Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-2472
|
High
|
|
Aug 6, 2012
|
== 8.2
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
|
CVE-2012-2474
|
Low
|
|
Aug 6, 2012
|
== 8.2(3)
== 8.2(4)
== 8.2(4.4)
== 8.3.1
== 8.2(3.9)
== 8.2.2
== 8.3.1-interim
== 8.2
== 8.3.2
== 8.2(1)
== 8.2.1
== 8.2(5)
== 8.3(1)
== 8.2(2)
== 8.2.3
== 8.4
== 8.3(2)
== 8.2.2-interim
== 8.2(4.1)
|
CVE-2012-3058
|
High
|
|
Jun 20, 2012
|
== 8.4
== 8.4(1.11)
== 8.4(1)
== 8.4(2.11)
== 8.4(2)
== 8.5
== 8.5(1.4)
== 8.5(1)
== 8.6
|
CVE-2012-0378
|
High
|
|
May 3, 2012
|
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
|
CVE-2011-3285
|
Medium
|
|
May 2, 2012
|
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
|
CVE-2011-3309
|
Low
|
|
May 2, 2012
|
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
|
CVE-2011-4006
|
High
|
|
May 2, 2012
|
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
== 8.5
== 8.5(1)
== 8.5(1.4)
|
CVE-2012-0335
|
Medium
|
|
May 2, 2012
|
== 7.2
== 7.2(1)
== 7.2(1.22)
== 7.2(2)
== 7.2(2.5)
== 7.2(2.7)
== 7.2(2.8)
== 7.2(2.10)
== 7.2(2.14)
== 7.2(2.15)
== 7.2(2.16)
== 7.2(2.17)
== 7.2(2.18)
== 7.2(2.19)
== 7.2(2.48)
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 7.2.1
== 7.2.2
== 7.2.3
== 7.2.4
== 7.2.5
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2
== 8.2.2-interim
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
|
CVE-2012-0353
|
High
|
|
Mar 15, 2012
|
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.5
|
CVE-2012-0354
|
High
|
|
Mar 15, 2012
|
== 8.0
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.0.2
== 8.0.3
== 8.0.4
== 8.0.5
== 8.1
== 8.2(1)
== 8.2(2)
== 8.2(3)
== 8.2(3.9)
== 8.2(4)
== 8.2(4.1)
== 8.2(4.4)
== 8.2(5)
== 8.2.1
== 8.2.2-interim
== 8.2.2
== 8.2.3
== 8.3(1)
== 8.3(2)
== 8.3.1-interim
== 8.3.1
== 8.3.2
== 8.4
== 8.4(1)
== 8.4(1.11)
== 8.4(2)
== 8.4(2.11)
== 8.5
== 8.5(1)
== 8.5(1.4)
== 8.6
|