Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-2655
|
Low
|
|
Jul 19, 2012
|
== 8.3.6
== 8.3.17
== 8.3.3
== 8.3.2
== 8.3.12
== 8.3.18
== 8.3.14
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.16
== 8.3.4
== 8.3.11
== 8.3.9
== 8.3.13
== 8.3.15
== 8.4.8
== 8.4.4
== 8.4.1
== 8.4.9
== 8.4.3
== 8.4.10
== 8.4.11
== 8.4.6
== 8.4
== 8.4.5
== 8.4.7
== 8.4.2
== 9.0.7
== 9.0.6
== 9.0.4
== 9.0.1
== 9.0.3
== 9.0
== 9.0.2
== 9.0.5
== 9.1
== 9.1.2
== 9.1.3
== 9.1.1
|
CVE-2012-2143
|
Low
|
|
Jul 5, 2012
|
>= 8.3 < 8.3.19
>= 8.4 < 8.4.12
>= 9.0 < 9.0.8
>= 9.1 < 9.1.4
|
CVE-2011-2483
|
Medium
|
|
Aug 25, 2011
|
>= 8.2.0 < 8.2.22
>= 8.3.0 < 8.3.16
>= 8.4.0 < 8.4.9
>= 9.0.0 < 9.0.5
|
CVE-2010-4015
|
Medium
|
|
Feb 2, 2011
|
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.12
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.11
== 8.3.9
== 8.3.13
== 9.0.1
== 9.0
== 9.0.2
== 8.4.4
== 8.4.1
== 8.4.3
== 8.4.6
== 8.4
== 8.4.5
== 8.4.2
== 8.2.9
== 8.2.17
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.19
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.18
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
|
CVE-2010-3433
|
Medium
|
|
Oct 6, 2010
|
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.29
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.25
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.21
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.17
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.11
== 8.3.9
== 8.4.4
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0
|
CVE-2010-1169
|
High
|
|
May 19, 2010
|
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
|
CVE-2010-1170
|
Medium
|
|
May 19, 2010
|
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
|
CVE-2010-1447
|
High
|
|
May 19, 2010
|
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
|
CVE-2010-1975
|
Medium
|
|
May 19, 2010
|
== 7.4.16
== 7.4.24
== 7.4.22
== 7.4.21
== 7.4.19
== 7.4.15
== 7.4.1
== 7.4.14
== 7.4.26
== 7.4.6
== 7.4.23
== 7.4.11
== 7.4.7
== 7.4.17
== 7.4.3
== 7.4.25
== 7.4.9
== 7.4.5
== 7.4.18
== 7.4.8
== 7.4
== 7.4.4
== 7.4.28
== 7.4.12
== 7.4.27
== 7.4.10
== 7.4.20
== 7.4.2
== 7.4.13
== 8.0.7
== 8.0.2
== 8.0.22
== 8.0.17
== 8.0.10
== 8.0.12
== 8.0.9
== 8.0.15
== 8.0.0
== 8.0.18
== 8.0.3
== 8.0.24
== 8.0.20
== 8.0.8
== 8.0.6
== 8.0.16
== 8.0.13
== 8.0.1
== 8.0.19
== 8.0.21
== 8.0.23
== 8.0.4
== 8.0.5
== 8.0.14
== 8.0.11
== 8.0
== 8.1.10
== 8.1.6
== 8.1.15
== 8.1.7
== 8.1.20
== 8.1
== 8.1.19
== 8.1.13
== 8.1.0
== 8.1.3
== 8.1.9
== 8.1.14
== 8.1.11
== 8.1.17
== 8.1.18
== 8.1.4
== 8.1.8
== 8.1.1
== 8.1.12
== 8.1.5
== 8.1.16
== 8.1.2
== 8.2.9
== 8.2.10
== 8.2.15
== 8.2.4
== 8.2.11
== 8.2.12
== 8.2.2
== 8.2.5
== 8.2.1
== 8.2.7
== 8.2.6
== 8.2.3
== 8.2.16
== 8.2.8
== 8.2.13
== 8.2
== 8.2.14
== 8.3.6
== 8.3.3
== 8.3.2
== 8.3.1
== 8.3.5
== 8.3.8
== 8.3.7
== 8.3.10
== 8.3
== 8.3.4
== 8.3.9
== 8.4.1
== 8.4.3
== 8.4
== 8.4.2
== 9.0.0-beta1
|
CVE-2010-0733
|
Low
|
|
Mar 19, 2010
|
== 8.1.10
== 8.1.6
== 8.2.9
== 8.0.7
== 8.0.2
== 8.1.15
== 8.1.7
== 8.3.6
== 8.2.10
== 8.0.22
== 8.2.15
== 8.2.4
== 8.0.17
== 8.0.10
== 8.1.20
== 8.1
== 8.1.19
== 8.2.11
== 8.1.13
== 8.0.12
== 8.2.12
== 8.0.9
== 8.0.15
== 8.2.2
== 8.3.3
== 8.0.0
== 8.1.0
== 8.1.3
== 8.3.2
== 8.5
== 8.0.18
== 8.2.5
== 8.0.3
== 8.1.9
== 8.4
<= 8.4.1
== 8.2.1
== 8.3.1
== 8.5-alpha2
== 8.1.14
== 8.3.5
== 8.0.20
== 8.3.8
== 8.0.8
== 8.2.7
== 8.0.6
== 8.1.11
== 8.2.6
== 8.0.16
== 8.3.7
== 8.1.17
== 8.0.13
== 8.3.10
== 8.1.18
== 8.3
== 8.1.4
== 8.0.1
== 8.1.8
== 8.3.4
== 8.0.19
== 8.1.1
== 8.1.12
== 8.1.5
== 8.0.21
== 8.1.16
== 8.2.3
== 8.0.23
== 8.5-alpha1
== 8.3.9
== 8.2.16
== 8.0.4
== 8.0.5
== 8.0.14
== 8.2.8
== 8.2.13
== 8.2
== 8.0.11
== 8.0.317
== 8.0
== 8.2.14
== 8.1.2
|