Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-4394
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
|
CVE-2010-4395
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4396
|
Low
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.2
|
CVE-2010-4397
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-2578
|
High
|
|
Oct 19, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.2
|
CVE-2010-2998
|
High
|
|
Oct 19, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
|
CVE-2010-3747
|
High
|
|
Oct 19, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.2
|
CVE-2010-3748
|
High
|
|
Oct 19, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.2
|
CVE-2010-3749
|
High
|
|
Oct 19, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
|
CVE-2010-3750
|
High
|
|
Oct 19, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.2
|