
|
Medium
|
|
Nov 21, 2012
|
== 2.1.2
== 2.1.8
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.5
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.2
== 2.3.0
|
CVE-2012-5480
|
Medium
|
|
Nov 21, 2012
|
== 2.1.2
== 2.1.8
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.5
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.2
== 2.3.0
|
CVE-2012-5481
|
Low
|
|
Nov 21, 2012
|
== 2.3.1
== 2.3.2
== 2.3.0
|
CVE-2012-4400
|
Low
|
|
Sep 19, 2012
|
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-4401
|
Low
|
|
Sep 19, 2012
|
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-4402
|
Low
|
|
Sep 19, 2012
|
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-4403
|
Medium
|
|
Sep 19, 2012
|
== 2.3.1
== 2.3.0
|
CVE-2012-4407
|
Medium
|
|
Sep 19, 2012
|
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-4408
|
Medium
|
|
Sep 19, 2012
|
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-3387
|
Low
|
|
Jul 23, 2012
|
== 2.3.0
|