Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2814
|
High
|
|
Aug 9, 2010
|
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.1(1)
== 8.1(2)
== 8.2
== 8.2(1)
== 8.2(2)
== 8.3
|
CVE-2010-2815
|
High
|
|
Aug 9, 2010
|
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.1(1)
== 8.1(2)
== 8.2
== 8.2(1)
== 8.2(2)
== 8.3
|
CVE-2010-2816
|
High
|
|
Aug 9, 2010
|
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.1(1)
== 8.1(2)
== 8.2
== 8.2(1)
== 8.2(2)
|
CVE-2010-2817
|
High
|
|
Aug 9, 2010
|
== 7.0.1
== 7.0.2
== 7.0.3
== 7.0.4
== 7.0.5
== 7.0.6
== 7.0.7
== 7.0.8
== 7.1.1
== 7.1.2
== 7.2(3)
== 7.2(4)
== 7.2(5)
== 8.0(2)
== 8.0(3)
== 8.0(4)
== 8.0(5)
== 8.1(1)
== 8.1(2)
== 8.2
== 8.2(1)
== 8.2(2)
== 8.3
|
CVE-2009-2631
|
Medium
|
|
Dec 4, 2009
|
*
|
CVE-2009-1201
|
Low
|
|
Jun 25, 2009
|
== 8.0(4)
== 8.1.2
== 8.2.1
*
|
CVE-2009-1202
|
Low
|
|
Jun 25, 2009
|
== 8.0(4)
== 8.1.2
== 8.2.1
*
|
CVE-2009-1203
|
Medium
|
|
Jun 25, 2009
|
== 8.0(4)
== 8.1.2
== 8.2.1
*
|
CVE-2009-1220
|
Low
|
|
Apr 1, 2009
|
== 5520
|
CVE-2008-2056
|
High
|
|
Jun 4, 2008
|
== 8.1
|