Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2000
|
Low
|
|
May 20, 2010
|
== 5.x-1.0
== 5.x-1.1
== 5.x-1.10
== 5.x-1.11
== 5.x-1.12
== 5.x-1.13
== 5.x-1.14
== 5.x-1.15
== 5.x-1.16
== 5.x-1.17
== 6.x-1.0-rc4
== 6.x-1.0-rc5
== 6.x-1.0-rc3
== 6.x-1.0
== 6.x-1.0-rc1
== 6.x-1.0-rc2
== 6.x-1.0-beta1
== 6.x-1.0-beta2
== 6.x-1.0-beta3
== 6.x-1.0-beta4
== 6.x-1.0-beta5
== 6.x-1.0-beta6
== 6.x-1.0-beta7
== 6.x-1.0-beta8
== 6.x-1.0-beta9
== 6.x-1.1
== 6.x-1.2
== 6.x-1.3
== 6.x-1.4
== 6.x-1.5
== 6.x-1.6
== 6.x-1.x-dev
|
CVE-2010-1358
|
Low
|
|
Apr 13, 2010
|
== 5.x-1.0
== 5.x-1.1
== 5.x-1.2
== 5.x-1.3
== 5.x-1.4
== 5.x-1.5
== 5.x-1.6
== 5.x-1.7
== 5.x-1.x-dev
== 6.x-1.0-rc2
== 6.x-1.0-rc1
== 6.x-1.0
== 6.x-1.0-rc5
== 6.x-1.0-rc4
== 6.x-1.0-rc3
== 6.x-1.0-beta1
== 6.x-1.0-beta2
== 6.x-1.0-beta3
== 6.x-1.0-beta4
== 6.x-1.0-beta5
== 6.x-1.0-beta6
== 6.x-1.0-beta7
== 6.x-1.0-beta8
== 6.x-1.0-beta9
== 6.x-1.1
== 6.x-1.2
== 6.x-1.3
== 6.x-1.4
== 6.x-1.5
== 6.x-1.6
== 6.x-1.x-dev
|
CVE-2009-3479
|
Low
|
|
Sep 30, 2009
|
== 5.x-1.0
== 5.x-1.1
== 5.x-1.2
== 5.x-1.3
== 5.x-1.4
== 5.x-1.5
== 5.x-1.6
== 5.x-1.7
== 5.x-1.8
== 5.x-1.9
== 5.x-1.10
== 5.x-1.11
== 5.x-1.12
== 5.x-1.13
== 5.x-1.14
== 5.x-1.15
== 5.x-1.16
== 5.x-1.x-dev
== 6.x-1.0-rc4
== 6.x-1.0-rc5
== 6.x-1.0-rc1
== 6.x-1.0-rc3
== 6.x-1.0
== 6.x-1.0-rc2
== 6.x-1.0-beta1
== 6.x-1.0-beta2
== 6.x-1.0-beta3
== 6.x-1.0-beta4
== 6.x-1.0-beta5
== 6.x-1.0-beta6
== 6.x-1.0-beta7
== 6.x-1.0-beta8
== 6.x-1.0-beta9
== 6.x-1.1
== 6.x-1.2
== 6.x-1.3
== 6.x-1.4
== 6.x-1.5
== 6.x-1.x-dev
|
CVE-2009-3488
|
Low
|
|
Sep 30, 2009
|
== 6.x-1.6
|