Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-4397
|
High
|
|
Dec 14, 2010
|
== 1.0.1
== 1.0.0
== 1.0.2
== 1.1
== 1.1.1
== 1.0.5
|
CVE-2010-2578
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-2998
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.0.0
|
CVE-2010-3747
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-3748
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-3749
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-3750
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-3751
|
High
|
|
Oct 19, 2010
|
== 1.0.1
== 1.1.3
== 1.0.0
== 1.0.2
== 1.1
== 1.1.2
== 1.1.4
== 1.1.1
== 1.0.5
|
CVE-2010-0116
|
High
|
|
Aug 30, 2010
|
== 1.0.0
== 1.0.1
== 1.0.2
== 1.0.5
== 1.1
== 1.1.1
== 1.1.2
== 1.1.3
== 1.1.4
|
CVE-2010-0117
|
High
|
|
Aug 30, 2010
|
== 1.0.0
== 1.0.1
== 1.0.2
== 1.0.5
== 1.1
== 1.1.1
== 1.1.2
== 1.1.3
== 1.1.4
|