Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2015-0415
|
Low
|
|
Jan 21, 2015
|
== 12.1.3
|
CVE-2015-0380
|
Low
|
|
Jan 21, 2015
|
== 12.0.6
== 12.1.1
== 12.2.3
== 11.5.10.2
== 12.1.2
== 12.1.3
== 12.2.2
== 12.0.5
== 12.2.4
== 12.0.4
|
CVE-2015-0393
|
Medium
|
|
Jan 21, 2015
|
== 12.0.6
== 12.2.3
== 11.5.10.2
== 12.1.3
== 12.2.2
== 12.2.4
|
CVE-2015-0404
|
Low
|
|
Jan 21, 2015
|
== 12.0.6
== 12.2.3
== 11.5.10.2
== 12.1.3
== 12.2.2
== 12.2.4
|
CVE-2014-6556
|
Low
|
|
Jan 21, 2015
|
== 12.0.6
== 12.2.3
== 11.5.10.2
== 12.1.3
== 12.2.2
== 12.2.4
|
CVE-2014-6572
|
Medium
|
|
Jan 21, 2015
|
== 12.0.6
== 12.1.1
== 12.2.3
== 12.1.2
== 12.1.3
== 12.2.2
== 12.0.5
== 12.2.4
== 12.0.4
|
CVE-2014-6581
|
Medium
|
|
Jan 21, 2015
|
== 12.0.6
== 12.1.1
== 12.2.3
== 11.5.10.2
== 12.1.2
== 12.1.3
== 12.2.2
== 12.0.5
== 12.2.4
== 12.0.4
|
CVE-2014-6582
|
Medium
|
|
Jan 21, 2015
|
== 12.0.6
== 12.1.1
== 12.2.3
== 11.5.10.2
== 12.1.2
== 12.1.3
== 12.2.2
== 12.0.5
== 12.2.4
== 12.0.4
|
CVE-2014-6583
|
Medium
|
|
Jan 21, 2015
|
== 12.0.6
== 12.1.1
== 11.5.10.2
== 12.1.2
== 12.1.3
== 12.0.5
== 12.0.4
|
CVE-2014-6525
|
Low
|
|
Jan 21, 2015
|
== 12.0.6
== 12.2.3
== 11.5.10.2
== 12.1.3
== 12.2.2
== 12.2.4
|