Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2020-22278
|
High
|
|
Nov 4, 2020
|
<= 5.0.2
|
CVE-2019-12922
|
Medium
|
|
Sep 13, 2019
|
<= 4.9.0.1
|
CVE-2018-7260
|
Medium
|
|
Feb 21, 2018
|
< 4.7.8
|
CVE-2013-1937
|
Medium
|
|
Apr 16, 2013
|
== 3.5.4
== 3.5.2.2
== 3.5.6
== 3.5.5
== 3.5.1.0
== 3.5.7
== 3.5.7-rc1
== 3.5.3.0
== 3.5.2.1
== 3.5.2.0
== 3.5.0.0
<= 3.5.8
|
CVE-2008-4326
|
Low
|
|
Sep 30, 2008
|
<= 2.11.9.1
== 2.0
== 2.0.0
== 2.0.1
== 2.0.2
== 2.0.3
== 2.0.4
== 2.0.5
== 2.1
== 2.1.0
== 2.1.1
== 2.1.2
== 2.2
== 2.2.0
== 2.2.0_pre1
== 2.2.0_pre2
== 2.2.0_rc1
== 2.2.0_rc2
== 2.2.0_rc3
== 2.2.2
== 2.2.3
== 2.2.4
== 2.2.5
== 2.2.6
== 2.2.7_pl1
== 2.2_pre1
== 2.2_pre2
== 2.2_rc1
== 2.2_rc2
== 2.2_rc3
== 2.3.1
== 2.3.2
== 2.4.0
== 2.5.0
== 2.5.1
== 2.5.2
== 2.5.2_pl1
== 2.5.3
== 2.5.4
== 2.5.5
== 2.5.5_pl1
== 2.5.5_rc1
== 2.5.5_rc2
== 2.5.6_rc1
== 2.5.6_rc2
== 2.5.7
== 2.5.7_pl1
== 2.6.0_pl1
== 2.6.0_pl2
== 2.6.0_pl3
== 2.6.1
== 2.6.1_pl1
== 2.6.1_pl3
== 2.6.1_rc1
== 2.6.2
== 2.6.2_dev
== 2.6.2_pl1
== 2.6.2_rc1
== 2.6.3
== 2.6.3_pl1
== 2.6.4
== 2.6.4_pl1
== 2.6.4_pl2
== 2.6.4_pl3
== 2.6.4_pl4
== 2.6.4_rc1
== 2.7
== 2.7.0
== 2.7.0_beta1
== 2.7.0_pl1
== 2.7.0_pl2
== 2.7.0_rc1
== 2.7_pl1
== 2.8.0
== 2.8.0.1
== 2.8.0.2
== 2.8.0.3
== 2.8.1
== 2.8.1_dev
== 2.8.2
== 2.8.3
== 2.8.4
== 2.9
== 2.9.0
== 2.9.0.1
== 2.9.0.2
== 2.9.0.3
== 2.9.0_beta1
== 2.9.0_dev
== 2.9.0_rc1
== 2.9.1
== 2.9.1.1
== 2.9.1_rc1
== 2.9.1_rc2
== 2.9.2
== 2.9_rc1
== 2.10.0
== 2.10.0.0
== 2.10.0.1
== 2.10.0.2
== 2.10.1
== 2.10.01
== 2.10.1.0
== 2.10.2
== 2.10.2.0
== 2.10.3
== 2.10.3.0
== 2.10.3rc1
== 2.11.0
== 2.11.0.0
== 2.11.0beta1
== 2.11.0rc1
== 2.11.1
== 2.11.1.0
== 2.11.1.1
== 2.11.1.2
== 2.11.1rc1
== 2.11.2
== 2.11.2.0
== 2.11.2.1
== 2.11.2.2
== 2.11.3
== 2.11.3.0
== 2.11.3rc1
== 2.11.4
== 2.11.4.0
== 2.11.4rc1
== 2.11.5
== 2.11.5.0
== 2.11.5.1
== 2.11.5.2
== 2.11.5rc1
== 2.11.6
== 2.11.6rc1
== 2.11.7
== 2.11.7.0
== 2.11.8
== 2.11.9
|
CVE-2008-4096
|
High
|
|
Sep 18, 2008
|
== 2.10.3rc1
== 2.11.4
== 2.1.1
== 2.11.0rc1
== 2.11.1.2
== 2.1.2
<= 2.11.9
== 2.11.5.1
== 2.11.3rc1
== 2.11.1
== 2.11.5.0
== 2.10.0.1
== 2.11.6rc1
== 2.0.4
== 2.10.2
== 2.11.1rc1
== 2.0.2
== 2.10.0.2
== 2.10.3
== 2.11.2
== 2.11.7
== 2.0.3
== 2.11.5
== 2.11.5.2
== 2.11.2.2
== 2.11.4rc1
== 2.11.5rc1
== 2.1.0
== 2.11.8
== 2.1
== 2.11.4.0
== 2.0.1
== 2.11.3
== 2.11.2.1
== 2.10.1
== 2.10.0.0
== 2.11.2.0
== 2.11.1.1
== 2.11.6
== 2.10.01
== 2.11.0beta1
== 2.0.0
== 2.10.0
== 2.10.3.0
== 2.11.3.0
== 2.11.0.0
== 2.10.2.0
== 2.0
== 2.11.1.0
== 2.10.1.0
== 2.11.0
== 2.0.5
|
CVE-2008-3456
|
Medium
|
|
Aug 4, 2008
|
== 2.11.4
== 2.1.1
== 2.11.1.2
== 2.1.2
== 2.11.5.1
<= 2.11.7.0
== 2.11.1
== 2.11.5.0
== 2.10.0.1
== 2.0.4
== 2.10.2
== 2.0.2
== 2.10.0.2
== 2.10.3
== 2.11.2
== 2.0.3
== 2.11.5
== 2.11.5.2
== 2.11.2.2
== 2.1.0
== 2.1
== 2.11.4.0
== 2.0.1
== 2.11.3
== 2.11.2.1
== 2.10.1
== 2.10.0.0
== 2.11.2.0
== 2.11.1.1
== 2.11.6
== 2.10.01
== 2.0.0
== 2.10.0
== 2.10.3.0
== 2.11.3.0
== 2.11.0.0
== 2.10.2.0
== 2.0
== 2.11.1.0
== 2.10.1.0
== 2.11.0
== 2.0.5
|
CVE-2008-3457
|
Low
|
|
Aug 4, 2008
|
== 2.11.4
== 2.1.1
== 2.11.1.2
== 2.1.2
== 2.11.5.1
<= 2.11.7.0
== 2.11.1
== 2.11.5.0
== 2.10.0.1
== 2.0.4
== 2.10.2
== 2.0.2
== 2.10.0.2
== 2.10.3
== 2.11.2
== 2.0.3
== 2.11.5
== 2.11.5.2
== 2.11.2.2
== 2.1.0
== 2.1
== 2.11.4.0
== 2.0.1
== 2.11.3
== 2.11.2.1
== 2.10.1
== 2.10.0.0
== 2.11.2.0
== 2.11.1.1
== 2.11.6
== 2.10.01
== 2.0.0
== 2.10.0
== 2.10.3.0
== 2.11.3.0
== 2.11.0.0
== 2.10.2.0
== 2.0
== 2.11.1.0
== 2.10.1.0
== 2.11.0
== 2.0.5
|
CVE-2006-1803
|
Low
|
|
Apr 18, 2006
|
<= 2.8.0.3
|