Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-3789
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3790
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3791
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3792
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3793
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3794
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3795
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3796
|
Low
|
|
Nov 16, 2010
|
== 10.5.8
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|
CVE-2010-3797
|
Low
|
|
Nov 16, 2010
|
== 10.5.8
== 10.6.3
== 10.6.4
== 10.6.1
== 10.6.2
== 10.6.0
|
CVE-2010-3798
|
Medium
|
|
Nov 16, 2010
|
== 10.6.0
== 10.6.1
== 10.6.2
== 10.6.3
== 10.6.4
|