Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2015-2734
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2735
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2736
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2737
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2738
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2739
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2740
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2741
|
Low
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2743
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|
CVE-2015-2722
|
High
|
|
Jul 6, 2015
|
== 38.0
== 31.1
== 31.3.0
== 31.1.1
== 31.7.0
== 31.5
== 31.6.0
== 31.3
== 31.5.3
== 31.5.1
== 31.1.0
== 31.2
== 31.4
== 31.0
== 31.5.2
|