Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2201
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2202
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2203
|
Medium
|
|
Jun 30, 2010
|
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2204
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2205
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2206
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2207
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2208
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2209
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2210
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|