Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2009-5066
|
Low
|
|
Aug 13, 2012
|
== 5.0.0
|
CVE-2011-4314
|
Medium
|
|
Jan 27, 2012
|
== 5.1.2
== 5.1.1
== 5.1.0
|
CVE-2011-4608
|
High
|
|
Jan 27, 2012
|
== 5.1.2
|
CVE-2011-2196
|
Medium
|
|
Jul 27, 2011
|
== 4.3.0
== 5.1.1
== 4.3.0-cp09
|
CVE-2011-1484
|
Medium
|
|
Jul 27, 2011
|
== 4.3.0-cp09
== 5.1.0
|
CVE-2010-3708
|
High
|
|
Dec 30, 2010
|
== 4.3.0-cp06
== 4.3.0
== 4.3.0-cp01
== 4.3.0-cp04
== 4.3.0-cp07
== 4.3.0-cp03
== 4.3.0-cp02
== 4.3.0-cp08
== 4.3.0-cp05
|
CVE-2010-3862
|
Low
|
|
Dec 30, 2010
|
== 4.3.0-cp06
== 4.3.0
== 4.3.0-cp01
== 4.3.0-cp04
== 4.3.0-cp09
== 4.3.0-cp03
== 4.3.0-cp02
== 4.3.0-cp08
== 4.3.0-cp05
== 4.3.0-cp07
== 5.1.0
|
CVE-2010-3878
|
Low
|
|
Dec 30, 2010
|
== 4.3.0-cp06
== 4.3.0
== 4.3.0-cp01
== 4.3.0-cp04
== 4.3.0-cp07
== 4.3.0-cp03
== 4.3.0-cp02
== 4.3.0-cp08
== 4.3.0-cp05
|
CVE-2010-4265
|
Low
|
|
Dec 30, 2010
|
== 4.3.0-cp06
== 4.3.0
== 4.3.0-cp01
== 4.3.0-cp04
== 4.3.0-cp09
== 4.3.0-cp03
== 4.3.0-cp02
== 4.3.0-cp08
== 4.3.0-cp05
== 4.3.0-cp07
== 5.1.0
|
CVE-2010-1871
|
High
|
|
Aug 5, 2010
|
== 4.3.0
|