Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2012-2889
|
Low
|
|
Sep 26, 2012
|
<= 6.0.2
== 6.0
== 6.0.1
|
CVE-2012-3722
|
Medium
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3724
|
Medium
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3725
|
Low
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3726
|
Medium
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3727
|
Medium
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3728
|
Medium
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3729
|
Low
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3730
|
Low
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 5.1
== 4.2.8
<= 5.1.1
== 4.1
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|
CVE-2012-3731
|
Low
|
|
Sep 20, 2012
|
== 3.0
== 3.2
== 3.1.3
== 1.0.2
== 4.3.2
== 4.0.2
== 2.2
== 1.1.1
== 4.2.8
<= 5.1.1
== 4.1
== 2.0.0
== 3.1.2
== 3.0.1
== 4.3.1
== 4.2.5
== 1.1.2
== 3.1
== 1.1.3
== 1.1.0
== 1.0.1
== 2.1
== 4.3.5
== 4.2.1
== 1.1.5
== 4.0.1
== 4.3.3
== 5.0.1
== 2.1.1
== 1.1.4
== 5.0
== 1.0.0
== 2.0.2
== 2.0
== 2.0.1
== 4.0
== 4.3.0
== 2.2.1
== 3.2.1
== 3.2.2
|