Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-4383
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 12.0.0.1444
== 11.0.2.1744
== 2.1.2
|
CVE-2010-4384
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
== 2.1.2
|
CVE-2010-4385
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
== 2.1.2
|
CVE-2010-4386
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4387
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 12.0.0.1444
== 11.0.2.1744
|
CVE-2010-4388
|
Low
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.3
== 2.1.2
|
CVE-2010-4389
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4390
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
|
CVE-2010-4391
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 2.1.3
== 2.1.2
|
CVE-2010-4392
|
High
|
|
Dec 14, 2010
|
== 11.0
== 11.0.4
== 11.0.2
== 11.0.3
== 11.0.5
== 11.1
== 11.0.1
== 11.0.2.1744
== 2.1.3
== 2.1.2
|