Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2225
|
High
|
|
Jun 24, 2010
|
== 5.2.9
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|
CVE-2010-2190
|
Medium
|
|
Jun 8, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2191
|
Medium
|
|
Jun 8, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2093
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2094
|
Medium
|
|
May 28, 2010
|
== 5.3.1
== 5.3.0
|
CVE-2010-2097
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2100
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-2101
|
Medium
|
|
May 28, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-1914
|
Medium
|
|
May 12, 2010
|
== 5.2.9
== 5.3.1
== 5.2.7
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.3.0
== 5.2.3
== 5.2.0
== 5.2.4
== 5.3.2
== 5.2.10
== 5.2.1
== 5.2.8
|
CVE-2010-1917
|
Medium
|
|
May 12, 2010
|
== 5.2.9
== 5.2.2
== 5.2.5
== 5.2.12
== 5.2.11
== 5.2.6
== 5.2.3
== 5.2.13
== 5.2.0
== 5.2.4
== 5.2.10
== 5.2.1
== 5.2.8
== 5.3.1
== 5.3.0
== 5.3.2
|