Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-4386
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4387
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4388
|
Low
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4389
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4390
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4391
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4392
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4394
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4395
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-4396
|
Low
|
|
Dec 14, 2010
|
== 1.0.1
== 1.1.5
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|