Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2011-2725
|
Medium
|
|
Feb 5, 2014
|
<= 4.7.4
== 4.7.0
== 4.7.3
== 4.7.1
== 4.7.2
|
CVE-2013-4132
|
Medium
|
|
Sep 16, 2013
|
<= 4.10.5
|
CVE-2011-3365
|
Low
|
|
Nov 29, 2011
|
== 4.6.4
== 4.7.0
== 4.6.1
== 4.7.1
== 4.6.2
== 4.6.3
== 4.6.0
== 4.6.5
|
CVE-2011-1586
|
Medium
|
|
Apr 27, 2011
|
== 4.1.0-alpha1
== 4.0.3
== 4.0.5
== 4.5.2
== 4.3.0-beta3
== 4.0.0-alpha1
== 4.2.3
== 4.1.3
== 4.4.0-rc1
== 4.3.0-rc3
== 4.6-beta1
== 4.5.4
== 4.2-rc
== 4.0.0-rc2
== 4.4.1
== 4.4.0-beta1
== 4.2.2
== 4.1.0
== 4.6-rc1
== 4.4.2
== 4.5.5
== 4.5.1
== 4.0.0-beta2
== 4.0.0-beta1
== 2.2.0
== 4.4.0-beta2
== 4.1.2
== 4.0.0-beta4
== 4.1.0-beta1
== 4.4.0
== 4.2.1
== 4.4.3
== 4.3.5
== 4.0.0-beta3
== 4.3.0
== 4.0.0
== 4.6.1
== 4.3.2
== 4.6-rc2
== 4.3.0-rc1
== 4.4.4
== 4.2-beta2
== 4.3.0-rc2
== 4.1.1
== 4.1.0-rc
== 4.1.80
== 4.0.4
== 4.3.3
== 4.2.4
== 4.1.85
== 4.5.3
== 4.4.5
== 4.0.0-rc1
== 4.1.0-beta2
== 4.6-beta2
== 4.3.1
== 4.0.2
== 4.0.1
== 4.4.0-rc2
== 4.3.0-beta1
== 4.3.4
<= 4.6.2
== 4.2.0
== 4.6.0
== 4.4.0-rc3
== 4.1.4
== 3.5.10
== 4.1.96
== 4.0.0-alpha2
== 4.5.0
|
CVE-2011-1168
|
Low
|
|
Apr 18, 2011
|
== 4.5.2
== 4.4.0-rc1
== 4.6-beta1
== 4.5.4
== 4.4.1
== 4.4.0-beta1
== 4.6-rc1
== 4.4.2
== 4.5.5
== 4.5.1
== 4.4.0-beta2
== 4.4.0
== 4.4.3
== 4.6.1
== 4.6-rc2
== 4.4.4
== 4.5.3
== 4.4.5
== 4.6-beta2
== 4.4.0-rc2
== 4.6.0
== 4.4.0-rc3
== 4.5.0
|
CVE-2010-2575
|
Medium
|
|
Aug 30, 2010
|
== 4.3.0
== 4.3.1
== 4.3.2
== 4.3.3
== 4.3.4
== 4.3.5
== 4.4.0
== 4.4.1
== 4.4.2
== 4.4.3
== 4.4.4
== 4.4.5
== 4.5.0
|
CVE-2010-1000
|
Medium
|
|
May 17, 2010
|
== 4.1.0-alpha1
== 4.0.3
== 4.0.5
== 4.3.0-beta3
== 4.0.0-alpha1
== 4.2.3
== 4.1.3
== 4.4.0-rc1
== 4.3.0-rc3
== 4.2-rc
== 4.0.0-rc2
== 4.4.1
== 4.4.0-beta1
== 4.2.2
== 4.1.0
== 4.4.2
== 4.0.0-beta2
== 4.0.0-beta1
== 4.4.0-beta2
== 4.1.2
== 4.0.0-beta4
== 4.1.0-beta1
== 4.4.0
== 4.2.1
== 4.4.3
== 4.3.5
== 4.0.0-beta3
== 4.3.0
== 4.0.0
== 4.3.2
== 4.3.0-rc1
== 4.2-beta2
== 4.3.0-rc2
== 4.1.1
== 4.1.0-rc
== 4.1.80
== 4.0.4
== 4.3.3
== 4.2.4
== 4.1.85
== 4.0.0-rc1
== 4.1.0-beta2
== 4.3.1
== 4.0.2
== 4.0.1
== 4.4.0-rc2
== 4.3.0-beta1
== 4.3.4
== 4.2.0
== 4.4.0-rc3
== 4.1.4
== 4.1.96
== 4.0.0-alpha2
|
CVE-2010-1511
|
Medium
|
|
May 17, 2010
|
== 2.2.0
== 3.5.10
== 4.0.0-alpha2
== 4.0.0-rc1
== 4.0.0-beta4
== 4.0.0-beta3
== 4.0.0
== 4.0.0-alpha1
== 4.0.0-rc2
== 4.0.0-beta2
== 4.0.0-beta1
== 4.0.1
== 4.0.2
== 4.0.3
== 4.0.4
== 4.0.5
== 4.1.0-alpha1
== 4.1.0
== 4.1.0-beta1
== 4.1.0-rc
== 4.1.0-beta2
== 4.1.1
== 4.1.2
== 4.1.3
== 4.1.4
== 4.1.80
== 4.1.85
== 4.1.96
== 4.2-rc
== 4.2-beta2
== 4.2.0
== 4.2.1
== 4.2.2
== 4.2.3
== 4.2.4
== 4.3.0-beta1
== 4.3.0-beta3
== 4.3.0-rc3
== 4.3.0-rc2
== 4.3.0-rc1
== 4.3.0
== 4.3.1
== 4.3.2
== 4.3.3
== 4.3.4
== 4.3.5
== 4.4.0-beta2
== 4.4.0
== 4.4.0-rc1
== 4.4.0-beta1
== 4.4.0-rc3
== 4.4.0-rc2
== 4.4.1
== 4.4.2
== 4.4.3
|
CVE-2010-0436
|
Medium
|
|
Apr 15, 2010
|
== 4.4.1
== 4.2.2
== 4.4.2
== 2.2.0
== 4.1.2
== 4.4.0
== 4.3.5
== 4.3.0
== 4.3.1
== 4.3.4
== 3.5.10
|
CVE-2010-0923
|
Medium
|
|
Mar 3, 2010
|
== 4.4.0
|