Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2013-4333
|
Critical
|
|
Jan 24, 2020
|
== 3.8.7
== 3.6.11
== 3.4.21.1
== 3.2.7.6
== 3.0.8.5
|
CVE-2013-5350
|
High
|
|
Jan 24, 2014
|
== 3.6.13
== 3.8.9
|
CVE-2013-2309
|
Low
|
|
Jun 17, 2013
|
== 3.4.9
== 3.4.15.1
== 3.4.4
== 3.4.6.2
== 3.4.6.1
== 3.4.17
== 3.4.12.1
== 3.4.2
== 3.4.21
== 3.4.15
== 3.4.7
== 3.4.11.1
== 3.4.12
== 3.4.1
== 3.4.4.1
== 3.4.0.1
== 3.4.16
== 3.4.11
== 3.4.10
== 3.4.14.1
== 3.4.14
== 3.4.3
== 3.4.1.1
== 3.4.8
== 3.4.9.2
== 3.4b
== 3.4.18
== 3.4.0
== 3.4.19
== 3.4.9.1
== 3.4.13
== 3.4.5
== 3.4-rc1
== 3.4.6
== 3.6.3
== 3.6.1
== 3.6.6
== 3.6.7
== 3.6.5
== 3.6.8
== 3.6.0
== 3.6.4
== 3.6.2
== 3.6.9
== 3.8.4
== 3.8.2
== 3.8.6
== 3.8.0
== 3.8.1
== 3.8.3
== 3.8.5
|
CVE-2010-1040
|
Medium
|
|
Mar 23, 2010
|
== 2.4.8
== 2.6.8
== 2.5.3
== 1.6
== 2.11.6
== 2.10.1
== 2.10.5.1
== 2.4.6
== 2.10.6
== 2.7.1
== 2.6.6.1
== 2.7.0
== 2.10.11
== 2.12.11
== 2.5.1
== 2.5.5
== 2.11.4
== 2.6.5
== 2.12.2
== 2.10.2
== 2.14.0
== 2.11.3
== 2.6.11.1
== 2.7.2
== 2.4.3
== 2.5.2
== 2.12.5
== 2.4.4
== 2.7.4
== 2.6.4
== 2.3.1
== 2.10.4
== 2.11.5
== 2.12.16
== 2.13.3
== 2.12.15
== 2.12.9
== 2.10.8
== 2.3.4
== 2.5.8
== 2.10.5
== 2.13.7
== 2.6.10
== 2.11.5.1
== 2.12.10
== 2.13.1
== 2.10.0
== 2.8.0
== 2.3.3
== 2.10.3
== 2.12.12
== 2.12.17.1
== 2.12.0
== 2.6.9
== 2.6.1
== 2.12.17
== 2.13.0
== 2.6.6.2
== 2.12.7
== 2.4.1
== 2.6.6
== 2.13.4
== 2.10.12
== 2.12.14.1
== 2.6.2
== 2.5.0
== 2.12.8
== 2.10.9
== 1.8
== 2.4.0
== 2.10.7
== 2.4.2
== 2.6.3
== 2.13.2
== 2.7.3
== 2.12.18
== 2.10.13
== 2.10.13.1
== 2.4.8.1
== 2.13.6
== 2.5.6
== 2.3.0
== 2.11.2
== 2.13.8
== 2.13.5
== 2.12.6
== 2.12.3
== 2.10.4.2
== 2.6.0
== 2.10.10
== 2.12.14
== 2.12.1
== 2.4.5
== 2.11.1
== 2.10.4.1
== 2.6.7
== 2.11.3.1
== 2.5.4
== 2.4.7
== 2.12.4
== 2.12.13
== 2.11.7
|