Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2621
|
Medium
|
|
Jul 2, 2010
|
== 4.2.3
== 4.0.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.1.1
== 4.1.2
== 4.2.1
== 4.1.5
== 4.3.2
== 4.3.3
== 4.3.0
== 4.3.1
== 4.4.0
== 4.4.1
== 4.3.4
== 4.3.5
== 4.5.0
== 4.5.1
== 4.4.2
== 4.4.3
== 4.6.0
== 4.6.0-rc1
== 4.5.2
== 4.5.3
== 4.6.1
== 4.6.2
== 4.2.0
== 4.0.0
|
CVE-2009-2700
|
Low
|
|
Sep 2, 2009
|
== 4.2.3
== 4.0.1
== 4.1.0
== 4.1.3
== 4.1.4
== 4.1.1
== 4.1.2
== 4.2.1
== 4.1.5
== 4.3.2
== 4.3.3
== 4.3.0
== 4.3.1
== 4.4.0
== 4.4.1
== 4.3.4
== 4.3.5
== 4.5.0
== 4.5.1
== 4.4.2
== 4.4.3
== 4.6.0
== 4.6.0-rc1
== 4.5.2
== 4.5.3
== 4.6.3
== 4.6.4
== 4.6.1
== 4.6.2
== 4.7.2
== 4.7.3
== 4.7.0
== 4.7.1
== 4.2.0
== 4.7.5
== 4.7.4
== 4.0.0
== 4.8.2
== 4.8.3
== 4.8.0
== 4.8.1
== 4.8.4
|
CVE-2007-0242
|
Low
|
|
Apr 3, 2007
|
== 3.3.8
== 4.2.3
|
CVE-2006-4811
|
Medium
|
|
Oct 18, 2006
|
== 3.3.0
== 3.3.3
== 3.3.4
== 3.3.1
== 3.3.2
== 4.1.0
== 3.3.5
== 3.3.6
== 4.1.3
== 4.1.4
== 4.1.1
== 4.1.2
== 4.2.0
|