Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-2999
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.0.0
|
CVE-2010-4376
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.0.0
== 1.0.2
== 1.1
== 1.1.1
== 1.0.5
|
CVE-2010-4377
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4378
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4379
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4380
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4381
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4382
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4383
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4385
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|