Title |
Severity |
Exploit |
Date |
Affected Version |
CVE-2011-2127
|
High
|
|
Jun 17, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.9.615
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
<= 11.5.9.620
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2011-2128
|
High
|
|
Jun 17, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.9.615
== 11.5.1.601
== 11.0.0.456
== 6.0
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
<= 11.5.9.620
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2587
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2588
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-2589
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4093
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4187
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4188
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4189
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|
CVE-2010-4190
|
High
|
|
Feb 10, 2011
|
== 8.5.324
== 5.0
== 4.0
== 8.5.1
== 10.1.4.020
== 11.5.1.601
== 11.0.0.456
== 6.0
<= 11.5.9.615
== 8.0.204
== 8.0.196
== 8.5.1.105
== 10.2.0.023
== 10.1.0.11
== 11.5.0.596
== 9.0.383
== 1.0
== 11.0.3.471
== 10.2.0.022
== 8.0.205
== 8.5.1.106
== 11.5.8.612
== 8.5.321
== 11.5.2.602
== 8.5.1.100
== 2.0
== 10.1.1.016
== 8.0
== 10.0.0.210
== 10.0.1.004
== 10.2.0.021
== 11.5.6.606
== 11.5.7.609
== 3.0
== 8.0.196a
== 10.1.0.011
== 9.0.432
== 8.5.1.103
== 8.5.323
== 8.5.325
== 11.5.0.595
== 9
|