Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2230
|
Low
|
|
Jun 28, 2010
|
== 1.5.2
== 1.8.8
== 1.6.1
== 1.8.2
== 1.2.1
== 1.4.2
== 1.6.8
== 1.6.5
== 1.3.3
== 1.4.3
<= 1.8.12
== 1.4.5
== 1.7.6
== 1.6.2
== 1.8.6
== 1.7.1
== 1.8.5
== 1.8.3
== 1.3.2
== 1.8.9
== 1.8.7
== 1.8.10
== 1.6.4
== 1.1.1
== 1.3.1
== 1.6.7
== 1.4.4
== 1.7.3
== 1.7.2
== 1.5.3
== 1.6.3
== 1.8.11
== 1.6.6
== 1.5
== 1.4.1
== 1.7.5
== 1.5.1
== 1.3.4
== 1.8.4
== 1.8.1
== 1.7.4
== 1.2.0
== 1.3.0
== 1.6.0
== 1.5.0-beta
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.2
== 1.9.3
== 1.9.5
== 1.9.8
== 1.9.7
|
CVE-2010-2231
|
Medium
|
|
Jun 28, 2010
|
== 1.5.2
== 1.8.8
== 1.6.1
== 1.8.2
== 1.2.1
== 1.4.2
== 1.6.8
== 1.6.5
== 1.3.3
== 1.4.3
<= 1.8.12
== 1.4.5
== 1.7.6
== 1.6.2
== 1.8.6
== 1.7.1
== 1.8.5
== 1.8.3
== 1.3.2
== 1.8.9
== 1.8.7
== 1.8.10
== 1.6.4
== 1.1.1
== 1.3.1
== 1.6.7
== 1.4.4
== 1.7.3
== 1.7.2
== 1.5.3
== 1.6.3
== 1.8.11
== 1.6.6
== 1.5
== 1.4.1
== 1.7.5
== 1.5.1
== 1.3.4
== 1.8.4
== 1.8.1
== 1.7.4
== 1.2.0
== 1.3.0
== 1.6.0
== 1.5.0-beta
== 1.9.4
== 1.9.1
== 1.9.6
== 1.9.2
== 1.9.3
== 1.9.5
== 1.9.8
== 1.9.7
|
CVE-2010-1613
|
Medium
|
|
Apr 29, 2010
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
|
CVE-2010-1614
|
Low
|
|
Apr 29, 2010
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
|
CVE-2010-1615
|
High
|
|
Apr 29, 2010
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
|
CVE-2010-1616
|
Low
|
|
Apr 29, 2010
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
|
CVE-2010-1617
|
Low
|
|
Apr 29, 2010
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
|
CVE-2010-1618
|
Low
|
|
Apr 29, 2010
|
== 1.8.1
== 1.8.10
== 1.8.11
== 1.8.2
== 1.8.3
== 1.8.4
== 1.8.5
== 1.8.6
== 1.8.7
== 1.8.8
== 1.8.9
== 1.9.1
== 1.9.2
== 1.9.3
== 1.9.4
== 1.9.5
== 1.9.6
== 1.9.7
|
CVE-2010-1619
|
Low
|
|
Apr 29, 2010
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.6
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.11
== 1.8.4
== 1.8.1
== 1.9.7
|
CVE-2009-4297
|
Medium
|
|
Dec 16, 2009
|
== 1.9.4
== 1.9.1
== 1.8.8
== 1.9.6
== 1.8.2
== 1.9.2
== 1.8.5
== 1.8.3
== 1.8.9
== 1.8.7
== 1.8.10
== 1.9.3
== 1.9.5
== 1.8.4
== 1.8.1
|