Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-5486
|
Medium
|
|
Sep 30, 2014
|
== 2.10.3
== 2.10.8
== 2.11.0
== 2.11.1
== 2.11.2
== 2.11.3
== 2.13.18
== 2.5.1
== 2.6.1
== 2.6.4
== 2.7.0
== 2.7.3
== 2.7.4
== 2.7.5
== 2.7.6
== 2.7.7
== 2.7.8
== 2.8.1
== 2.8.4
== 2.8.6
== 2.8.8
== 2.9.2
== 2.9.3
== 2.9.4
== 2.9.5
== 2.9.6
== 2.9.7
|
CVE-2012-5489
|
Medium
|
|
Sep 30, 2014
|
<= 2.13.10
== 2.10.3
== 2.10.8
== 2.11.0
== 2.11.1
== 2.11.2
== 2.11.3
== 2.13.0
== 2.13.1
== 2.13.2
== 2.13.3
== 2.13.4
== 2.13.5
== 2.13.6
== 2.13.7
== 2.13.8
== 2.13.9
== 2.5.1
== 2.6.1
== 2.6.4
== 2.7.0
== 2.7.3
== 2.7.4
== 2.7.5
== 2.7.6
== 2.7.7
== 2.7.8
== 2.8.1
== 2.8.4
== 2.8.6
== 2.8.8
== 2.9.2
== 2.9.3
== 2.9.4
== 2.9.5
== 2.9.6
== 2.9.7
|
CVE-2012-5507
|
Low
|
|
Sep 30, 2014
|
== 2.10.3
== 2.10.8
== 2.11.0
== 2.11.1
== 2.11.2
== 2.11.3
== 2.13.18
== 2.5.1
== 2.6.1
== 2.6.4
== 2.7.0
== 2.7.3
== 2.7.4
== 2.7.5
== 2.7.6
== 2.7.7
== 2.7.8
== 2.8.1
== 2.8.4
== 2.8.6
== 2.8.8
== 2.9.2
== 2.9.3
== 2.9.4
== 2.9.5
== 2.9.6
== 2.9.7
|
CVE-2011-3587
|
High
|
|
Oct 10, 2011
|
== 2.13.10
== 2.12.0-a2
== 2.12.11
== 2.12.9
== 2.12.8
== 2.13.0-a3
== 2.12.16
== 2.13.0-c1
== 2.12.10
== 2.13.9
== 2.12.3
== 2.12.12
== 2.13.0-b1
== 2.13.0
== 2.12.17
== 2.12.19
== 2.12.14
== 2.12.15
== 2.12.0
== 2.12.0-b1
== 2.12.5
== 2.12.0-a4
== 2.12.0-a1
== 2.13.7
== 2.12.18
== 2.13.2
== 2.13.4
== 2.13.1
== 2.12.6
== 2.12.2
== 2.13.0-a2
== 2.12.0-b2
== 2.12.20
== 2.13.8
== 2.12.0-a3
== 2.13.0-a1
== 2.12.0-b3
== 2.13.3
== 2.13.5
== 2.12.7
== 2.13.0-a4
== 2.12.4
== 2.13.6
== 2.12.0-b4
== 2.12.1
== 2.12.13
|
CVE-2011-2528
|
High
|
|
Jul 19, 2011
|
== 2.12.0
== 2.12.0-a1
== 2.12.0-a2
== 2.12.0-a3
== 2.12.0-a4
== 2.12.0-b1
== 2.12.0-b2
== 2.12.0-b3
== 2.12.0-b4
== 2.12.1
== 2.12.10
== 2.12.11
== 2.12.12
== 2.12.13
== 2.12.14
== 2.12.15
== 2.12.16
== 2.12.17
== 2.12.18
== 2.12.2
== 2.12.3
== 2.12.4
== 2.12.5
== 2.12.6
== 2.12.7
== 2.12.8
== 2.12.9
== 2.13.0
== 2.13.0-a1
== 2.13.0-a2
== 2.13.0-a3
== 2.13.0-a4
== 2.13.0-b1
== 2.13.0-c1
== 2.13.1
== 2.13.2
== 2.13.3
== 2.13.4
== 2.13.5
== 2.13.6
== 2.13.7
|
CVE-2010-3198
|
Low
|
|
Sep 8, 2010
|
== 2.10.8
== 2.10.5
== 2.10.4-final
== 2.11.1
== 2.10.7
== 2.11.3
== 2.10.10
== 2.10.11
== 2.10.0-b1
== 2.11.0c1
== 2.11.5
== 2.11.2
== 2.10.0-c1
== 2.11.0
== 2.11.0a1
== 2.10.2-b1
== 2.10.2
== 2.10.3-final
== 2.10.0-b2
== 2.10.3
== 2.10.6
== 2.10.9
== 2.10.0-final
== 2.10.2-final
== 2.11.6
== 2.11.4
== 2.11.0b1
|
CVE-2010-1104
|
Low
|
|
Mar 25, 2010
|
== 2.8.0
== 2.9.11
== 2.8.8
== 2.10.8
== 2.10.5
== 2.8.9.1
== 2.10.4-final
== 2.9.0-b2
== 2.11.1
== 2.8.11
== 2.10.7
== 2.11.3
== 2.9.2
== 2.10.10
== 2.8.0-b2
