Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-3089
|
Low
|
|
Sep 15, 2010
|
== 2.1.5
== 2.1.11-rc1
== 2.1.3
== 2.1.8
== 2.1.11-rc2
== 2.1.13-rc1
== 2.1.11
== 2.1.2
== 2.1.9
== 2.1-stable
== 2.1.6
== 2.1-alpha
== 2.1
<= 2.1.13
== 2.1-beta
== 2.1.10
== 2.1.1
== 2.1.12
== 2.1.7
== 2.1.4
|
CVE-2006-2191
|
High
|
|
Sep 19, 2006
|
<= 2.1.8
|
CVE-2006-4624
|
Low
|
|
Sep 7, 2006
|
<= 2.1.8
|
CVE-2006-2941
|
Medium
|
|
Sep 6, 2006
|
== 2.1.5
== 2.1.5.8
== 2.1.3
== 2.1.8
== 2.1.2
== 2.1.6
== 2.1
== 2.1b1
== 2.1.1
== 2.1.7
== 2.1.4
== 2.1.1-beta1
|
CVE-2006-3636
|
Medium
|
|
Sep 6, 2006
|
== 2.1.5
== 2.1.5.8
== 2.1.3
== 2.1.8
== 2.1.2
== 2.1.6
== 2.1
== 2.1b1
== 2.1.1
== 2.1.7
== 2.1.4
== 2.1.1-beta1
|
CVE-2006-1712
|
Low
|
|
Apr 11, 2006
|
== 2.1.7
|
CVE-2006-0052
|
Medium
|
|
Mar 31, 2006
|
== 2.1.5
== 2.0.5
== 2.0.1
== 2.1.3
== 2.0.11
== 2.0.6
== 2.0-beta3
== 1.1
== 2.0.14
== 2.0-beta5
== 2.0.12
== 2.0
== 2.0-beta4
== 2.1.2
== 2.0.9
== 2.0.3
== 2.0.13
== 2.0.4
== 2.1
== 2.1b1
== 2.1.1
== 1.0
== 2.0.8
== 2.1.4
== 2.0.10
== 2.0.2
== 2.0.7
|
CVE-2005-4153
|
High
|
|
Dec 11, 2005
|
== 2.1.5
== 2.1.6
== 2.1.4
|
CVE-2005-3573
|
Medium
|
|
Nov 16, 2005
|
== 2.1.5
== 2.0.5
== 2.0.1
== 2.1.5.8
== 2.1.3
== 2.0.11
== 2.0.6
== 2.0-beta3
== 2.0.14
== 2.0-beta5
== 2.0.12
== 2.0-beta4
== 2.1.2
== 2.0.9
== 2.0.3
== 2.0.13
== 2.0.4
== 2.1
== 2.0.8
== 2.1.4
== 2.0.10
== 2.1.1-beta1
== 2.0.2
== 2.0.7
|
CVE-2005-0080
|
Medium
|
|
May 2, 2005
|
== 2.1.5
|