Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2009-1482
|
Low
|
|
Apr 29, 2009
|
<= 1.8.2
== 1.5.5a
== 0.2
== 1.5.7
== 1.5.2
== 1.2
== 1.5.5_rc1
== 1.6.3
== 1.7
== 1.6.0
== 1.5.0
== 1.5.3_rc1
== 0.9
== 0.3
== 1.5.3_rc2
== 1.7.1
== 1.2.1
== 1.8.1
== 1.5.1
== 1.5.6
== 1.0
== 0.1
== 1.5.4
== 1.2.2
== 0.8
== 1.6.2
== 1.7.0
== 1.5.5
== 0.10
== 1.5.3
== 1.1
== 1.8.0
== 0.7
== 1.6.1
== 1.6
== 1.5.8
== 1.7.3
== 1.7.2
== 0.11
|
CVE-2009-0312
|
Low
|
|
Jan 28, 2009
|
== 1.8.1
== 1.7.0
|
CVE-2009-0260
|
Low
|
|
Jan 23, 2009
|
== 1.5.5a
== 0.2
== 1.5.7
== 1.5.2
== 1.2
== 1.5.5_rc1
== 1.6.3
== 1.6.0
== 1.5.0
== 1.5.3_rc1
== 0.9
== 0.3
== 1.5.3_rc2
== 1.7.1
== 1.2.1
== 1.5.1
== 1.5.6
== 1.0
== 0.1
== 1.5.4
== 1.2.2
== 0.8
== 1.6.2
<= 1.8.0
== 1.7.0
== 1.5.5
== 0.10
== 1.5.3
== 1.1
== 0.7
== 1.6.1
== 1.6
== 1.5.8
== 1.7.3
== 1.7.2
== 0.11
|
CVE-2008-3381
|
Low
|
|
Jul 30, 2008
|
== 1.6.3
== 1.7.0
|
CVE-2008-1937
|
Medium
|
|
Apr 25, 2008
|
== 1.6.0
== 1.6.2
== 1.6.1
|
CVE-2008-1098
|
Low
|
|
Mar 5, 2008
|
<= 1.5.8
|
CVE-2008-1099
|
Medium
|
|
Mar 5, 2008
|
<= 1.5.8
|
CVE-2008-0780
|
Low
|
|
Feb 14, 2008
|
== 1.5.5a
== 1.5.7
== 1.5.2
== 1.5.5_rc1
== 1.6.0
== 1.5.0
== 1.5.3_rc1
== 1.5.3_rc2
== 1.5.1
== 1.5.6
== 1.5.4
== 1.5.5
== 1.5.3
== 1.5.8
|
CVE-2008-0781
|
Low
|
|
Feb 14, 2008
|
== 1.5.5a
== 0.2
== 1.5.7
== 1.5.2
== 1.2
== 1.5.5_rc1
== 1.5.0
== 1.5.3_rc1
== 0.9
== 0.3
== 1.5.3_rc2
== 1.2.1
== 1.5.1
== 1.5.6
== 1.0
== 0.1
== 1.5.4
== 1.2.2
== 0.8
== 1.5.5
== 0.10
== 1.5.3
== 1.1
== 0.7
== 1.5.8
== 0.11
|
CVE-2008-0782
|
Medium
|
|
Feb 14, 2008
|
== 1.5.5a
== 0.2
== 1.5.7
== 1.5.2
== 1.2
== 1.5.5_rc1
== 1.5.0
== 1.5.3_rc1
== 0.9
== 0.3
== 1.5.3_rc2
== 1.2.1
== 1.5.1
== 1.5.6
== 1.0
== 0.1
== 1.5.4
== 1.2.2
== 0.8
== 1.5.5
== 0.10
== 1.5.3
== 1.1
== 0.7
== 1.5.8
== 0.11
|