Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2014-3566
|
Low
|
|
Oct 15, 2014
|
== 2.2.0.10
== 2.2.0.11
== 2.2.0.12
== 2.2.0.13
== 2.2.1.0
== 2.2.1.1
== 2.2.1.3
== 2.2.1.4
== 2.2.1.5
== 2.2.1.6
== 2.2.1.7
== 2.2.1.8
== 2.2.1.9
== 2.2.2.0
== 2.2.2.1
== 2.2.2.2
== 2.2.2.3
== 2.2.2.4
== 2.2.2.5
== 2.2.3.0
== 2.2.3.1
== 2.2.3.2
== 2.2.3.3
== 2.2.3.4
|
CVE-2014-3074
|
High
|
|
Jul 2, 2014
|
== 2.2.0.10
== 2.2.0.11
== 2.2.0.12
== 2.2.0.13
== 2.2.1.0
== 2.2.1.1
== 2.2.1.3
== 2.2.1.4
== 2.2.1.4-fp-25_sp-02
== 2.2.1.8
== 2.2.1.9
== 2.2.2.0
== 2.2.2.4
== 2.2.2.5
== 2.2.3.0
== 2.2.3.2
== 2.2.3.3
|
CVE-2014-3977
|
Medium
|
|
Jun 9, 2014
|
== 2.2.0.10
== 2.2.0.11
== 2.2.0.12
== 2.2.0.13
== 2.2.1.0
== 2.2.1.1
== 2.2.1.3
== 2.2.1.4
== 2.2.1.4-fp-25_sp-02
== 2.2.1.8
== 2.2.1.9
== 2.2.2.0
== 2.2.2.4
== 2.2.2.5
== 2.2.3.0
== 2.2.3.2
== 2.2.3.3
|
CVE-2014-0930
|
Low
|
|
May 8, 2014
|
== 2.2.0.13
== 2.2.1.0
== 2.2.0.11
== 2.2.0.12
== 2.2.1.1
== 2.2.1.3
== 2.2.0.10
== 2.2.1.4
== 2.2.3.0
== 2.2.2.0
|
CVE-2013-4011
|
High
|
|
Jul 18, 2013
|
== 2.2.2.2-fp-26_sp-02
|
CVE-2013-3005
|
High
|
|
Jul 6, 2013
|
== 2.2.2.2-fp-26_sp-02
|
CVE-2013-3035
|
High
|
|
Jun 21, 2013
|
== 2.2.1.4-fp-26_sp-02
|
CVE-2012-4845
|
Medium
|
|
Oct 20, 2012
|
== 2.2.1.4-fp-25_sp-02
|
CVE-2012-4833
|
Low
|
|
Oct 1, 2012
|
== 2.2.1.4-fp-25_sp-02
|
CVE-2012-4817
|
Medium
|
|
Sep 15, 2012
|
== 1.4.1.2
== 1.5.1.1
== 1.5.2.1
== 1.5.2.6
== 2.1.0.0
== 2.1.2.10
== 2.1.2.12
== 2.1.2.13
== 2.1.3.10
== 2.2.0.10
== 2.2.0.11
== 2.2.0.12
== 2.2.0.13
== 2.2.1.0
== 2.2.1.1
== 2.2.1.3
== 2.2.1.4
|