== 2.10.11
== 2.10.0-b1
== 2.11.0c1
== 2.12.0
== 2.9.4
== 2.9.5
== 2.8.0-a1
== 2.8
== 2.11.5
== 2.8.1-final
== 2.11.2
== 2.9.1
== 2.10.0-c1
== 2.8.9
== 2.11.0
== 2.8.0-final
== 2.8.0-a2
== 2.11.0a1
== 2.10.2-b1
== 2.10.2
== 2.9.0
== 2.8.5
== 2.8.2
== 2.10.3-final
== 2.8.6
== 2.12.2
== 2.8.0-b1
== 2.8.1-b1
== 2.9.7
== 2.9.6
== 2.10.0-b2
== 2.9.10
== 2.8.3
== 2.9.3
== 2.10.3
== 2.8.1
== 2.8.4
== 2.10.6
== 2.9.0-b1
== 2.10.9
== 2.10.0-final
== 2.10.2-final
== 2.11.4
== 2.11.0b1
== 2.8.10
== 2.12.1
== 2.8.7
== 2.9.8
== 2.9.9
|
CVE-2008-5102
|
Low
|
|
Nov 17, 2008
|
== 2.0.0b6
== 2.7.3-final
== 2.4.0
== 2.2.0b2
== 2.7.3-b2
== 2.7.0-final
== 2.2.1
== 2.7.4-b2
== 2.3.1
== 2.8.8
== 2.2.0b4
== 1.10.3
== 2.7.4-c1
== 2.10.5
== 2.4.4b1
== 2.8.9.1
== 2.2.0
== 2.1.2
== 2.0.0b5
== 2.3.0b3
== 2.7.0-b2
== 1.10.4
== 2.10.4-final
== 2.6.4-rc2
== 2.9.0-b2
== 2.11.1
== 2.3.2
== 2.5.1b1
== 2.5.0
== 2.4.0b1
== 2.4.1
== 2.10.7
== 2.1.6
== 2.4.4-upgrade
== 2.0.1
== 2.9.2
== 2.7.2-c1
== 2.8.0-b2
== 2.1.0b1
== 2.3.2b1
== 2.4.0b3
== 2.3.1b3
== 2.1.5
== 2.3.1b2
== 2.1.0b2
== 2.10.0-b1
== 2.7.0-c2
== 2.6.2.b3
<= 2.11.2
== 2.0.0
== 2.7.5-b1
== 2.3.0b2
== 2.7.6-final
== 2.4.1b1
== 2.7.6-b1
== 2.9.4
== 2.6.0
== 2.9.5
== 2.0.0a4
== 2.2.1b1
== 2.7.7-final
== 2.8.0-a1
== 2.7.1-final
== 2.6.2
== 2.2.4
== 2.4.0a1
== 2.6.2.b4
== 2.8.1-final
== 2.9.1
== 2.4.3-upgrade
== 2.10.0-c1
== 2.8.9
== 2.7.4-final
== 2.4.2
== 2.11.0
== 2.8.0-final
== 2.8.0-a2
== 2.7.5-c1
== 2.4.3
== 2.10.2-b1
== 2.5.1-upgrade
== 2.8.5
== 2.8.2
== 2.2.2
== 2.10.3-final
== 2.1.3
== 2.8.6
== 2.7.7-b1
== 2.4.4
== 2.3.3b1
== 2.2.5b1
== 2.5.1b2
== 2.8.0-b1
== 2.6.2.b1
== 2.2.0b1
== 2.8.1-b1
== 2.2.4b1
== 2.2.0b3
== 2.6.0b1
== 2.9.7
== 2.7.9
== 2.3.2b2
== 2.9.6
== 2.10.0-b2
== 2.7.0-b1
== 2.7.0-a1
== 2.1.0
== 2.9.10
== 2.2.5
== 2.7.5-final
== 2.3.0a2
== 2.7.0-b4
== 2.5.0b1
== 2.6.2.b6
== 2.4.0b2
== 2.7.1-b2
== 2.8.3
== 2.6.3
== 2.4.3b1
== 2.4.2b1
== 2.7.4-b1
== 2.6.1.b1
== 2.7.0-b3
== 2.1.4
== 2.6.2.b2
== 2.7.4-c2
== 2.9.3
== 2.0.0b4
== 2.7.3-b1
== 2.1.1
== 2.3.0
== 2.6.4
== 2.6.4-rc1
== 2.8.4
== 2.7.8
== 2.6.2.b5
== 2.5.0a2
== 2.3.0b1
== 2.10.6
== 2.9.0-b1
== 2.3.3
== 2.6.1-upgrade
== 2.3.1b1
== 2.10.0-final
== 2.9.0-final
== 2.5.1
== 2.7.1-b1
== 2.10.2-final
== 2.2.0a1
== 2.6.0b2
== 2.5.0a1
== 2.6.0a1
== 2.8.10
== 2.3.0a1
== 2.8.7
== 2.6.1
== 2.9.8
== 2.7.0-c1
== 2.7.2-final
== 2.7.6-b2
== 2.9.9
== 2.2.3
|
CVE-2007-0240
|
Low
|
|
Mar 22, 2007
|
<= 2.10.2
|
CVE-2006-4684
|
Medium
|
|
Sep 19, 2006
|
== 2.8.0
== 2.8.8
== 2.7.0
== 2.7.6
== 2.7.5
== 2.7.3
== 2.8.5
== 2.8.2
== 2.8.6
== 2.7.4
== 2.7.9
== 2.8.3
== 2.7.1
== 2.7.2
== 2.8.1
== 2.8.4
== 2.7.8
== 2.7.7
== 2.8.7
|