Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-5078
|
Medium
|
|
Sep 17, 2012
|
== 2.3.4
== 2.3.7
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
|
CVE-2010-5079
|
Medium
|
|
Sep 17, 2012
|
== 2.3.4
== 2.3.7
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
|
CVE-2011-4959
|
Medium
|
|
Sep 17, 2012
|
== 2.3.4
== 2.3.7
== 2.3.10
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.4
== 2.4.3
== 2.4.5
|
CVE-2011-4960
|
High
|
|
Sep 17, 2012
|
== 2.3.4
== 2.3.7
== 2.3.10
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
== 2.4.5
|
CVE-2011-4961
|
Medium
|
|
Sep 17, 2012
|
== 2.3.4
== 2.3.7
== 2.3.10
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.4
== 2.4.3
== 2.4.5
|
CVE-2011-4962
|
Medium
|
|
Sep 17, 2012
|
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.4
== 2.4.3
== 2.4.5
|
CVE-2012-4968
|
Low
|
|
Sep 17, 2012
|
== 2.3.4
== 2.3.7
== 2.3.10
== 2.3.12
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.11
== 2.3.0
== 2.3.2
== 2.4.6
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
== 2.4.5
|
CVE-2010-5080
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.4.1
== 2.3.8
== 2.3.1
== 2.4.0
== 2.4.2
== 2.3.1-rc1
== 2.3.5
== 2.3.9
== 2.4.3
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2010-5087
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.10
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.8
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.9
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
== 2.4.1
== 2.4.0
== 2.4.2
== 2.4.3
|
CVE-2010-5088
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.4.1
== 2.3.8
== 2.3.1
== 2.4.0
== 2.4.2
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|