Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2009-3387
|
Medium
|
|
Feb 3, 2010
|
== 3.3.2
== 3.4.2
== 3.3.4
== 3.5.2
== 3.5.1
== 3.4.1
== 3.4.4
== 3.3.3
== 3.4
== 3.3.1
|
CVE-2009-3989
|
Low
|
|
Feb 3, 2010
|
== 3.0.4
== 2.0
== 2.18.6+
== 2.16.8
== 3.0.0
== 2.22.7
== 3.4.3
== 3.0.1
== 2.18.8
== 2.16-rc2
== 2.18.5
== 2.20-rc2
== 2.18.6
<= 3.0.10
== 2.20-rc1
== 2.16.1
== 2.20
== 2.18-rc1
== 3.4.2
== 2.16.2
== 2.16.11
== 3.2.5
== 2.20.5
== 2.20.6
== 2.22.3
== 2.22.6
== 2.16-rc1
== 2.10
== 3.2.3
== 2.16
== 2.22.1
== 3.5.2
== 2.16.9
== 3.5.1
== 3.0.6
== 3.5
== 2.20.1
== 2.14.2
== 3.0.7
== 2.18.7
== 2.22.2
== 2.18.1
== 2.22-rc1
== 2.14.3
== 2.22.5
== 3.4.1
== 3.4.4
== 2.14.4
== 2.16.7
== 2.6
== 2.22
== 2.4
== 2.16.4
== 2.12
== 3.0.3
== 3.2
== 2.20.3
== 3.0.9
== 2.8
== 3.2.4
== 2.2
== 3.0.2
== 2.18.4
== 3.2.2
== 2.16.3
== 2.14.5
== 2.18.9
== 2.18
== 2.18.3
== 2.20.7
== 3.4
== 3.0.8
== 2.20.2
== 2.20.4
== 2.18-rc3
== 2.16.6
== 2.18.2
== 2.18-rc2
== 3.0.5
== 2.14.1
== 2.22.4
== 3.2.1
== 2.16.5
== 2.14
== 2.16.10
|
CVE-2009-3386
|
Medium
|
|
Nov 20, 2009
|
== 3.4.3
== 3.3.2
== 3.4.2
== 3.3.4
== 3.5.1
== 3.5
== 3.4.1
== 3.3.3
== 3.4
== 3.4-rc1
|
CVE-2009-3125
|
High
|
|
Sep 16, 2009
|
== 3.3.2
== 3.3.4
== 3.5
== 3.4.1
== 3.3.3
== 3.4
|
CVE-2009-3165
|
High
|
|
Sep 16, 2009
|
== 3.0.4
== 3.0-rc1
== 3.1.3
== 3.3.2
== 3.0.1
== 3.2-rc1
== 3.1.1
== 3.1.2
== 3.3.4
== 3.2.3
== 2.23.4
== 3.0
== 3.0.6
== 3.0.7
== 3.4.1
== 3.1.4
== 3.0.3
== 3.2
== 3.2.4
== 3.0.2
== 3.3.3
== 3.2.2
== 3.4
== 3.0.8
== 3.2-rc2
== 3.4-rc1
== 3.0.5
== 3.2.1
== 3.3.1
|
CVE-2009-3166
|
Medium
|
|
Sep 16, 2009
|
== 3.4.1
== 3.4
== 3.4-rc1
|
CVE-2009-1213
|
Medium
|
|
Apr 1, 2009
|
== 3.3.2
== 3.2-rc1
== 3.2
== 3.3.3
== 3.2.2
== 3.3
== 3.2-rc2
== 3.2.1
== 3.3.1
|
CVE-2008-6098
|
Low
|
|
Feb 9, 2009
|
== 3.0.4
== 3.1.3
== 3.0.0
== 3.3.2
== 3.0.1
== 2.18.8
== 2.17.6
== 2.18.5
== 2.19.3
== 2.20-rc2
== 2.18.6
== 2.20-rc1
== 2.20
== 2.19
== 2.18-rc1
== 3.1.1
== 3.1.2
== 2.20.5
== 2.20.6
== 2.22.3
== 2.22.6
