Vulnerability Database

With exploit

imp / imp

Title Severity Exploit Date Affected Version
CVE-2000-0458 Low Apr 22, 2000 == 2.0.10
== 2.2_pre9
== 2.0.11
== 2.2_pre10
== 2.0.9
CVE-2000-0459 Medium Apr 22, 2000 == 2.0.10
== 2.2_pre9
== 2.2_pre11
== 2.0.11
== 2.2_pre12
== 2.2_pre10
== 2.0.9

horde / imp

Title Severity Exploit Date Affected Version
CVE-2012-5565 Low Apr 5, 2014 <= 5.0.23
== 5.0.10
== 5.0.11
== 5.0.12
== 5.0.13
== 5.0.14
== 5.0.15
== 5.0.16
== 5.0.17
== 5.0.18
== 5.0.19
== 5.0.20
== 5.0.21
== 5.0.22
== 5.0.4
== 5.0.5
== 5.0.6
== 5.0.7
== 5.0.8
== 5.0.9
CVE-2012-6640 Low Apr 5, 2014 == 5.0.11
<= 5.0.21
== 5.0.3
== 5.0.2
== 5.0.6
== 5.0.9
== 5.0-rc1
== 5.0.19
== 5.0.17
== 5.0-alpha1
== 5.0.4
== 5.0.1
== 5.0.12
== 5.0-beta1
== 5.0.18
== 5.0.13
== 5.0.14
== 5.0.7
== 5.0.8
== 5.0.10
== 5.0-rc2
== 5.0
== 5.0.5
== 5.0.20
== 5.0.15
== 5.0.16
CVE-2012-0791 Low Jan 24, 2012 == 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 5.0.3
== 3.1
== 5.0.2
== 4.3.6
== 3.2.4
== 3.1.2
== 5.0-rc1
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 5.0-alpha1
== 4.3.9
== 2.2.4
== 2.0
== 4.2.1
== 5.0.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 4.3.8
== 3.2.3
== 3.2.5
== 5.0-beta1
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
== 4.3.4
== 5.0.4-git
== 5.0-rc2
== 4.3.7
== 3.2.7
== 5.0
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2010-4778 Low Apr 4, 2011 == 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 3.1
== 4.3.6
== 3.2.4
== 3.1.2
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 2.2.4
<= 4.3.7
== 2.0
== 4.2.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 3.2.3
== 3.2.5
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
== 4.3.4
== 3.2.7
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2010-3695 Low Apr 1, 2011 == 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 3.1
== 4.3.6
== 3.2.4
== 3.1.2
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 2.2.4
<= 4.3.7
== 2.0
== 4.2.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 3.2.3
== 3.2.5
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
== 4.3.4
== 3.2.7
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2010-0463 Medium Jan 29, 2010 == 2.2.7
== 2.2.5
== 4.0
== 4.1.3
== 4.1.6
== 3.1
== 3.2.4
== 3.1.2
== 4.3.3
== 4.2
== 2.2.1
== 3.2.2
== 4.3.1
== 2.2.2
== 4.0.2
== 2.2.4
== 2.0
== 4.2.1
== 4.3.2
== 2.2.6
== 4.3.5
== 4.2.2
== 3.2.3
== 3.2.5
== 4.0.3
== 3.2.6
== 2.2
== 2.3
== 3.2
== 4.0.1
== 2.2.8
== 2.2.3
<= 4.3.6
== 4.3.4
== 3.2.7
== 4.0.4
== 4.1.5
== 3.0
== 3.2.1
== 4.3
== 3.2.7-rc1
CVE-2007-6018 Medium Jan 11, 2008 == 4.1.5
CVE-2007-1515 Low Mar 20, 2007 <= 4.1.3
CVE-2007-1474 Medium Mar 16, 2007 == 2.0
== 2.2
== 2.2.1
== 2.2.2
== 2.2.3
== 2.2.4
== 2.2.5
== 2.2.6
== 2.2.7
== 2.2.8
== 2.3
== 3.0
== 3.1
== 3.1.2
== 3.2
== 3.2.1
== 3.2.2
== 3.2.3
== 3.2.4
== 3.2.5
== 3.2.6
CVE-2006-4255 Low Aug 21, 2006 == 2.0
== 2.2
== 2.2.1
== 2.2.2
== 2.2.3
== 2.2.4
== 2.2.5
== 2.2.6
== 2.2.7
== 2.2.8
== 2.3
== 3.0
== 3.1
== 3.1.2
== 3.2
== 3.2.1
== 3.2.2
== 3.2.3
== 3.2.4
== 3.2.5
== 4.0
== 4.0.1
== 4.0.2
== 4.0.3
== 4.0.4