Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-6062
|
Medium
|
|
Dec 5, 2012
|
== 1.6.0
== 1.8.2
== 1.6.4
== 1.6.8
== 1.6.5
== 1.8.3
== 1.6.3
== 1.8.1
== 1.8.0
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.11
== 1.6.2
== 1.6.9
== 1.6.10
|
CVE-2012-3548
|
Low
|
|
Aug 31, 2012
|
== 1.8.2
== 1.8.1
== 1.8.0
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.6.10
|
CVE-2012-4285
|
Low
|
|
Aug 16, 2012
|
== 1.8.1
== 1.8.0
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
|
CVE-2012-4286
|
Low
|
|
Aug 16, 2012
|
== 1.8.0
== 1.8.1
|
CVE-2012-4287
|
Medium
|
|
Aug 16, 2012
|
== 1.8.0
== 1.8.1
|
CVE-2012-4288
|
Low
|
|
Aug 16, 2012
|
== 1.8.1
== 1.8.0
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
|
CVE-2012-4292
|
Low
|
|
Aug 16, 2012
|
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.8.1
== 1.8.0
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
|
CVE-2012-4294
|
Medium
|
|
Aug 16, 2012
|
== 1.8.0
== 1.8.1
|
CVE-2012-4295
|
Low
|
|
Aug 16, 2012
|
== 1.8.0
== 1.8.1
|
CVE-2012-4296
|
Low
|
|
Aug 16, 2012
|
== 1.6.0
== 1.6.4
== 1.6.8
== 1.6.5
== 1.6.3
== 1.6.7
== 1.6.1
== 1.6.6
== 1.6.2
== 1.6.9
== 1.4.7
== 1.4.11
== 1.4.2
== 1.4.0
== 1.4.12
== 1.4.5
== 1.4.13
== 1.4.4
== 1.4.10
== 1.4.9
== 1.4.6
== 1.4.3
== 1.4.14
== 1.4.1
== 1.4.8
== 1.8.1
== 1.8.0
|