Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2094
|
Medium
|
|
May 28, 2010
|
== 5.3.1
== 5.3.0
|
CVE-2010-2097
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2100
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2101
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-1914
|
Medium
|
|
May 12, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-1917
|
Medium
|
|
May 12, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1860
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1861
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1862
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1864
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|