== 2.17.4
== 2.23.2
== 2.21.2
== 2.22.1
== 2.23.4
== 3.0.6
== 2.20.1
== 2.23.3
== 3.0.7
== 2.18.7
== 2.23.1
== 2.22.2
== 2.18.1
== 2.22-rc1
== 2.22.5
== 2.19.1
== 3.1.4
== 2.17.5
== 2.22
== 3.1.0
== 3.0.3
== 3.2
== 2.20.3
== 3.0.2
== 2.18.4
== 2.18.9
== 2.18
== 2.18.3
== 2.17.7
== 2.20.2
== 2.20.4
== 2.21.1
== 2.18-rc3
== 2.23
== 2.18.2
== 2.18-rc2
== 3.0.5
== 2.22.4
== 2.21
== 3.2.1
== 3.3.1
== 3.0_rc1
== 2.19.2
|
CVE-2009-0481
|
Low
|
|
Feb 9, 2009
|
== 3.0.4
== 2.16.8
== 3.0.0
== 2.16_rc2
== 3.0.1
== 2.18.8
== 2.17.6
== 2.18.5
== 2.19.3
== 2.20-rc2
== 2.18.6
== 2.17.2
== 2.20-rc1
== 2.16.1
== 2.20
== 2.19
== 2.18-rc1
== 2.16.2
== 2.16.11
== 2.20.5
== 2.20.6
== 2.22.3
== 2.22.6
== 2.17.4
== 2.16-rc1
== 2.21.2
== 2.10
== 2.17.1
== 2.16
== 2.22.1
== 2.16.9
== 3.0.6
== 2.20.1
== 2.14.2
== 2.18.7
== 2.22.2
== 2.18.1
== 2.22-rc1
== 2.14.3
== 2.22.5
== 2.14.4
== 2.19.1
== 2.16.7
== 2.17.5
== 2.22
== 2.17.3
== 2.16.4
== 2.12
== 3.0.3
== 3.2
== 2.20.3
== 3.0.2
== 2.18.4
== 2.16.3
== 2.14.5
== 2.18.9
== 2.18
== 2.18.3
== 2.17.7
== 2.20.2
== 2.20.4
== 2.21.1
== 2.18-rc3
== 2.17
== 2.16.6
== 2.18.2
== 2.18-rc2
== 3.0.5
== 2.14.1
== 2.22.4
== 2.21
== 2.16.5
== 3.3.1
== 2.14
== 2.19.2
== 2.16.10
|
CVE-2009-0482
|
Medium
|
|
Feb 9, 2009
|
== 3.0.4
== 2.16.8
== 3.0.0
== 2.16_rc2
== 3.0.1
== 2.18.8
== 2.17.6
== 2.18.5
== 2.19.3
== 2.20-rc2
== 2.18.6
== 2.17.2
== 2.20-rc1
== 2.16.1
== 2.20
== 2.19
== 2.18-rc1
== 2.16.2
== 2.16.11
== 2.20.5
== 2.20.6
== 2.22.3
== 2.22.6
== 2.17.4
== 2.16-rc1
== 2.21.2
== 2.10
== 2.17.1
== 2.16
== 2.22.1
== 2.16.9
== 3.0.6
== 2.20.1
== 2.14.2
== 2.18.7
== 2.22.2
== 2.18.1
== 2.22-rc1
== 2.14.3
== 2.22.5
== 2.14.4
== 2.19.1
== 2.16.7
== 2.17.5
== 2.22
== 2.17.3
== 2.16.4
== 2.12
== 3.0.3
== 3.2
== 2.20.3
== 3.0.2
== 2.18.4
== 2.16.3
== 2.14.5
== 2.18.9
== 2.18
== 2.18.3
== 2.17.7
== 2.20.2
== 2.20.4
== 2.21.1
== 2.18-rc3
== 2.17
== 2.16.6
== 2.18.2
== 2.18-rc2
== 3.0.5
== 2.14.1
== 2.22.4
== 2.21
== 2.16.5
== 3.3.1
== 2.14
== 2.19.2
== 2.16.10
|