Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2211
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-2212
|
High
|
|
Jun 30, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 8.2.2
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
== 9.3.2
|
CVE-2010-0190
|
Low
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0191
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0192
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0193
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0194
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0195
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0196
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|
CVE-2010-0197
|
High
|
|
Apr 14, 2010
|
== 8.0
== 8.1
== 8.1.1
== 8.1.2
== 8.1.4
== 8.1.5
== 8.1.6
== 8.1.7
== 8.2.1
== 9.0
== 9.1
== 9.1.1
== 9.1.2
== 9.1.3
== 9.2
== 9.3
== 9.3.1
|