Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2013-6780
|
Low
|
|
Nov 13, 2013
|
== 2.5.2
== 2.7.0
== 2.5.1
== 2.8.0
== 2.5.0
== 2.9.0
== 2.8.2
== 2.8.1
== 2.6.0
|
CVE-2013-4939
|
Low
|
|
Jul 29, 2013
|
== 3.8.0
== 3.5.0
== 3.8.1
== 3.6.0
== 3.1.0
== 3.7.0
== 3.10.0
== 3.2.0
== 3.7.2
== 3.9.0
== 3.1.1
== 3.7.1
== 3.10.1
== 3.0.0
== 3.3.0
== 3.4.1
== 3.1.2
== 3.10.2
== 3.7.3
== 3.9.1
== 3.4.0
== 3.5.1
|
CVE-2013-4940
|
Low
|
|
Jul 29, 2013
|
== 3.8.0
== 3.5.0
== 3.8.1
== 3.6.0
== 3.1.0
== 3.7.0
== 3.10.0
== 3.2.0
== 3.7.2
== 3.9.0
== 3.1.1
== 3.7.1
== 3.10.1
== 3.0.0
== 3.3.0
== 3.4.1
== 3.1.2
== 3.10.2
== 3.7.3
== 3.9.1
== 3.4.0
== 3.5.1
|
CVE-2013-4941
|
Low
|
|
Jul 29, 2013
|
== 3.8.0
== 3.5.0
== 3.8.1
== 3.6.0
== 3.1.0
== 3.7.0
== 3.10.0
== 3.2.0
== 3.7.2
== 3.9.0
== 3.1.1
== 3.7.1
== 3.10.1
== 3.0.0
== 3.3.0
== 3.4.1
== 3.1.2
== 3.10.2
== 3.7.3
== 3.9.1
== 3.4.0
== 3.5.1
|
CVE-2013-4942
|
Low
|
|
Jul 29, 2013
|
== 3.10.0
== 3.10.1
== 3.10.2
== 3.5.0
== 3.5.1
== 3.6.0
== 3.7.0
== 3.7.1
== 3.7.2
== 3.7.3
== 3.8.0
== 3.8.1
== 3.9.0
== 3.9.1
|
CVE-2012-5881
|
Low
|
|
Nov 16, 2012
|
== 2.4.1
== 2.5.2
== 2.7.0
== 2.9.0-pr4
== 2.9.0-pr2
== 2.5.1
== 2.4.0
== 2.8.0
== 2.5.0
== 2.9.0
== 2.8.2
== 2.8.1
== 2.8.1-pr1
== 2.6.0
|
CVE-2012-5882
|
Low
|
|
Nov 16, 2012
|
== 2.4.1
== 2.5.2
== 2.7.0
== 2.9.0-pr4
== 2.9.0-pr2
== 2.5.1
== 2.4.0
== 2.8.0
== 2.5.0
== 2.9.0
== 2.8.2
== 2.8.1
== 2.8.1-pr1
== 2.6.0
|
CVE-2012-5883
|
Low
|
|
Nov 16, 2012
|
== 2.9.0-pr4
== 2.9.0-pr2
== 2.8.0
== 2.9.0
== 2.8.2
== 2.8.1
== 2.8.1-pr1
|
CVE-2010-4710
|
Low
|
|
Jan 28, 2011
|
== 2.4.1
== 2.5.2
== 2.7.0
== 2.3.1
== 2.2.2
== 2.2.0
== 2.5.1
== 2.4.0
== 2.8.0
<= 2.8.2
== 2.5.0
== 2.8.1
== 2.8.1-pr1
== 2.6.0
== 2.3.0
|
CVE-2010-4207
|
Low
|
|
Nov 7, 2010
|
== 2.4.0
== 2.5.0
== 2.5.1
== 2.5.2
== 2.6.0
== 2.7.0
== 2.8.0
== 2.8.1
|