Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-3124
|
High
|
|
Aug 26, 2010
|
== 0.7.2
== 0.5.0
== 0.2.62
== 0.4.0
== 0.1.99e
== 1.0.3
== 0.8.0
== 0.1.99g
== 0.2.70
== 0.4.3
== 0.9.4
== 0.8.5
== 0.6.2
== 0.2.61
== 0.9.10
== 0.2.71
== 0.2.83
== 0.8.4
== 0.2.72
== 0.8.6
== 0.2.0
== 0.3.0
== 0.4.4
== 0.2.80
== 0.5.2
== 0.7.0
== 0.9.8a
== 0.2.81
== 1.0.1
== 0.5.3
== 0.2.60
== 1.1.2
== 1.0.0
== 0.4.6
== 0.9.5
== 0.6.0
== 0.2.73
== 1.0.4
== 0.2.82
== 1.1.0
== 0.1.99h
== 0.4.1
== 0.2.92
== 0.2.91
== 0.5.1
== 0.4.2
== 1.0.2
== 0.9.2
== 0.1.99b
== 0.6.1
== 0.1.99f
<= 1.1.3
== 0.1.99i
== 0.8.1
== 0.9.9
== 1.1.1
== 0.2.90
== 0.8.2
== 0.4.5
== 1.0.6
== 1.0.5
== 0.9.3
== 0.2.63
== 0.9.6
== 0.3.1
|
CVE-2010-2937
|
Medium
|
|
Aug 20, 2010
|
== 1.0.3
== 0.9.0
== 0.9.4
== 0.9.9a
== 0.9.10
== 0.9.7
== 0.9.1
== 0.9.8a
== 1.0.1
== 1.1.2
== 1.0.0
== 0.9.5
== 1.0.4
== 1.1.0
== 1.0.2
== 0.9.2
== 0.9.9
== 1.1.1
== 1.0.6
== 1.0.5
== 0.9.3
== 0.9.6
|
CVE-2010-0364
|
High
|
|
Jan 21, 2010
|
== 0.8.6
|
CVE-2009-2484
|
High
|
|
Jul 16, 2009
|
== 0.9.9
|
CVE-2009-1045
|
Medium
|
|
Mar 23, 2009
|
== 0.9.8a
|
CVE-2008-5276
|
High
|
|
Dec 3, 2008
|
== 0.9.0
== 0.9.4
== 0.9.7
== 0.9.1
== 0.9.5
== 0.9.8
== 0.9.2
== 0.9.3
== 0.9.6
|
CVE-2008-5036
|
High
|
|
Nov 10, 2008
|
== 0.9.0
== 0.9.4
== 0.9.1
== 0.9.5
== 0.9.2
== 0.9
== 0.9.3
|
CVE-2008-5032
|
High
|
|
Nov 10, 2008
|
== 0.8.6b
== 0.7.2
== 0.8.6g
== 0.5.0
== 0.8.4a
== 0.8.0
== 0.8.4-test2
== 0.7.1a
== 0.9.0
== 0.9.4
== 0.8.5
== 0.6.2
== 0.8.5-test3
== 0.8.6h
== 0.8.4
== 0.8.6
== 0.7.2-test3
== 0.8.6c
== 0.8.6i
== 0.7.0
== 0.9.1
== 0.7.2-test2
== 0.5.3
== 0.8.6a
== 0.9.5
== 0.6.0
== 0.8.5-test4
== 0.8.6f
== 0.9.2
== 0.9
== 0.8.1
== 0.8.6e
== 0.8.6d
== 0.7.1
== 0.8.2
== 0.9.3
|
CVE-2008-4686
|
High
|
|
Oct 22, 2008
|
== 0.9.0
== 0.9.4
== 0.9.1
== 0.9.2
== 0.9.3
|
CVE-2008-4654
|
High
|
|
Oct 22, 2008
|
== 0.9.4
== 0.9.1
== 0.9.2
== 0.9
== 0.9.3
|