Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-3587
|
Low
|
|
Jan 19, 2011
|
== 12.0.6
== 12.1.1
== 11.5.10.2
== 12.1.2
== 12.1.3
== 12.0.5
== 12.0.4
|
CVE-2010-3589
|
Low
|
|
Jan 19, 2011
|
== 12.0.6
== 12.1.1
== 11.5.10.2
== 12.1.2
== 12.1.3
== 12.0.5
== 12.0.4
|
CVE-2010-2416
|
Low
|
|
Oct 14, 2010
|
== 12.0.6
== 11.5.10.2
== 12.1.3
|
CVE-2010-2418
|
Low
|
|
Oct 14, 2010
|
== 12.0.6
== 11.5.10.2
== 12.1.3
|
CVE-2010-3504
|
Low
|
|
Oct 14, 2010
|
== 12.0.6
== 11.5.10.2
== 12.1.2
|
CVE-2010-2388
|
Medium
|
|
Oct 14, 2010
|
== 11.5.10.2
|
CVE-2010-2404
|
Low
|
|
Oct 14, 2010
|
== 12.0.6
== 11.5.10.2
== 12.1.2
|
CVE-2010-2408
|
Low
|
|
Oct 14, 2010
|
== 12.0.6
== 11.5.10.2
== 12.1.3
|
CVE-2010-0836
|
Low
|
|
Jul 14, 2010
|
== 12.0.6
== 11.5.10.2
== 12.1.2
|
CVE-2010-0905
|
Low
|
|
Jul 14, 2010
|
== 11.5.10.2
== 12.0.4
|