Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2015-4164
|
Low
|
|
Jun 15, 2015
|
== 3.2.0
== 4.1.5
== 3.2.1
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.2.2
== 3.4.4
== 4.0.0
== 4.4.0-rc1
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 3.2.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 3.1.4
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 3.1.3
== 4.4.0
== 4.0.1
== 4.0.3
|
CVE-2015-4103
|
Low
|
|
Jun 3, 2015
|
== 4.3.2
== 4.1.5
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
|
CVE-2015-4104
|
High
|
|
Jun 3, 2015
|
== 4.3.2
== 4.1.5
== 4.2.2
== 4.2.3
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
|
CVE-2015-4105
|
Low
|
|
Jun 3, 2015
|
== 4.3.2
== 4.1.5
== 4.2.2
== 3.4.0
== 4.3.0
== 4.0.4
== 4.0.2
== 3.3.2
== 4.1.2
== 3.4.4
== 4.0.0
== 4.1.1
== 4.2.0
== 4.1.0
== 3.4.3
== 4.4.1
== 4.1.3
== 4.1.6.1
== 4.3.4
== 3.3.1
== 3.4.2
== 4.1.4
== 3.4.1
== 4.3.1
== 3.3.0
== 4.2.1
== 4.5.0
== 4.4.0
== 4.0.1
== 4.0.3
|
CVE-2015-3456
|
High
|
|
May 13, 2015
|
== 4.5.0
|
CVE-2015-3340
|
Low
|
|
Apr 28, 2015
|
== 4.3.2
== 4.2.2
== 4.2.3
== 4.3.3
== 4.3.0
== 4.4.2
== 4.2.0
== 4.2.5
== 4.3.4
== 4.2.4
== 4.4.1
== 4.3.1
== 4.2.1
== 4.5.0
== 4.4.0
|
CVE-2015-0777
|
Low
|
|
Apr 5, 2015
|
== 3.4.0
== 3.4.1
== 3.4.2
== 3.4.3
== 3.4.4
|
CVE-2015-2751
|
High
|
|
Apr 1, 2015
|
== 4.3.2
== 4.3.0
== 4.4.0-rc1
== 4.4.1
== 4.3.1
== 4.5.0
== 4.4.0
|
CVE-2015-2752
|
Low
|
|
Apr 1, 2015
|
== 4.3.2
== 4.3.0
== 4.4.1
== 4.3.1
== 4.5.0
== 4.4.0
|
CVE-2015-2756
|
Low
|
|
Apr 1, 2015
|
== 4.3.2
== 4.3.0
== 4.4.1
== 4.3.1
== 4.5.0
== 4.4.0
|