Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-1860
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1861
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1862
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1864
|
Medium
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1868
|
High
|
|
May 8, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-1866
|
Critical
|
|
May 8, 2010
|
>= 5.3.0 <= 5.3.2
|
CVE-2010-1128
|
Medium
|
|
Mar 26, 2010
|
== 5.2.9
== 5.2.7
== 5.2.2
== 5.2.5
<= 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-1129
|
High
|
|
Mar 26, 2010
|
== 5.2.9
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-1130
|
Medium
|
|
Mar 26, 2010
|
== 5.2.9
== 5.1.5
== 5.1.2
== 5.3.1
== 5.1.1
== 5.0.0-beta1
== 5.1.6
== 5.2.7
== 5.2.2
== 5.0.5
== 5.0.1
== 5.1.4
== 5.2.5
== 5.0.4
<= 5.2.12
== 5.2.11
== 5.2.6
== 5.0.0-rc2
== 5.2.3
== 5.0.3
== 5.1.0
== 5.2.13
== 5.0.0-rc3
== 5.2.0
== 5.2.4
== 5.0.0-beta3
== 5.1.3
== 5.2.10
== 5.0.0-rc1
== 5.0.2
== 5.2.1
== 5.0.0-beta4
== 5.0.0
== 5.0.0-beta2
== 5.2.8
|
CVE-2010-0397
|
Medium
|
|
Mar 16, 2010
|
== 5.3.1
|