Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2997
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-2999
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4375
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4376
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4377
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 12.0.0.1444
== 11.0.2.1744
|
CVE-2010-4378
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
== 2.1.3
== 2.1.2
|
CVE-2010-4379
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
== 2.1.2
|
CVE-2010-4380
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.2
|
CVE-2010-4381
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 12.0.0.1444
== 2.1.2
|
CVE-2010-4382
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
== 2.1.2
|