Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2008-2803
|
Medium
|
|
Jul 8, 2008
|
<= 2.0.0.14
== 2.0
== 2.0.0.1
== 2.0.0.10
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.2
== 2.0.0.3
== 2.0.0.4
== 2.0.0.5
== 2.0.0.6
== 2.0.0.7
== 2.0.0.8
== 2.0.0.9
|
CVE-2008-2805
|
Medium
|
|
Jul 8, 2008
|
<= 2.0.0.14
== 2.0
== 2.0.0.1
== 2.0.0.10
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.2
== 2.0.0.3
== 2.0.0.4
== 2.0.0.5
== 2.0.0.6
== 2.0.0.7
== 2.0.0.8
== 2.0.0.9
|
CVE-2008-2806
|
High
|
|
Jul 8, 2008
|
== 2.0
== 2.0_.1
== 2.0_.10
== 2.0_.4
== 2.0_.5
== 2.0_.6
== 2.0_.7
== 2.0_.9
== 2.0_8
== 2.0-beta_1
== 2.0-rc2
== 2.0-rc3
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.14
== 2.0.0.2
== 2.0.0.3
|
CVE-2008-2807
|
Medium
|
|
Jul 8, 2008
|
<= 2.0.0.14
== 2.0
== 2.0.0.1
== 2.0.0.10
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.2
== 2.0.0.3
== 2.0.0.4
== 2.0.0.5
== 2.0.0.6
== 2.0.0.7
== 2.0.0.8
== 2.0.0.9
|
CVE-2008-2808
|
Low
|
|
Jul 8, 2008
|
== 2.0
== 2.0_.1
== 2.0_.10
== 2.0_.4
== 2.0_.5
== 2.0_.6
== 2.0_.9
== 2.0_8
== 2.0-beta_1
== 2.0-rc2
== 2.0-rc3
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.14
== 2.0.0.2
== 2.0.0.3
|
CVE-2008-2810
|
Medium
|
|
Jul 8, 2008
|
<= 2.0.0.14
== 2.0
== 2.0.0.1
== 2.0.0.10
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.2
== 2.0.0.3
== 2.0.0.4
== 2.0.0.5
== 2.0.0.6
== 2.0.0.7
== 2.0.0.8
== 2.0.0.9
|
CVE-2008-2811
|
High
|
|
Jul 8, 2008
|
<= 2.0.0.14
== 2.0
== 2.0.0.1
== 2.0.0.10
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.2
== 2.0.0.3
== 2.0.0.4
== 2.0.0.5
== 2.0.0.6
== 2.0.0.7
== 2.0.0.8
== 2.0.0.9
|
CVE-2008-2785
|
High
|
|
Jun 19, 2008
|
<= 2.0.0.15
== 2.0
== 2.0.0.1
== 2.0.0.10
== 2.0.0.11
== 2.0.0.12
== 2.0.0.13
== 2.0.0.14
== 2.0.0.2
== 2.0.0.3
== 2.0.0.4
== 2.0.0.5
== 2.0.0.6
== 2.0.0.7
== 2.0.0.8
== 2.0.0.9
== 3.0
|
CVE-2008-2786
|
High
|
|
Jun 19, 2008
|
== 2.0
== 3.0
|
CVE-2008-2419
|
Low
|
|
May 23, 2008
|
== 2.0.0.14
|