Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-4403
|
Medium
|
|
Sep 19, 2012
|
== 2.3.1
== 2.3.0
|
CVE-2012-4407
|
Medium
|
|
Sep 19, 2012
|
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-4408
|
Medium
|
|
Sep 19, 2012
|
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.1.7
== 2.1.4
== 2.1.0
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.4
== 2.2.0
== 2.3.1
== 2.3.0
|
CVE-2012-3387
|
Low
|
|
Jul 23, 2012
|
== 2.3.0
|
CVE-2012-3388
|
Low
|
|
Jul 23, 2012
|
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.0
== 2.3.0
|
CVE-2012-3389
|
Low
|
|
Jul 23, 2012
|
== 2.2.2
== 2.2.1
== 2.2.3
== 2.2.0
== 2.3.0
|
CVE-2012-3390
|
Low
|
|
Jul 23, 2012
|
== 2.2.2
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.2.1
== 2.2.3
== 2.1.4
== 2.1.0
== 2.2.0
|
CVE-2012-3391
|
Low
|
|
Jul 23, 2012
|
== 2.2.2
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.2.1
== 2.2.3
== 2.1.4
== 2.1.0
== 2.2.0
|
CVE-2012-3392
|
Medium
|
|
Jul 23, 2012
|
== 2.2.2
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.2.1
== 2.2.3
== 2.1.4
== 2.1.0
== 2.2.0
|
CVE-2012-3393
|
Low
|
|
Jul 23, 2012
|
== 2.2.2
== 2.1.2
== 2.1.1
== 2.1.5
== 2.1.6
== 2.1.3
== 2.2.1
== 2.2.3
== 2.1.4
== 2.1.0
== 2.2.0
|