Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2010-4447
|
Low
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4448
|
Low
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4450
|
Low
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4454
|
High
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4462
|
High
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4465
|
High
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4466
|
Medium
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4469
|
High
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4473
|
High
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|
CVE-2010-4475
|
Low
|
|
Feb 17, 2011
|
== 1.4.2_19
== 1.4.2
<= 1.4.2_29
== 1.4.2_26
== 1.4.2_10
== 1.4.2_12
== 1.4.2_17
== 1.4.2_14
== 1.4.2_21
== 1.4.2_13
== 1.4.2_6
== 1.4.2_23
== 1.4.2_5
== 1.4.2_1
== 1.4.2_18
== 1.4.2_4
== 1.4.2_22
== 1.4.2_28
== 1.4.2_7
== 1.4.2_8
== 1.4.2_25
== 1.4.2_27
== 1.4.2_02
== 1.4.2_16
== 1.4.2_11
== 1.4.2_9
== 1.4.2_20
== 1.4.2_3
== 1.4.2_24
== 1.4.2_15
|