Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2013-3555
|
Medium
|
|
May 25, 2013
|
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
|
CVE-2013-3557
|
Medium
|
|
May 25, 2013
|
== 1.6.0
== 1.6.12
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.14
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.13
== 1.6.2
== 1.6.9
== 1.6.10
== 1.8.6
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
== 1.8.4
== 1.8.5
|
CVE-2013-3559
|
Medium
|
|
May 25, 2013
|
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
|
CVE-2013-3560
|
Medium
|
|
May 25, 2013
|
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
|
CVE-2013-3562
|
Medium
|
|
May 25, 2013
|
== 1.8.0
== 1.8.1
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
|
CVE-2012-6055
|
Medium
|
|
Dec 5, 2012
|
== 1.8.2
== 1.8.3
== 1.8.1
== 1.8.0
|
CVE-2012-6058
|
Medium
|
|
Dec 5, 2012
|
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
|
CVE-2012-6059
|
Medium
|
|
Dec 5, 2012
|
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
|
CVE-2012-6060
|
Medium
|
|
Dec 5, 2012
|
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
|
CVE-2012-6061
|
Medium
|
|
Dec 5, 2012
|
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
|