Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2009-4589
|
Low
|
|
Jan 7, 2010
|
== 1.14.0
|
CVE-2009-0737
|
Low
|
|
Feb 25, 2009
|
== 1.6.3
== 1.12.1
== 1.13.0-rc2
== 1.12.3
== 1.6.2
== 1.12.0
== 1.6.10
== 1.6.7
== 1.6.5
== 1.6.9
== 1.6.6
== 1.6.4
== 1.6.11
== 1.13.3
== 1.13.1
== 1.6.0
== 1.13.0
== 1.13.0-rc1
== 1.6.1
== 1.13.2
== 1.6.8
== 1.12.2
== 1.12.0-rc1
|
CVE-2008-5249
|
Low
|
|
Dec 19, 2008
|
== 1.13.1
== 1.13.0
== 1.13.2
|
CVE-2008-5250
|
Low
|
|
Dec 19, 2008
|
== 1.12.1
== 1.12.0
== 1.6.11
== 1.13.1
== 1.13.0
== 1.13.2
|
CVE-2008-5252
|
Medium
|
|
Dec 19, 2008
|
== 1.3.13
== 1.5.6
== 1.6.3
== 1.5.1
== 1.5.8
== 1.12.1
== 1.4.1
== 1.5.3
== 1.5-alpha2
== 1.5-beta1
== 1.4.3
== 1.5-beta4
== 1.5-rc2
== 1.3.5
== 1.6.2
== 1.3.6
== 1.12.0
== 1.4.2
== 1.6.10
== 1.6.7
== 1.6.5
== 1.5.2
== 1.6.9
== 1.6.6
== 1.6.4
== 1.3.10
== 1.3.4
== 1.5.0
== 1.6.11
== 1.5-rc3
== 1.5.5
== 1.3.9
== 1.3.15
== 1.13.1
== 1.5.4
== 1.4.0
== 1.3.0
== 1.5-beta2
== 1.6.0
== 1.13.0
== 1.3.3
== 1.3.1
== 1.6.1
== 1.3.14
== 1.4.4
== 1.3.7
== 1.5-rc4
== 1.5-alpha1
== 1.13.2
== 1.5.7
== 1.3.11
== 1.3.8
== 1.3.2
== 1.6.8
|
CVE-2008-5687
|
Medium
|
|
Dec 19, 2008
|
== 1.12.1
== 1.13.0-rc2
== 1.12.3
== 1.12.0
== 1.11.2
== 1.11-rc1
== 1.13.1
== 1.11
== 1.13.0
== 1.13.0-rc1
== 1.13.2
== 1.11.1
== 1.12.2
== 1.12.0-rc1
|
CVE-2008-5688
|
Low
|
|
Dec 19, 2008
|
== 1.8.2
== 1.12.1
== 1.13.0-rc2
== 1.9.3
== 1.12.3
== 1.9.2
== 1.12.0
== 1.10.0-rc2
== 1.11.2
== 1.9.4
== 1.8.5
== 1.11-rc1
== 1.9.1
== 1.10.4
== 1.10.1
== 1.8.3
== 1.13.1
== 1.10.3
== 1.10.2
== 1.11
== 1.8.4
== 1.13.0
== 1.8.1
== 1.13.0-rc1
== 1.9.0
== 1.10.0-rc1
== 1.9.5
== 1.13.2
== 1.11.1
== 1.9.6
== 1.10.0
== 1.12.2
== 1.12.0-rc1
|
CVE-2008-4408
|
Low
|
|
Oct 3, 2008
|
== 1.12.0
== 1.13.1
|
CVE-2008-1318
|
Medium
|
|
Mar 13, 2008
|
== 1.11
== 1.11.1
|
CVE-2008-0460
|
Low
|
|
Jan 25, 2008
|
== 1.8.2
== 1.9.3
== 1.8.0
== 1.11.0rc1
== 1.9.2
== 1.9.4
== 1.9.1
== 1.10.1
== 1.8.3
== 1.10.2
== 1.11
== 1.8.4
== 1.7.0
== 1.8.1
== 1.9.0
== 1.10.0
|