Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2024-30368
|
High
|
|
Jun 6, 2024
|
== 4.1.4-p1
== 4.1.4
== 4.1.4-gr1-p13
== 4.1.4-gr1-p12
== 4.1.4-gr1-p11
== 4.1.4-p2
== 4.1.4-p3
== 4.1.4-gr1
== 4.1.4-gr1-p1
== 4.1.4-gr1-p2
== 4.1.4-gr1-p3
== 4.1.4-gr1-p4
== 4.1.4-gr1-p5
== 4.1.4-gr1-p6
== 4.1.4-gr1-p7
== 4.1.4-gr1-p8
== 4.1.4-gr1-p9
== 4.1.4-gr1-p10
== 5.1.0
== 5.1.0-p3
== 5.2.1
== 5.2.1-p1
== 5.2.1-p2
== 5.2.1-p3
== 5.2.1-p4
== 5.2.1-p5
== 5.2.1-p6
== 5.2.1-p7
== 5.2.1-p8
== 5.1.0-p4
== 5.1.0-p5
== 5.1.0-p6
== 5.2.0
== 5.2.0-p1
== 5.2.1-p9
== 6.0.3
== 6.0.2
== 6.0.2-p1
== 6.0.1
== 6.0.0-p1
== 6.0.0-p2
== 6.0.0-p2-sp1
== 6.0.0
|
CVE-2024-30369
|
High
|
|
Jun 6, 2024
|
== 4.1.4-p1
== 4.1.4
== 4.1.4-gr1-p13
== 4.1.4-gr1-p12
== 4.1.4-gr1-p11
== 4.1.4-p2
== 4.1.4-p3
== 4.1.4-gr1
== 4.1.4-gr1-p1
== 4.1.4-gr1-p2
== 4.1.4-gr1-p3
== 4.1.4-gr1-p4
== 4.1.4-gr1-p5
== 4.1.4-gr1-p6
== 4.1.4-gr1-p7
== 4.1.4-gr1-p8
== 4.1.4-gr1-p9
== 4.1.4-gr1-p10
== 5.1.0
== 5.1.0-p3
== 5.2.1
== 5.2.1-p1
== 5.2.1-p2
== 5.2.1-p3
== 5.2.1-p4
== 5.2.1-p5
== 5.2.1-p6
== 5.2.1-p7
== 5.2.1-p8
== 5.1.0-p4
== 5.1.0-p5
== 5.1.0-p6
== 5.2.0
== 5.2.0-p1
== 5.2.1-p9
== 6.0.3
== 6.0.2
== 6.0.2-p1
== 6.0.1
== 6.0.0-p1
== 6.0.0-p2
== 6.0.0-p2-sp1
== 6.0.0
|
CVE-2020-24384
|
Critical
|
|
Nov 10, 2020
|
== 5.1.0
== 5.1.0-p3
== 4.1.4
== 4.1.4-gr1-p4
== 4.1.2
== 4.1.2-p5
== 4.1.1
== 4.1.1-p13
== 4.1.100
== 4.1.100-p7
== 4.1.0
== 4.1.0-p13
== 4.0.1-p3
== 4.0.0
== 3.2.5
== 3.2.5-p1
== 3.2.4
== 3.2.4-p5
== 3.2.3
== 3.2.3-p5
== 3.2.2
== 3.2.2-p8
|
CVE-2018-5390
|
High
|
|
Aug 6, 2018
|
== 3.2.2-p5
== 3.2.2
== 4.1.0
== 4.1.0-p11
== 4.1.1-p8
== 4.1.2-p4
== 4.1.2
== 4.1.4
== 4.1.4-p1
|
CVE-2016-10213
|
Medium
|
|
Feb 8, 2017
|
<= 2.7.2
|
CVE-2014-3976
|
Medium
|
|
Jun 5, 2014
|
== 2.7.0
== 2.7.1
|