Vulnerability Database

With exploit

strongswan / strongswan

Title Severity Exploit Date Affected Version
CVE-2014-2891 Medium May 7, 2014 == 5.0.1
== 5.1.0
== 5.0.3
== 5.0.4
== 5.0.2
<= 5.1.1
== 5.0.0
CVE-2014-2338 Medium Apr 16, 2014 == 4.1.8
== 4.1.11
== 4.3.7
== 4.2.6
== 4.2.12
== 4.1.1
== 4.2.10
== 5.1.2
== 4.2.16
== 4.1.10
== 4.5.3
== 4.1.4
== 4.5.2
== 5.0.1
== 4.4.0
== 5.1.0
== 4.2.9
== 4.5.1
== 4.2.14
== 4.3.5
== 4.0.7
== 4.2.3
== 4.3.2
== 4.2.5
== 4.6.4
== 4.2.8
== 4.3.3
== 4.6.2
== 5.1.1
== 4.2.0
== 4.2.1
== 4.1.7
== 4.1.6
== 4.1.5
== 5.0.3
== 4.2.13
== 5.0.4
== 4.3.0
== 4.6.1
== 4.2.11
== 4.2.4
== 5.0.2
== 4.3.6
== 4.6.0
== 4.6.3
== 4.1.2
== 4.1.9
== 5.0.0
== 4.2.7
== 4.2.2
== 4.4.1
== 4.5.0
== 4.3.1
== 4.2.15
== 4.3.4
== 4.1.0
== 4.1.3
CVE-2013-6075 Medium Nov 2, 2013 == 4.3.7
== 4.5.3
== 4.5.2
== 5.0.1
== 4.4.0
== 5.1.0
== 4.5.1
== 4.3.5
== 4.6.4
== 4.3.3
== 4.6.2
== 5.0.3
== 5.0.4
== 4.6.1
== 5.0.2
== 4.3.6
== 4.6.0
== 4.6.3
== 5.0.0
== 4.4.1
== 4.5.0
== 4.3.4
CVE-2013-6076 Medium Nov 2, 2013 == 5.1.0
== 5.0.3
== 5.0.4
== 5.0.2
CVE-2013-5018 Low Aug 29, 2013 == 4.1.11
== 5.0.1
== 5.0.3
== 5.0.4
== 5.0.2
== 5.0.0
CVE-2013-2054 Medium Jul 9, 2013 == 2.4.3
== 2.5.7
== 2.4.2
== 4.1.8
== 4.1.11
== 2.6.16
== 2.5.3
== 2.8.0
== 4.2.6
== 2.8.1
== 2.4.4
== 2.6.0
== 2.3.0
== 4.2.12
== 4.1.1
== 2.7.2
== 4.2.10
== 2.1.0
== 2.1.5
== 2.0.2
== 2.8.9
== 2.8.8
== 2.8.4
== 4.2.16
== 2.7.1
== 4.1.10
== 4.1.4
== 2.6.14
== 2.6.20
== 4.0.6
== 4.2.9
== 2.5.1
== 4.2.14
== 2.4
== 2.3.1
== 2.6.2
== 2.4.0
== 4.0.7
== 2.5.5
== 2.8.3
== 4.2.3
== 4.3.2
== 2.6
== 2.0.1
== 4.2.5
== 2.1.1
== 4.2.8
== 2.6.21
== 4.3.3
== 4.2.0
== 2.6.1
== 4.2.1
== 4.1.7
== 4.1.6
== 2.7.0
== 2.8.7
== 4.1.5
== 2.4.1
== 4.0.1
== 4.0.3
== 4.2.13
== 4.0.4
== 4.3.0
== 2.8.6
== 2.0.0
== 2.5.2
== 2.1.3
== 4.2.11
== 4.2.4
== 2.1.2
== 2.8.10
== 2.6.4
== 2.5.0
== 2.5.6
== 2.7.3
== 2.5.4
== 4.1.2
== 4.0.0
== 2.4.0a
== 4.1.9
== 4.2.7
== 2.3.2
== 4.2.2
== 2.8.11
== 4.0.5
== 4.3.1
== 2.1.4
== 4.2.15
== 4.1
== 4.3.4
== 4.1.0
== 2.8.5
== 4.1.3
== 2.8.2
== 2.6.3
== 4.0.2
CVE-2013-2944 Low May 2, 2013 == 4.3.7
== 4.5.3
== 4.5.2
== 5.0.1
== 4.4.0
== 4.5.1
== 4.3.5
== 4.6.4
== 4.6.2
== 4.6.1
== 5.0.2
== 4.3.6
== 4.6.0
== 4.6.3
== 5.0.0
== 4.4.1
== 4.5.0
CVE-2012-2388 High Jun 27, 2012 == 4.2.6
== 4.2.12
== 4.2.10
== 4.2.16
== 4.5.3
== 4.5.2
== 4.4.0
== 4.2.9
== 4.5.1
== 4.2.14
== 4.3.5
== 4.2.3
== 4.3.2
== 4.2.5
== 4.2.8
== 4.3.3
== 4.6.2
== 4.2.0
== 4.2.1
== 4.2.13
== 4.3.0
== 4.6.1
== 4.2.11
== 4.2.4
== 4.3.6
== 4.6.0
== 4.6.3
== 4.2.7
== 4.2.2
== 4.4.1
== 4.5.0
== 4.3.1
== 4.2.15
== 4.3.4
CVE-2010-2628 High Aug 20, 2010 == 4.4.0
== 4.3.5
== 4.3.2
== 4.3.3
== 4.3.0
== 4.3.6
== 4.3.1
== 4.3.4
CVE-2009-2661 Medium Aug 4, 2009 == 2.8.0
== 2.8.1
== 4.2.12
== 4.2.10
== 2.8.8
== 2.8.4
== 4.2.16
== 4.2.14
== 2.8.3
== 4.2.3
== 4.3.2
== 4.2.0
== 4.2.1
== 2.8.7
== 4.2.13
== 4.3.0
== 2.8.6
== 4.2.11
== 2.8.10
== 4.2.2
== 4.3.1
== 4.2.15
== 2.8.5
== 2.8.2