Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-5089
|
Low
|
|
Aug 26, 2012
|
<= 2.4.1
== 2.0.0
== 2.0.1
== 2.0.2
== 2.1.0
== 2.1.1
== 2.2.0
== 2.2.1
== 2.2.2
== 2.2.4
== 2.3.0
== 2.3.0-rc1
== 2.3.0-rc2
== 2.3.0-rc3
== 2.3.1
== 2.3.1-rc1
== 2.3.1-rc2
== 2.3.10
== 2.3.2
== 2.3.3
== 2.3.4
== 2.3.5
== 2.3.6
== 2.3.7
== 2.3.8
== 2.3.9
== 2.4.0
|
CVE-2010-5090
|
Low
|
|
Aug 26, 2012
|
<= 2.4.1
== 2.0.0
== 2.0.1
== 2.0.2
== 2.1.0
== 2.1.1
== 2.2.0
== 2.2.1
== 2.2.2
== 2.2.4
== 2.3.0
== 2.3.0-rc1
== 2.3.0-rc2
== 2.3.0-rc3
== 2.3.1
== 2.3.1-rc1
== 2.3.1-rc2
== 2.3.10
== 2.3.2
== 2.3.3
== 2.3.4
== 2.3.5
== 2.3.6
== 2.3.7
== 2.3.8
== 2.3.9
== 2.4.0
|
CVE-2010-5091
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.4.0
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2010-5092
|
Low
|
|
Aug 26, 2012
|
== 2.4.0
|
CVE-2010-5093
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2010-5094
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2010-5095
|
Low
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2010-5187
|
Low
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.7
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.4.0
== 2.3.1-rc1
== 2.3.5
== 2.3.6
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2010-5188
|
Medium
|
|
Aug 26, 2012
|
== 2.3.4
== 2.3.0-rc2
== 2.3.1-rc2
== 2.3.0-rc3
== 2.3.3
== 2.3.1
== 2.3.1-rc1
== 2.3.5
== 2.3.0
== 2.3.2
== 2.3.0-rc1
|
CVE-2012-0976
|
Low
|
|
Feb 2, 2012
|
== 2.4.6
|